It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
One 60-page document, identified as coming from "AT&T Labs Connectivity & Net Services" and authored by the labs' consultant Mathew F. Casamassima, is titled Study Group 3, LGX/Splitter Wiring, San Francisco and dated 12/10/02. (See sample PDF 1-4.) This document addresses the special problem of trying to spy on fiber-optic circuits. Unlike copper wire circuits which emit electromagnetic fields that can be tapped into without disturbing the circuits, fiber-optic circuits do not "leak" their light signals. In order to monitor such communications, one has to physically cut into the fiber somehow and divert a portion of the light signal to see the information.
This problem is solved with "splitters" which literally split off a percentage of the light signal so it can be examined. This is the purpose of the special cabinet referred to above: Circuits are connected into it, the light signal is split into two signals, one of which is diverted to the "secret room." The cabinet is totally unnecessary for the circuit to perform -- in fact it introduces problems since the signal level is reduced by the splitter -- its only purpose is to enable a third party to examine the data flowing between sender and recipient on the internet.
According to a year 2007 company press release, the latest version of NarusInsight Intercept Suite (NIS) is "the industry's only network traffic intelligence system that supports real-time precision targeting, capturing and reconstruction of webmail traffic... including Google Gmail, MSN Hotmail and Yahoo! Mail".[11] However, currently most webmail traffic can be HTTPS encrypted, so the content of messages can only be monitored with the consent of service providers.
"The (Narus) STA Platform consists of stand-alone traffic analyzers that collect network and customer usage information in real time directly from the message.... These analyzers sit on the message pipe into the ISP (internet service provider) cloud rather than tap into each router or ISP device" (Telecommunications magazine, April 2000). A Narus press release (1 Dec., 1999) also boasts that its Semantic Traffic Analysis (STA) technology "captures comprehensive customer usage data ... and transforms it into actionable information.... (It) is the only technology that provides complete visibility for all internet applications."
Giza Systems is the number one systems integrator in Egypt and the Middle East, providing a wide range of industry specific technology solutions in the telecom, utilities, oil and gas, and manufacturing industries.
SecureTech (ST) is one of the leading and renowned information and communication technology (ICT) service providers in the UAE. Equipped with skilled resources and state-of-the-art infrastructure, SecureTech provides clients with robust, cost-effective, and secure IT solutions.
Originally posted by WaterBottle
Then why even bother getting a warrant....
Originally posted by SonOfTheLawOfOne
reply to post by Rocker2013
Thank you for the feedback. I can tell you from first-hand experience, that they do not have access directly to the servers around the clock, any time they want. They have to have a warrant to get access to the servers or directly to the data within an organization.
The way it works is that they get the warrant, and the company has a certain amount of time to "comply". What compliance means has a lot of definitions. If you look through the documents, the compliance can be either direct access to the servers through a VPN (virtual private network), RDP (remote desktop protocol for Windows machines), or even physical print outs of the information requested. In some cases, the company may make an entire copy of a database or a server and isolate it in a separate part of the network that grants exclusive access to the NSA or Feds. To avoid giving out their private encryption keys, the will also sometimes decrypt the data, and re-encrypt it using a temporary encryption key that they can give to the Feds or NSA without compromising everyone else's data.
Keep in mind, what you've seen online and in the media is just a fraction of the capabilities that they really have. When they tell you they have access to the servers, it's to steer your attention towards them spying on "only 13 big companies" rather than the entire Internet, which is what they are really doing.
~Namaste
Im confused. Are you saying Edward Snowden was lieing when he said they do not need warrants to access your information? I under stand the information is encrypted and that your saying they need encryption keys to access the information. But Edward Snowden said he could personally search a data base and look at any ones information even listen to their phone calls live. Data is encrypted, you say it can take weeks for them to decrypt it but hes saying he can listen in on your live phone and chat conversations.
You have allot more knowledge on the subject then I do. Do you know how they trace this information back to a certain individual. Edward Snowden made it seem as if you could search a name and all of their activity could be seen. How do they link the information to that person? Ip addresses and mac addresses?
Originally posted by SonOfTheLawOfOne
reply to post by Infi8nity
Im confused. Are you saying Edward Snowden was lieing when he said they do not need warrants to access your information? I under stand the information is encrypted and that your saying they need encryption keys to access the information. But Edward Snowden said he could personally search a data base and look at any ones information even listen to their phone calls live. Data is encrypted, you say it can take weeks for them to decrypt it but hes saying he can listen in on your live phone and chat conversations.
You have allot more knowledge on the subject then I do. Do you know how they trace this information back to a certain individual. Edward Snowden made it seem as if you could search a name and all of their activity could be seen. How do they link the information to that person? Ip addresses and mac addresses?
He is partially correct. Any traffic that is not explicitly encrypted is fair game and can be inspected or listened in on in a real-time fashion. So they do not need warrants for that. But let's say the only non-secure data you send over the Internet is text messages from your phone? (not encrypted) They can listen to those, and if one of those messages has the right words in it, it will get "flagged". Next, they start focusing on all of your Internet traffic and find that you are doing all email and everything else with SSL encrypted traffic. They can't just decrypt it, but sometimes they can, it depends on the level of encryption. But in most cases, it will take them too long, so they just get the warrant and ask the company that you're using for your email to decrypt it for them and provide them the unencrypted data.
Every single byte of information you send over the net is "packaged" up in TCP/IP stacks. In these stacks, there is routing information that tells where the packet originated from (IP address and MAC address) and where it is going to. That packet "hops" from router to router until it reaches the destination. All they have to do is look at that information to find you, and they can do it with incredible efficiency. With the right tools, you can fingerprint someone's traffic in about 10 seconds and find where they are in 15-30. And those are the laymen tools, not the ones the Government has developed.
~Namaste
Would it be possible for the service provided to encrypt data so that these organizations have to get a warrants to check out the information? This could not be done from the service providers location right? Maybe a computer provided by the service provider just to encrypt data for every day users. I would think ISP could make a good chunk of change offering encryption's for every day people. But then again would the Govt even allow ISP to provide a service like that.
Originally posted by EA006
reply to post by SonOfTheLawOfOne
Nice breakdown. S&F