Forgot your password?
typodupeerror

The Ultimate Net Monitoring Tool? 293

Posted by ScuttleMonkey
from the corporations-striving-to-be-big-brother dept.
Wired News is reporting that the equipment found in the "secret" NSA room at AT&T wasn't some elaborate device designed by Big Brother. Rather, it is a commercially available network-analysis product that any company could acquire. From the article: "'Anything that comes through (an IP network), we can record,' says Steve Bannerman, marketing vice president of Narus, a Mountain View, California, company. 'We can reconstruct all of their e-mails along with attachments, see what web pages they clicked on, we can reconstruct their VOIP calls.'"
This discussion has been archived. No new comments can be posted.

The Ultimate Net Monitoring Tool?

Comments Filter:
  • by Tackhead (54550) on Wednesday May 17, 2006 @02:29PM (#15352756)
    From TFfunctional specification:
    The Semantic Traffic Analyzer received and transmitted simultaneously. Any sound that Winston made, above the level of a very low whisper, would be picked up by it; moreover, so long as he remained within the field of vision which the metal plaque commanded, he could be seen as well as heard. There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You had to live--did live, from habit that became instinct--in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized."

    Orwell, G. Functional Specification, Narus STA 6400 (rev. 1984)

    From TFA, the deliverable:

    We can reconstruct all of their e-mails along with attachments, see what web pages they clicked on, we can reconstruct their VOIP calls.

    AT&T. Your world, delivered.

  • Hm. (Score:3, Interesting)

    by DoctorDyna (828525) on Wednesday May 17, 2006 @02:30PM (#15352771)
    Does it make anybody else nervous that there is a market for these products? "off the shelf" products that can scale to this degree?

    If enough large companies are purchasing these to the degree that a company manufactures this equipment...exclusively.. doesn't that strike an interesting chord?

  • by AriaStar (964558) on Wednesday May 17, 2006 @02:35PM (#15352808) Journal
    ...is that we hear about stuff like this as fact before the rest of the world even hears it as rumor. I believe it's been a while that companies have been using this to keep track of what their employees are doing on work time (where I work, we had to sign a document stating that we knew that any and all communications at work, from VOIP to e-mail to webpages, regardless of encryption, could be recorded with no further notice) and to follow court-ordered tracking. The internet is not a secure place to be by any means, and it's best to proceed as if someone is watching. Because, chances are, someone is.
  • Re:Hm. (Score:3, Interesting)

    by 99BottlesOfBeerInMyF (813746) on Wednesday May 17, 2006 @02:44PM (#15352889)

    Does it make anybody else nervous that there is a market for these products? "off the shelf" products that can scale to this degree? If enough large companies are purchasing these to the degree that a company manufactures this equipment...exclusively.. doesn't that strike an interesting chord?

    Supply and demand is somewhat elastic. Where I work right now we build fairly specialized traffic monitoring servers for the core and edge routers of ISPs. While we don't manufacture our own hardware, we do make use of hardware designed for traffic analysis like this and sold to numerous companies that create devices needing the same basic characteristics. Whether you are making a packet analyzer, a high-level forensic tool, a firewall, an IDS, a traffic shaper, or something else, you may very well need basically the same hardware. So maybe 50 customers want something as expensive as what Narus makes for the high end, that can handle that much throughput. If they are willing to pay enough, someone (like Narus) will build it. Regulation compliance budgets are pretty large this year.

    Of course Narus probably did not start out selling a "snooping" device. Look at their customers. They are all major ISPs and telecoms. The smart money says they started as a way to track traffic for billing and expanded as their customers needed to comply with more government regulations.

  • by i am kman (972584) on Wednesday May 17, 2006 @02:44PM (#15352890)
    So, article starts with:

    The equipment that former AT&T technician Ed Klein learned was installed in the NSA "secret room" in AT&T's San Francisco switching office isn't some sinister Big Brother box designed solely to help governments eavesdrop on citizens' internet communications." ... - it's a commercial product!

    Oh great - I feel so much better about that. I was just worried that the government might have EXCLUSIVE rights to spy on me! But, as long as it's all shared and everyone can do it, then I guess it's ok.

