darkside of the moon narus prism

Upload: stopspyingonme

Post on 02-Apr-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/27/2019 Darkside of the Moon Narus PRISM

    1/31

    The dark side of the moonDenis A Nicole

    2013-06-17

  • 7/27/2019 Darkside of the Moon Narus PRISM

    2/31

    2

  • 7/27/2019 Darkside of the Moon Narus PRISM

    3/31

    3

  • 7/27/2019 Darkside of the Moon Narus PRISM

    4/31

    CDAC

    After being denied Craysupercomputers, Indian

    scientists developed their own,which proved the world that wecould beat them at their owngame, and at a fraction of thecost. The final result of theeffort was the PARAM 8000which was installed in 1991.

    4

    http://www.pcquest.com/pcquest/news/177688/products-made-india

    http://www.pcquest.com/pcquest/news/177688/products-made-indiahttp://www.pcquest.com/pcquest/news/177688/products-made-indiahttp://www.pcquest.com/pcquest/news/177688/products-made-indiahttp://www.pcquest.com/pcquest/news/177688/products-made-indiahttp://www.pcquest.com/pcquest/news/177688/products-made-indiahttp://www.pcquest.com/pcquest/news/177688/products-made-india
  • 7/27/2019 Darkside of the Moon Narus PRISM

    5/31

    The architect of PARAM 8000, Indias first supercomputer

    Vijay Pandurang Bhatkar, one ofIndias most acclaimedscientists, is best known as thearchitect of Indias firstsupercomputerPARAM 8000.

    5

    http://www.livemint.com/Industry/jmNVLeBoYXUbJzFJBTdNLK/Yesterdays-supercomputers-are-todays-laptops-Bhatkar.html?utm_medium=referral&utm_source=t.co

    http://www.livemint.com/Industry/jmNVLeBoYXUbJzFJBTdNLK/Yesterdays-supercomputers-are-todays-laptops-Bhatkar.html?utm_medium=referral&utm_source=t.cohttp://www.livemint.com/Industry/jmNVLeBoYXUbJzFJBTdNLK/Yesterdays-supercomputers-are-todays-laptops-Bhatkar.html?utm_medium=referral&utm_source=t.cohttp://www.livemint.com/Industry/jmNVLeBoYXUbJzFJBTdNLK/Yesterdays-supercomputers-are-todays-laptops-Bhatkar.html?utm_medium=referral&utm_source=t.cohttp://www.livemint.com/Industry/jmNVLeBoYXUbJzFJBTdNLK/Yesterdays-supercomputers-are-todays-laptops-Bhatkar.html?utm_medium=referral&utm_source=t.cohttp://www.livemint.com/Industry/jmNVLeBoYXUbJzFJBTdNLK/Yesterdays-supercomputers-are-todays-laptops-Bhatkar.html?utm_medium=referral&utm_source=t.cohttp://www.livemint.com/Industry/jmNVLeBoYXUbJzFJBTdNLK/Yesterdays-supercomputers-are-todays-laptops-Bhatkar.html?utm_medium=referral&utm_source=t.cohttp://www.livemint.com/Industry/jmNVLeBoYXUbJzFJBTdNLK/Yesterdays-supercomputers-are-todays-laptops-Bhatkar.html?utm_medium=referral&utm_source=t.cohttp://www.livemint.com/Industry/jmNVLeBoYXUbJzFJBTdNLK/Yesterdays-supercomputers-are-todays-laptops-Bhatkar.html?utm_medium=referral&utm_source=t.cohttp://www.livemint.com/Industry/jmNVLeBoYXUbJzFJBTdNLK/Yesterdays-supercomputers-are-todays-laptops-Bhatkar.html?utm_medium=referral&utm_source=t.cohttp://www.livemint.com/Industry/jmNVLeBoYXUbJzFJBTdNLK/Yesterdays-supercomputers-are-todays-laptops-Bhatkar.html?utm_medium=referral&utm_source=t.cohttp://www.livemint.com/Industry/jmNVLeBoYXUbJzFJBTdNLK/Yesterdays-supercomputers-are-todays-laptops-Bhatkar.html?utm_medium=referral&utm_source=t.cohttp://www.livemint.com/Industry/jmNVLeBoYXUbJzFJBTdNLK/Yesterdays-supercomputers-are-todays-laptops-Bhatkar.html?utm_medium=referral&utm_source=t.cohttp://www.livemint.com/Industry/jmNVLeBoYXUbJzFJBTdNLK/Yesterdays-supercomputers-are-todays-laptops-Bhatkar.html?utm_medium=referral&utm_source=t.co
  • 7/27/2019 Darkside of the Moon Narus PRISM

    6/31

    6

    http://www.cdac.in/html/about/success/moscow.aspx

    http://www.cdac.in/html/about/success/moscow.aspxhttp://www.cdac.in/html/about/success/moscow.aspx
  • 7/27/2019 Darkside of the Moon Narus PRISM

    7/31

    Shakti-1: 1998-05-11

    Claimed Indianunderground

    thermonuclear test.

