Spinoffs From Spyland: How Some NSA Technology Is Making Its Way Into Industry 44
An anonymous reader writes with this news from MIT's Technology Review: "Like other federal agencies, the NSA is compelled by law to try to commercialize its R&D. It employs patent attorneys and has a marketing department that is now trying to license inventions ... The agency claims more than 170 patents ... But the NSA has faced severe challenges trying to keep up with rapidly changing technology. ... Most recently, the NSA's revamp included a sweeping effort to dismantle ... 'stovepipes,' and switch to flexible cloud computing ... in 2008, NSA brass ordered the agency's computer and information sciences research organization to create a version of the system Google uses to store its index of the Web and the raw images of Google Earth. That team was led by Adam Fuchs, now Sqrrl's chief technology officer. Its twist on big data was to add 'cell-level security,' a way of requiring a passcode for each data point ... that's how software (like the infamous PRISM application) knows what can be shown only to people with top-secret clearance. Similar features could control access to data about U.S. citizens. 'A lot of the technology we put [in] is to protect rights," says Fuchs. Like other big-data projects, the NSA team's system, called Accumulo, was built on top of open-source code because "you don't want to have to replicate everything yourself," ... In 2011, the NSA released 200,000 lines of code to the Apache Foundation. When Atlas Venture's Lynch read about that, he jumped—here was a technology already developed, proven to work on tens of terabytes of data, and with security features sorely needed by heavily regulated health-care and banking customers.'"
Defund the NSA NOW (Score:1, Troll)
Similar features could control access to data about U.S. citizens.
Defund the NSA NOW. It is an abomination of what it was supposed to be and it is morally wrong for them to be doing what they are doing.
A lot of the technology we put [in] is to protect rights
Trust in you is gone. A promise like this is laughable.
stovepiping (Score:3)
i suspected but looked it up anyway.
A stovepipe is a system created to solve a specific problem
Re: (Score:3, Informative)
Stovepiping was a technique used to arrive at a specific desired answer regardless of the facts. Gaming the system to get it to sign off on the wrong answer.
Re: (Score:1)
Sounds like that's the system you want to implement for law enforcement.
Re:stovepiping (Score:4, Informative)
Stovepipes are what emerges when you keep building single purpose systems without integrating them, and often with no thought of integration. It doesn't tend to be a good thing since related data can exist in different systems with no easy way to relate it. It has historically been a real problem in both government and industry.
In short your answer is pure BS, or as you put it, "a specific desired answer regardless of the facts."
No, my definition is based on how the word is (Score:2)
being used by the press to describe how intelligence was mishandled in the run-up to the Iraq war. In that context, it was being used interchangeably with the phrase "cherry picking" to describe gaming the system to get the desired result.
Re: (Score:2)
Two things. First, "stovepipes" has decades of use in describing the sort of IT systems mentioned in the article.
Second, as far as I can see even when used in reference to intelligence it tends to be used in a generally similar manner, not as "cherry picking."
There are several examples in the Wikipedia article [wikipedia.org] and they don't appear to support your usage. One might "cherry pick" data from a "stovepipe," but that isn't necessarily implied as far as I see.
Stovepiping (also stove piping) is a metaphorical term which recalls a stovepipe's function as an isolated vertical conduit, and has been used, in the context of intelligence, to describe several ways in which raw intelligence information may be presented without proper context. It is a system created to solve a specific problem. The lack of context may be due to the specialized nature, or security requirements, of a particular intelligence collection technology. It also has limited focus and data within is not easily shared.
Software licence change (Score:1, Insightful)
A modification to popular open-source software licenses that prohibits using the licensed software for surveillance would be nice.
Re: (Score:3)
This is infeasible. Network tools like "tripwire" have powerful, legitimate uses.
Time for a code review? (Score:5, Insightful)
In 2011, the NSA released 200,000 lines of code to the Apache Foundation.
it may be time for people to start looking for the backdoors that the NSA may have put into Apache.
Re:Time for a code review? (Score:4, Interesting)
In 2011, the NSA released 200,000 lines of code to the Apache Foundation.
it may be time for people to start looking for the backdoors that the NSA may have put into Apache.
You know what scares me most? Code obfuscation.
Re:Time for a code review? (Score:5, Insightful)
Or they could simply discard the code from the NSA on security / espionage grounds.