    Thanks for the post - I'll sleep so much better now.



    Damn - where's the sarcastic emoticon when you need it.
  • Bellyaching (Score:3, Interesting)

    by crossmr (957846) on Wednesday May 17, 2006 @03:05PM (#15353078) Journal
    and all I hear is a bunch of bellyaching and "ooh they're evil!". As I stated a few weeks ago, Who is going to do anything about it? Evertyime we turn around the American government or corporations come up with a new way to spy on us, restrict our rights or do something else to make the world a little less pleasant.

    If they can't come up with anything specific that day, W. calls the RIAA and has them sue a dead woman. They want to make people so damn paranoid that one day they'll just turn around and say "Okay we're taking over your life, here is your itinerary for the day, don't alter this schedule. You have a bowel movement scheduled in 15 minutes". The vast majority will think its an awesome idea.

    These stories are great to remind us what a wasteland this place has become, but they serve no real purpose if no one actually does anything about it.
  • Re:Encryption? (Score:3, Interesting)

    by Noryungi (70322) on Wednesday May 17, 2006 @03:10PM (#15353116) Homepage Journal
    I mean what "commercially available network-analysis product" breaks encryption?

    Except, of course, that breaking encryption is the Holy Grail of Signal Intelligence. Sometimes, Traffic Analysis -- which is exactly what the NSA is doing here acording to the Wired article -- is just as interesting, and a lot easier to do.

    Knowing that person A is talking to person B, and that the number of messages between the two is increasing, and where and when each message has been sent (not to mention what type of traffic is taking place) is also very informative. If you know A, a known terrorist, is exchanging a lot of messages with B, a PhD student in nuclear physics in a top-notch university, is enough to raise red flags all over the place, regardless of what kind of encryption is used to protect the messages themselves. Which is why NSA has illegally gone fishing in the first place.
  • by mustafap (452510) on Wednesday May 17, 2006 @03:14PM (#15353142)

    Ethereal. Excellent tool, even for non black hats!
  • Field Proven! (Score:2, Interesting)

    by endernet (656588) on Wednesday May 17, 2006 @03:19PM (#15353187)
    From the Key Benefits section of their web site... Field-proven ability to meet the most stringent requirements of the world's largest networks such as AT&T, KDDI, Vodafone and Korea Telecom.
  • by SuperBanana (662181) on Wednesday May 17, 2006 @03:19PM (#15353191)
    "We can reconstruct all of their e-mails along with attachments"

    Dear Narus,

    -----BEGIN PGP MESSAGE-----
    Version: GnuPG v1.4.1 (GNU/Linux)

    jA0EAwMCiGG6wLlc/6tgyUeJGySx1Ccd8lGe3ugi35iwgMr2yi PxHsoCwtOeytve
    r8fdeb237gtWNHzaen4DpYF9ibJ4E6DCxm8+yGpYcoP7bgEnzJ H49A==
    =BJEi
    -----END PGP MESSAGE-----

    (created with "gpg -a -c"). Just a reminder that if you don't like people reading your email, you and your recipient can rather easily make sure nobody can practically do so.

    The NSA could probably break one PGP message's encryption in a matter of hours (or maybe even minutes), but they couldn't break one million. How about we all really press our friends to get PGP keys made+signed and the software installed...and ENCRYPT EVERY SINGLE PERSONAL EMAIL to them? Good luck to the NSA trying to sift through all that crap.

  • Re:Tor (Score:4, Interesting)

    by republican gourd (879711) on Wednesday May 17, 2006 @03:44PM (#15353404)
    Are there any estimate as to what percentage of the Tor (or Freenet, or etc etc) nodes are actually run by the Three-Letter-Agencies themselves? Considering that just about every nation has its own intelligence/security type agencies, thats easily a couple hundred nodes right there, probably on 'decent enough' links to get a decent share of traffic but not so fast as to attract suspicion.

    I remember reading about the Freenet Guy's planned changes (moving freenet to a friend-based system where you connect along lines of trust rather than completely anonymously, and immediately thought that the unstated goal was to cut *those* people out as much as possible rather (or in addition to) than the scalability reasons given.