    Rumoured not to haveworked too well

    7

    http://www.fas.org/nuke/guide/india/nuke/shakti-pix1.htm& CNN

    http://www.fas.org/nuke/guide/india/nuke/shakti-pix1.htmhttp://www.fas.org/nuke/guide/india/nuke/shakti-pix1.htmhttp://www.fas.org/nuke/guide/india/nuke/shakti-pix1.htmhttp://www.fas.org/nuke/guide/india/nuke/shakti-pix1.htm
  • 7/27/2019 Darkside of the Moon Narus PRISM

    8/31

    Not Pink Floyd after all

    8

  • 7/27/2019 Darkside of the Moon Narus PRISM

    9/31

  • 7/27/2019 Darkside of the Moon Narus PRISM

    10/31

    Or maybe this

    10http://narus.com/images/pdf/Narus_nSYSTEM_brochure.pdf

    http://narus.com/images/pdf/Narus_nSYSTEM_brochure.pdfhttp://narus.com/images/pdf/Narus_nSYSTEM_brochure.pdf
  • 7/27/2019 Darkside of the Moon Narus PRISM

    11/31

    Now part of Boeing

    11

  • 7/27/2019 Darkside of the Moon Narus PRISM

    12/31

    Presumably NARUS processes this bit

    12And the RSA keys?

  • 7/27/2019 Darkside of the Moon Narus PRISM

    13/31

    SIGINT people reallyhate to ask

    13

    This is the secret radio towerwhich the government used tointercept thousands of trunkphone lines running through

    Britain to the Republic ofIreland.

    The structure was located onthe boundary of the URENCO

    uranium enrichment plant atCapenhurst in Cheshire

    http://www.lamont.me.uk/capenhurst/

    http://www.lamont.me.uk/capenhurst/http://www.lamont.me.uk/capenhurst/
  • 7/27/2019 Darkside of the Moon Narus PRISM

    14/31

    It is also located right on the microwave line-of-sight between two BritishTelecom radio towers at Gwaenysgor in North Wales and Pale Heights inCheshire.

    The BT towers form part of a chain carrying thousands of phone lines fromEngland, along the north Wales coast to Anglesey, then across the IrishSea to Dublin. Four microwave channels ran in each direction, eachcapable of carrying one TV channel or roughly 1,000 phone calls, usingfrequencies around 6.5 GHz.

    14

  • 7/27/2019 Darkside of the Moon Narus PRISM

    15/31

  • 7/27/2019 Darkside of the Moon Narus PRISM

    16/31

    Radomes dont just keep the pigeons out

    16

  • 7/27/2019 Darkside of the Moon Narus PRISM

    17/31

    And where was the AN/FLR-9 looking?

    To be fair, there are also technical reasons that a Wullenweber is circularly disposed.http://www.ftva.org/heritage/anflr9/RAFChicksands.jpg

    http://www.premium-rx.org/ref/wullenweber.pdf

    17

    http://www.ftva.org/heritage/anflr9/RAFChicksands.jpghttp://www.premium-rx.org/ref/wullenweber.pdfhttp://www.premium-rx.org/ref/wullenweber.pdfhttp://www.premium-rx.org/ref/wullenweber.pdfhttp://www.premium-rx.org/ref/wullenweber.pdfhttp://www.ftva.org/heritage/anflr9/RAFChicksands.jpg
  • 7/27/2019 Darkside of the Moon Narus PRISM

    18/31

    Its obvious where this was pointing

    18

  • 7/27/2019 Darkside of the Moon Narus PRISM

    19/31

    and it didnt work

    http://www.dod.mil/pubs/foi/Science_and_Technology/Other/480.pdf

    19

    http://www.dod.mil/pubs/foi/Science_and_Technology/Other/480.pdfhttp://www.dod.mil/pubs/foi/Science_and_Technology/Other/480.pdf
  • 7/27/2019 Darkside of the Moon Narus PRISM

    20/31

    Back to the topic. Im no lawyer, but

    I dont thinkinternationalcommunications are protected frominspection.

