Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Businesses Government Open Source Technology

Spinoffs From Spyland: How Some NSA Technology Is Making Its Way Into Industry 44

An anonymous reader writes with this news from MIT's Technology Review: "Like other federal agencies, the NSA is compelled by law to try to commercialize its R&D. It employs patent attorneys and has a marketing department that is now trying to license inventions ... The agency claims more than 170 patents ... But the NSA has faced severe challenges trying to keep up with rapidly changing technology. ... Most recently, the NSA's revamp included a sweeping effort to dismantle ... 'stovepipes,' and switch to flexible cloud computing ... in 2008, NSA brass ordered the agency's computer and information sciences research organization to create a version of the system Google uses to store its index of the Web and the raw images of Google Earth. That team was led by Adam Fuchs, now Sqrrl's chief technology officer. Its twist on big data was to add 'cell-level security,' a way of requiring a passcode for each data point ... that's how software (like the infamous PRISM application) knows what can be shown only to people with top-secret clearance. Similar features could control access to data about U.S. citizens. 'A lot of the technology we put [in] is to protect rights," says Fuchs. Like other big-data projects, the NSA team's system, called Accumulo, was built on top of open-source code because "you don't want to have to replicate everything yourself," ... In 2011, the NSA released 200,000 lines of code to the Apache Foundation. When Atlas Venture's Lynch read about that, he jumped—here was a technology already developed, proven to work on tens of terabytes of data, and with security features sorely needed by heavily regulated health-care and banking customers.'"
This discussion has been archived. No new comments can be posted.

Spinoffs From Spyland: How Some NSA Technology Is Making Its Way Into Industry

Comments Filter:
  • Similar features could control access to data about U.S. citizens.

    Defund the NSA NOW. It is an abomination of what it was supposed to be and it is morally wrong for them to be doing what they are doing.

    A lot of the technology we put [in] is to protect rights

    Trust in you is gone. A promise like this is laughable.

  • by Gravis Zero ( 934156 ) on Sunday March 23, 2014 @06:35AM (#46556571)

    i suspected but looked it up anyway.

    A stovepipe is a system created to solve a specific problem

    • Re: (Score:3, Informative)

      by Marrow ( 195242 )

      Stovepiping was a technique used to arrive at a specific desired answer regardless of the facts. Gaming the system to get it to sign off on the wrong answer.

      • Sounds like that's the system you want to implement for law enforcement.

      • Re:stovepiping (Score:4, Informative)

        by cold fjord ( 826450 ) on Sunday March 23, 2014 @01:13PM (#46558103)

        Stovepipes are what emerges when you keep building single purpose systems without integrating them, and often with no thought of integration. It doesn't tend to be a good thing since related data can exist in different systems with no easy way to relate it. It has historically been a real problem in both government and industry.

        In short your answer is pure BS, or as you put it, "a specific desired answer regardless of the facts."

        • being used by the press to describe how intelligence was mishandled in the run-up to the Iraq war. In that context, it was being used interchangeably with the phrase "cherry picking" to describe gaming the system to get the desired result.

          • Two things. First, "stovepipes" has decades of use in describing the sort of IT systems mentioned in the article.

            Second, as far as I can see even when used in reference to intelligence it tends to be used in a generally similar manner, not as "cherry picking."

            There are several examples in the Wikipedia article [wikipedia.org] and they don't appear to support your usage. One might "cherry pick" data from a "stovepipe," but that isn't necessarily implied as far as I see.

            Stovepiping (also stove piping) is a metaphorical term which recalls a stovepipe's function as an isolated vertical conduit, and has been used, in the context of intelligence, to describe several ways in which raw intelligence information may be presented without proper context. It is a system created to solve a specific problem. The lack of context may be due to the specialized nature, or security requirements, of a particular intelligence collection technology. It also has limited focus and data within is not easily shared.

  • by Anonymous Coward

    A modification to popular open-source software licenses that prohibits using the licensed software for surveillance would be nice.

  • by Gravis Zero ( 934156 ) on Sunday March 23, 2014 @06:42AM (#46556589)

    In 2011, the NSA released 200,000 lines of code to the Apache Foundation.

    it may be time for people to start looking for the backdoors that the NSA may have put into Apache.

    • by LookIntoTheFuture ( 3480731 ) on Sunday March 23, 2014 @08:13AM (#46556813)

      In 2011, the NSA released 200,000 lines of code to the Apache Foundation.

      it may be time for people to start looking for the backdoors that the NSA may have put into Apache.

      You know what scares me most? Code obfuscation.

    • by cold fjord ( 826450 ) on Sunday March 23, 2014 @11:22AM (#46557543)

      In 2011, the NSA released 200,000 lines of code to the Apache Foundation.

      it may be time for people to start looking for the backdoors that the NSA may have put into Apache.

      I'm sure you wouldn't want another "disaster" like SELinux (also from NSA) would you?