    Hmm, better post this anonymously...
  • Tor Risks (Score:3, Interesting)

    by finkployd (12902) on Wednesday May 17, 2006 @03:45PM (#15353421) Homepage
    Just to play devil's advocate.....

    Use Tor, why? So I can get investigated/exposed in the media/arrested when someone uses my node for something illegal? No thanks. Acted as a server node for a while, then decided it was not worth the risk with all this homeland security paranoia.

    Law Enforcement (in this day and age of 0wned PCs, insecure wireless access points, Tor, RIAA tracking IPs to people who don't have computers, etc) STILL considers IP addresses to be valid and accurate identifiers of people. If something got traced to it and the ISP told them you had it at the time, guess what? You did it. The burden of proof would really be on YOU to prove that it was not you who was sending out a threatening email, communicating with a known terrorist, uploading child porn, or whatever. If they do know about Tor, they probably consider it more evidence that you are up to something illegal (just like PGP)

    Perhaps you would be able to create enough reasonable doubt (assuming it was a real trial and not a secret government trial) to get off. I'm sure that would make you feel a little better after having your "crimes" written about at length in the local paper, your picture up on the local (maybe national?) news media, and possibly your money, job, family, and friends gone. Just because you won a court case does not mean everyone will not still assume you are guilty. How many people think OJ is innocent?

    I'm not advocating being spineless and not taking a stand with technology, just remember what the risks are and ask yourself if you are really willing accept them. Today the population trusts anything that law enforcement tells them, especially if it is an internet related crime and even more so if it involves terrorism. Some geek whining about something called "tor" isn't going to convince your community you are not a dirty stinking terrorist.

    Finkployd
  • by MikeRT (947531) on Wednesday May 17, 2006 @03:48PM (#15353440) Homepage
    I've thought about buying a SSL setup for my blog so that people coming and going from it can do so in encryption-provided peace. It would be a bold move for civil liberties if hosting services would provide cheap access to SSL for their shared hosting customers. I'd pay an extra $5-$10/month for it, even if the certificate was shared with 20 other blogs at my host. The government just doesn't need to know these things. It's sick and perverted that they would even ask. The only place that it's considered doing your job to be a peeping tom is in the federal government.
  • Expectations (Score:3, Interesting)

    by ulpilot (973523) on Wednesday May 17, 2006 @04:06PM (#15353573)
    The law of the land (the USA anyway) says that if you have a conversation in a restaurant, there is no expectation of privacy. If you have a conversation at home, you do have an expectation of privacy, unless I consent to having my conversation recorded. As soon as you send/receive information in a public place there is no expectation of privacy, from a legal perspective.

    If you send/receive packets of data over a public connection, i.e. the internet, somehow you are expecting privacy? Hmmm. (notice the thoughtful pause) If you want or need privacy over a public medium, it seems simple to me. Use encryption.

    Don't get me wrong, I hate big government and big government's intrusion into my personal life. But, I also do not see my internet activity as a personal/private activity. There are just too many people involved. Webmasters see me visiting their site. My ISP knows where I go and what I do. So, I assume there will be others knowing that stuff too. There may be dozens of people 'knowing' what my internet activity looks like. No, I do not like big brother recording everything. It will, however take an amazing database to house all the data while waiting to be filtered and I am doubtful that the end result will accomplish what they are striving for.
  • Re:Time enough (Score:2, Interesting)

    by josh82 (894884) on Wednesday May 17, 2006 @04:35PM (#15353806)
    You, sir, are a genius. (And, no, I am not being sarcastic, though I may be easily impressed)

    While some might want to fight reactionary and all-too-corporate-backed legal policies with pithy appeals to such things as the "rule of law" and "human rights", this method pits such reactionary, corporate-backed legal policy against (drum roll...) corporate-backed legal policy!

    Turning the overlord's law against itself, however, is something that will only get you figuratively crushed, if you don't know what you're doing. Are you sure you know what you're doing?
  • by davidsyes (765062) on Wednesday May 17, 2006 @04:48PM (#15353918) Homepage Journal
    I am suspecting that the ISPs who INSISTS the newbie/uninformed windoze users and Mac users install that ISPs crackware CD masquerading as an 'experience enhancing/improving' software tool is really just a Trojan to facilitate later offline decryption.