    So NSA are probably within their rights to deep packet inspectat theterminations of international cables/sat-links.

    But, it seems, that is not what they did:

    AT&T provided National Security Agency eavesdroppers with full access to its customers' phone calls, and shuntedits customers' internet traffic to data-mining equipment installed in a secret room in its San Francisco switchingcentre, according to a former AT&T worker cooperating in the Electronic Frontier Foundation's lawsuit againstthe company.

    The split circuits included traffic from peering links connecting to other internet backbone providers, meaningthat AT&T was also diverting traffic routed from its network to or from other domestic and internationalproviders, according to Klein's statement.

    The secret room also included data-mining equipment called a Narus STA 6400, known to be used particularlyby government intelligence agencies because of its ability to sift through large amounts of data looking for pre-programmed targets, according to Klein's statement.

    http://www.wired.com/science/discoveries/news/2006/04/70619

    20

    http://www.wired.com/science/discoveries/news/2006/04/70619http://www.wired.com/science/discoveries/news/2006/04/70619
  • 7/27/2019 Darkside of the Moon Narus PRISM

    21/31

    Whats this here?

    21

    France Telecom,BT, AT&T etc.SAFE fibrehttp://www.safe-sat3.co.za/

    Diego Garcia

    http://www.safe-sat3.co.za/http://www.safe-sat3.co.za/http://www.safe-sat3.co.za/http://www.safe-sat3.co.za/
  • 7/27/2019 Darkside of the Moon Narus PRISM

    22/31

    USS Jimmy Carter

    This boat is different fromits sister boats, the USSSeawolf, and the USS

    Connecticut, in that ithas an additional sectioninserted into the hull forspecial operations.

    Commissioned 2005-02-19.

    22

    http://www.fxmodels.com/SSN23.shtml

    http://www.fxmodels.com/SSN23.shtmlhttp://www.fxmodels.com/SSN23.shtml
  • 7/27/2019 Darkside of the Moon Narus PRISM

    23/31

    Leaking is dangerous

    23

  • 7/27/2019 Darkside of the Moon Narus PRISM

    24/31

    People will say anything on the Web

    24

  • 7/27/2019 Darkside of the Moon Narus PRISM

    25/31

    Dates

    25

    FAA signed into law

    Microsoft buys Skype

    Steve Jobs dies

  • 7/27/2019 Darkside of the Moon Narus PRISM

    26/31

    Microsoft has form: NT4 SP5_NSAKEY 1999

    Andrew Fernandes discovered a back door for the NSA in every copy of Win95/98/NT4 andWindows2000.

    In this service release of software from Microsoft, the company crucially forgot to remove thesymbolic information identifying the security components. It turns out that there arereally two keys used by Windows; the first belongs to Microsoft, and it allows them to

    securely load CryptoAPI services; the second belongs to the NSA. That means that theNSA can also securely load CryptoAPI services on your machine, and without yourauthorization. The result is that it is tremendously easier for the NSA to loadunauthorized security services on all copies of Microsoft Windows, and once thesesecurity services are loaded, they can effectively compromise your entire operatingsystem.

    It turns out that there is a flaw in the way the function is implemented. Because of this, userscan easily eliminate or replace the NSA key from the operating system without modifyingany of Microsoft's original components. Since the NSA key is easily replaced, it meansthat non-US companies are free to install "strong" crypto services into Windows, withoutMicrosoft's or the NSA's approval.

    http://cryptome.org/

    26

    http://cryptome.org/http://cryptome.org/
  • 7/27/2019 Darkside of the Moon Narus PRISM

    27/31

    Why do this?

    27

  • 7/27/2019 Darkside of the Moon Narus PRISM

    28/31

    Boundless Informant

    Reads like a Web Technology MSc Project

    28

  • 7/27/2019 Darkside of the Moon Narus PRISM

    29/31

    Boundless Informant is nothing to do with Prism

    29

  • 7/27/2019 Darkside of the Moon Narus PRISM

    30/31

    So why Prism?

    Heres a guess

    Direct connection to trusted set-up at hosting site.

    Lower latency, cheaper, but most important,

    control over who sees the requests.

    Another guess

    NSA cannot routinely crack SSL/TLS at high volume intheir NARUS (or whatever) boxes. A few trusted(trusting) individuals have shared their keys with NSA.

    30

  • 7/27/2019 Darkside of the Moon Narus PRISM

    31/31

    Some claims rings true

    31

    Really? You got to China.

    Upcoming story?