    • In 2011, the NSA released 200,000 lines of code to the Apache Foundation.

      it may be time for people to start looking for the backdoors that the NSA may have put into Apache.

      When a /. post conflating Apache Foundation and Apache HTTP Server gets moderated up highly "Insightful", a hacker dies.

      Nobody has ever thought of scouring httpd, the "The Number One HTTP Server On The Internet", the most common application you'll find exposed directly to the Internet, for back doors or security vulnerabilities. No, nobody never thought of that, thanks for your insightful comment.

  • by Anonymous Coward

    Apache(TM) ......Now with 47% more backdoors!! Brought to you by the fine folks at the NSA's Tailored Access Program!

  • by Anonymous Coward on Sunday March 23, 2014 @07:13AM (#46556635)

    Yes, in the same way that my cat is compelled by my commands.

  • Patent attorneys and a marketing department?
    It has to be true because you can't make up shit like this.

  • So what? (Score:4, Insightful)

    by russotto ( 537200 ) on Sunday March 23, 2014 @08:07AM (#46556797) Journal

    Spinoffs from Nazi technology got us to the moon. That some good can come out of evil does not make the evil less evil.

    • by thoth ( 7907 )

      How is heck is this insightful?

      I thought Slashdot was the bastion of "technology is inherently neutral; anything can be used for various purposes and that doesn't make them bad". See previous argument as applied to guns, encryption, laser pointers, chemistry, hell scientific progress in general.

  • by morethanapapercert ( 749527 ) on Sunday March 23, 2014 @09:07AM (#46557001) Homepage
    Let me get this straight; the NSA (and the other three letter agencies it serves) are willing to blatantly and flagrantly violate the US Constitution, US law, international treaties, the trust of US allies and probably even the boy scout oath along the way, but it heeds the open source licensing model???

    I think there are a few problems with this:

    Like others have posted, the open source community is going to have to look at the released code very very carefully. The public has to assume that the NSA will include backdoors or obscure weaknesses if at all possible.

    The other half of this is how in the hell this release of code passed any internal security review in order to have the release authorized. If *I* were in charge of an intelligence agency, I certainly would use Open Source code when and where practical, but I would NOT submit my code to any third party external to my nations intelligence community. My reasoning is that any code my organization released could be used as clues to figure out my agencies capabilities and current operations. Even something as seemingly innocuous as the code for mandatory access restrictions could be helpful to an enemy because analysis of it would at least allow the enemy to rule out certain forms of attack.

    Oh sure, you could make the argument that releasing better code to the world makes everybody using that code base safer, depriving malicious agents of any existing exploits they have in their tool kits and that was probably among the reasons the NSA based its decision on. The problem I have with that argument is that, in other areas the NSA has proven that it is willing to deliberately weaken code that is in public use so as to add to their own tool kits. To fix existing weaknesses while also deliberately creating others seems illogical and self defeating to me...

    • > Like others have posted, the open source community is going to have to look at the released code very very carefully. The public has to assume that the NSA will include backdoors or obscure weaknesses if at all possible.

      And look for licensing violations. Various "open source" license models allow modifying and republishing software without publishing your modifications. But if they inserted back doors into, for example, GPL licensed software without publishing the back doors, they'd be violating the so

    • I hate to break this to you but the vast majority of what the NSA does is perfectly legal. Don't blame the NSA for the PATRIOT act and other absurd privacy violating laws. And feel free to educate me on what treaties they've violated.

    • by thoth ( 7907 )

      >violate the US Constitution, US law, international treaties, the trust of US allies

      Dude, they are an intelligence agency, what the fuck do you think they do? Except the constitutional violation part, that should be reigned in. Violate treaties and trust? Hello are you that naive? If you want to get all butthurt about US violations, start with the wars in Iraq and Afghanistan, which killed thousand, pissed away trillions, and had us take a dump on the world. That an intel agency is developing exploits -

  • Like other federal agencies, the NSA is compelled by law to try to commercialize its R&D.

    The closest thing I'm aware of is Bayh-Dole, which applies to grants from non-federal agencies. Such a policy would seem contrary to our philosophy on copyright regarding federal entities, which prohibits them from obtaining copyright on works created by the US government. I realize that copyright and patents are two different entities, but they have very similar intentions in their constitutional basis.

  • " 'A lot of the technology we put [in] is to protect rights," says Fuchs.

    Yeah, their right to read our data, and their right to control *who* gets to read our data.

    Anyone else notice the typo in their spokesman's name, Fuchs Yu?

  • Why should the government be licensing anything (the NSA no less)? It is not a commercial enterprise. Furthermore, it seems like the "technologies" at stake would be those that facilitate the kinds of illegal and unconstitutional activities that have been going on, unchecked, until Snowden exposed them.

Avoid strange women and temporary variables.

Working...