    Just call them up. Make up your own scenarios. But, if LINUX users DON'T need the damned CD, why do windoze and Mac users need it. If you posit that you rebuild your machine every 6 weeks and you always lose your ISPs disk, or broke it by mistake, do you still need it? some of them will say, well, no, not ALWAYS, or no you don't NEED it...

    Why is there no lobby against this bald-face lying on the part of ISPs?
  • by davidsyes (765062) on Wednesday May 17, 2006 @05:01PM (#15354028) Homepage Journal
    Was so heavy into my rant that I forgot to include my other two suspicions:

    -- the ISPs are getting marketing dollars by deploying the disks, and when each one is installed, it calls back to mshaft to verify that the ISP is entitled to marketing dollars, which then enables mshaft to bolster their OS useage counts (which can be negated or deflated when users successfully log in without the disk ever being installed, which means an employee NOT pushing the disk installation might lose commissions or deprive the ISP of marketing dollars....)

    or,

    -- the ISPs use the disk to gain access to unwary users' machines, and then use the validated information or sell pieces or all of the information (maybe de-identified?) to "third party partners" and such

    As for those damned disks, I say if you SHIP the modem to the subscriber, and it is logically assumed there is no cloning of the MAC address, and the machine is directly connected to the C/M or DSL modem, then WHY WHY WHY on Earth is it a **MUST** that the end user install that disk? WHY?

    I guess gates and henchmen are going to put a full-on press against the ISP, now, or again... Sounds like ripe anti-trust/anti-competitive territory.

    US Government: This is MORE fodder for you in your quest to put a clamp in ms ass. Use this for ALL it's worth!

    Until Linux/Open Source is a genuine WMD or bigger threat to the world than windoze is, I will NOT give up my OS of choice, and nor should any other individual, company, or government....

    (There are SOME people who think I'm anti-government, that I'm an evil threat; far from it. I say what I think is right, and I reFUSE to suffer political bullshit just because some politico is afraid of losing eminence or turf or whatever. I call it like I see it. I am anti-effing-stupid-government, not anti-government. But, I suppose someone will try to explain that the two distinctions are by definition functionally equal and therefore I am still "totally" anti-government. WHEW!!!!)

    Now, where o-h hwhere are those rit, lith, umm, chlo, umm.... PILLS???!!!!

    adjusts EM-shielded strontium-coated tin foil hat...
  • by 99BottlesOfBeerInMyF (813746) on Wednesday May 17, 2006 @05:30PM (#15354221)

    This device as designed and built for spying, and was placed into telcos everywhere on the PRETEXT of being useful for traffic analysis. Then the NSA came calling and bulldozed the telcos into giving them everything that goes through it.

    Well, sort of. This device is (I believe) a modified version of what the ISPs have been using for a long time to let them accurately bill people for the services they offer and negotiate peering agreements and QoS contracts.

    The fact of the matters is that Narus the company is run by an "Israeli immigrant" and is financed by, among others, an Israeli investment company, one of the partners of whom happens to have worked for the Israeli government, including a stint developing optical devices for the Israeli military.

    Whoa, whoa, whoa there cowboy! Now I like a good conspiracy theory as much as the next guy, but you're making some pretty big and likely unwarranted leaps here. A whole lot of the traffic shaping, modeling, and balancing technology came out of Israel. The university there had a top notch network engineering program with a lot of smart people and patents coming out of it. Most moved to the US, where they could make money off of the .com boom and the aftermath. I know because I work with one of the professors who came over here to do that and let me tell you, he giggles way to much to be a mossad agent. I imagine anyone working in high-tech in Israel probably did some work for the military, especially if they were in academia.

    And one of the directors on the board happens to be an "ex-" NSA guy...

    So? I'm sure it helped them get the contract, and maybe helped them decide on the feature set. This is very common in the security industry. The company I work for has ex Microsoft people and ex-Cisco people. Surprise, surprise we sell to both of them. Another company we do a lot business with has ex Naval intelligence and NSA people. Guess who two of their big customers are? That is just the way the industry works. If you know people, you have an in and and often an advocate who helps to make the sale.

