If you can read this, either the style sheet didn't load or you have an older browser that doesn't support style sheets. Try clearing your browser cache and refreshing the page.

(Some Guy)   IT Professional outlines how PRISM could work based on what we know today   (ashkansoltani.org) divider line 11
    More: Interesting, prisms, direct access  
•       •       •

1957 clicks; posted to Geek » on 19 Jun 2013 at 10:04 AM (1 year ago)   |  Favorite    |   share:  Share on Twitter share via Email Share on Facebook   more»



11 Comments   (+0 »)
   
View Voting Results: Smartest and Funniest

Archived thread
 
2013-06-19 11:07:36 AM  
Fascinating.  So if I understand the chart correctly, he has figured out that the system works in this way... the NSA asks for some information, the FBI informs the company that has the information, and then the company gives that information to the NSA.  Probably including things like databases.  Wow, what insight.
 
2013-06-19 11:21:23 AM  
Steve Gibson, on the Security Now podcast, had a much better explanation.  I'm simplifying a bit, but he suggests that the NSA is using splitter devices on the fiber optic trunks running to the large carrier routers and then beam a copy of the data stream to their own devices for capture and processing.  This could be done without the consent or knowledge of Google and the other people that are saying the NSA does not have direct access to their servers.  That is technically true, the NSA just has access to all the data passing through the routers on the way to the servers.  Oh, and how do you split light?  Prisms.
 
2013-06-19 01:15:52 PM  

bzomerlei: the NSA is using splitter devices on the fiber optic trunks running to the large carrier routers and then beam a copy of the data stream to their own devices for capture and processing


DING DING DING DING DING!  We have a winner.

The NSA is capable of slurping everything and anything that goes over the AT&T or Verizon networks, and probably Comcast and others as well.
 
2013-06-19 01:51:22 PM  
i thought it was all figured out from that guy finding that AT&T room in San Fran, in 2006.

this is why iscsi is better than fibre channel ;)
 
2013-06-19 02:25:02 PM  

bzomerlei: the NSA just has access to all the data passing through the routers on the way to the servers


They might also be using the same process inside the encryption gateway. That would require participation of the company being targeted rather than just their carrier, but it's still something that could be done just by splitting the feed without any direct access the the company's servers or stored data.

But they're almost certainly not making specific requests because that would reveal what they're searching for. The FBI might go back and make specific requests to get more details, but whatever data the NSA is collecting is being collected for everyone.
 
2013-06-19 03:31:39 PM  
The program of allowing the government to create their own copy of ISP data without having to request it was exposed in 2006.  This isn't a surprise to anyone who has paid attention.

/Sidebar: wasn't this the plot of the last Tom Clancy novel starring Jack Jr.?  The super super shiatty one that was obviously ghostwritten?  President Jack Ryan, before leaving office, helped set up a "privately funded" corporation whose headquarters happened to be situated in a way that allowed it to grab NSA transmissions for its own use.  Then he staffed it with loyal Murcans and put a stack of presigned, blank presidential pardons in the director's safe and told them to protect the country.
//I cannot emphasize how shiatty this book was
///Difficulty level: Jack Jr. drove a yellow Hummer and we were expected to sympathize with him.
////come in fours, biatches!
 
2013-06-19 03:53:46 PM  

TelemonianAjax: The program of allowing the government to create their own copy of ISP data without having to request it was exposed in 2006.  This isn't a surprise to anyone who has paid attention.


Unfortunately most people didn't pay attention. I vaguely remember that story being a big deal for all of a week when it broke back in 2006.

I wonder how long the current outrage will last.
 
2013-06-19 03:53:52 PM  

asciibaron: i thought it was all figured out from that guy finding that AT&T room in San Fran, in 2006.



Yes, this is not new, Gibson specifically referenced that 2006 story and how it neatly fits into a possible explanation for prism.
 
2013-06-19 04:33:13 PM  
How Prism may work:
img.fark.net

Note: if you run it backwards, you don't get your family back.
 
2013-06-19 04:46:23 PM  

asciibaron: i thought it was all figured out from that guy finding that AT&T room in San Fran, in 2006.



Back then, only paranoid tin foil hat wearers believed that room was real.

Now after the leak, you're considered an idiot if you didn't know this was happening.
 
2013-06-19 05:16:55 PM  

Desquamation: TelemonianAjax: The program of allowing the government to create their own copy of ISP data without having to request it was exposed in 2006.  This isn't a surprise to anyone who has paid attention.

Unfortunately most people didn't pay attention. I vaguely remember that story being a big deal for all of a week when it broke back in 2006.

I wonder how long the current outrage will last.


I think some type of singing contest finale has already eclipsed it.
 
Displayed 11 of 11 comments

View Voting Results: Smartest and Funniest


This thread is archived, and closed to new comments.

Continue Farking
Submit a Link »
On Twitter





In Other Media


  1. Links are submitted by members of the Fark community.

  2. When community members submit a link, they also write a custom headline for the story.

  3. Other Farkers comment on the links. This is the number of comments. Click here to read them.

  4. Click here to submit a link.

Report