    The reality is that this device was designed and built for spying by the Mossad, in collaboration with the NSA, and then sold to the telcos under a pretext, which was then altered by arm-twisting or payment to the telcos to sell out the US Constitution.

    The reality is, some people found a niche and they filled it. This same type of functionality is needed for billing services and compliance with a number of government acts regarding lawful intercept, financing, security, and privacy assurance. Now maybe the NSA or AT&T requested added features to make this sort of activity easier. Maybe Narus came up with them on its own and sold them on it.

    I certainly think it is being misused and in a way that violates the founding principals of our government. That does not mean it is some grand conspiracy and running off half-cocked spouting this sort of unsupportable nonsense isn't helping anything. All it is doing is reducing the credibility of those who argue to have this sort of thing stopped and distracting people from the real issue.

    ..or is that your intention? You certainly do enough rabble rousing and insulting. If you really want to help, stick to the facts, not the wild speculation.

  • by twitter (104583) on Wednesday May 17, 2006 @09:18PM (#15355402) Homepage Journal
    There is oversight. Congressional committees were informed years ago. However election season is upon us so there is a lot of fake outrage and posing for the cameras and microphones going on.

    When informed of Total Information Awareness, Congress loudly and firmly killed it, but the NSA did it anyway in secret. [csoonline.com]

    This is a scandal of first order. The goal is unconstitutional, the attitude is nuamerican and the means are illegal. This is the kind of shit we fought the Cold War to avoid. I'm furious and you should be too.

    As the American Taliban tightens it's grip on your reading, conversations and whereabouts, the terrorists win. A few bandits flying into buildings, even the destruction of an entire American city is not an excuse to destroy the things this country stands for. A few more slips down the slope and you wont be able to tell the difference between the Axis of Evil and home.

  • by martyb (196687) on Thursday May 18, 2006 @06:55AM (#15356271)
    You wouldn't let a government agent swing by every morning and look at all the mailing addresses on letters going to/from your house, why the hell would you let them do the same to your phone records?

    This got me thinking... according to this link: Handwritten address interpretation [buffalo.edu]:

    Handwritten address interpretation research began at CEDAR in 1987 through funding from the United States Postal Service (USPS). The objective was to automate mail sorting through a system that could read a handwritten street address and ZIP code and encode each envelope with the destination address for machine sorting.

    This research ultimately led to the development and deployment of system that automates mail sorting through image analysis, digit recognition, word recognition, postal directory lookup, and a barcode assignment that designates the destination address. Since field-testing began in 1996, the Handwritten Address Interpretation System (HWAI) has been implemented at all USPS mail processing centers.

    (emphasis mine.)

    So, it's only a small step to record all that metadata for every letter sent within the USA. Just have postmasters general submit the day's scan logs to the gov't for review for possible terrorist links, and, by the way, archive all th information received. This information could include:

    • Who received mail.
    • Who sent it (from the return address).
    • When it was sent.
    • How much it weighed.
    • How urgently it was sent (overnight, first class, parcel post, etc.)

    So, maybe you were just joking, but from what I've seen lately, I'd have to suspect that this may already in place... can anyone corroborate this?

  • by Politburo (640618) on Thursday May 18, 2006 @09:57AM (#15357019)
    This "oversight" canard is such a joke. Yes, some select members of Congress were told (anywhere from 4-8 people). First off, this disclosure was in violation of the law. The full committees must be notified except for black ops (can't remember the TLA for this right now), which this does not qualify as. Second, these Congressmen are only told. The "oversight" has no approval or veto component. Furthermore, they are sworn to absolute secrecy and cannot under any circumstances divulge anything, at all, to anyone (including their spouses and most trusted staffers and colleagues), about the disclosures until they are made public by other means. This is why you have a very small number of people who have known about it for several years but are just now talking about it.

    Furthermore, Sen. Patrick Leahy (D-VT) wrote a hand-written letter to Cheney years ago saying he objected to the program when it was disclosed to him. The letter was, of course, ignored by the Adminstration.

"Who cares if it doesn't do anything? It was made with our new Triple-Iso-Bifurcated-Krypton-Gate-MOS process ..."

Working...