The code that is obviously the NSA's contribution is not the back door. The back door likely would leverage some edge case created by their contributions, or another part of the system altogether while the NSA part is fully legit. Attributing the secret agencies goodwill is a huge part of disinformation and image management to convince people to accept the FBI & NSA anti-activism campaign. [wikipedia.org]
Perhaps it would be something like this:
// Change the file permission.
// ...
// Current user is now root priveledged.
if ( option == CHANGE_OWNER && sessionState == VALID && user = ROOT ) {
}
A single equal char is missing, it looks like it could be a legitimate mistake. Perfect plausible deniability. Such would be contributed by someone else who seems innocuous. Perhaps even by a change nearby which happens to change the formatting or constant name, and thus the logic change is easier to miss.
Point being, it really doesn't matter either way. They won't admit to all the shit they do, and have a long history of being against the populace, even committing illegal acts. So, the only answer is to demand eradication of secrecy in governance. Otherwise the people can never know whether their government is or is not operating in the best interest of citizens. [theguardian.com] We shouldn't have to wonder if their concern is just lies to manufacture consent for a more draconian dystopia; We should be able to prove our governments are not acting against us.
Re:Time for a code review? (Score:4, Interesting)
In 2011, the NSA released 200,000 lines of code to the Apache Foundation.
it may be time for people to start looking for the backdoors that the NSA may have put into Apache.
I'm sure you wouldn't want another "disaster" like SELinux (also from NSA) would you?
Re: (Score:2)
In 2011, the NSA released 200,000 lines of code to the Apache Foundation.
it may be time for people to start looking for the backdoors that the NSA may have put into Apache.
When a /. post conflating Apache Foundation and Apache HTTP Server gets moderated up highly "Insightful", a hacker dies.
Nobody has ever thought of scouring httpd, the "The Number One HTTP Server On The Internet", the most common application you'll find exposed directly to the Internet, for back doors or security vulnerabilities. No, nobody never thought of that, thanks for your insightful comment.
InfoTourettes announce partnership with the NSA! (Score:1)
http://news.slashdot.org/comme... [slashdot.org]
New and improved!!! (Score:1)
Apache(TM) ......Now with 47% more backdoors!! Brought to you by the fine folks at the NSA's Tailored Access Program!
"the NSA is compelled by law" (Score:5, Funny)
Yes, in the same way that my cat is compelled by my commands.
WTF (Score:2)
Patent attorneys and a marketing department?
It has to be true because you can't make up shit like this.
So what? (Score:4, Insightful)
Spinoffs from Nazi technology got us to the moon. That some good can come out of evil does not make the evil less evil.
Re: (Score:3)
How is heck is this insightful?
I thought Slashdot was the bastion of "technology is inherently neutral; anything can be used for various purposes and that doesn't make them bad". See previous argument as applied to guns, encryption, laser pointers, chemistry, hell scientific progress in general.
break laws but not licenses? (Score:3, Interesting)
I think there are a few problems with this:
Like others have posted, the open source community is going to have to look at the released code very very carefully. The public has to assume that the NSA will include backdoors or obscure weaknesses if at all possible.
The other half of this is how in the hell this release of code passed any internal security review in order to have the release authorized. If *I* were in charge of an intelligence agency, I certainly would use Open Source code when and where practical, but I would NOT submit my code to any third party external to my nations intelligence community. My reasoning is that any code my organization released could be used as clues to figure out my agencies capabilities and current operations. Even something as seemingly innocuous as the code for mandatory access restrictions could be helpful to an enemy because analysis of it would at least allow the enemy to rule out certain forms of attack.
Oh sure, you could make the argument that releasing better code to the world makes everybody using that code base safer, depriving malicious agents of any existing exploits they have in their tool kits and that was probably among the reasons the NSA based its decision on. The problem I have with that argument is that, in other areas the NSA has proven that it is willing to deliberately weaken code that is in public use so as to add to their own tool kits. To fix existing weaknesses while also deliberately creating others seems illogical and self defeating to me...
Re: (Score:3)
> Like others have posted, the open source community is going to have to look at the released code very very carefully. The public has to assume that the NSA will include backdoors or obscure weaknesses if at all possible.
And look for licensing violations. Various "open source" license models allow modifying and republishing software without publishing your modifications. But if they inserted back doors into, for example, GPL licensed software without publishing the back doors, they'd be violating the so
Re: (Score:2)
I hate to break this to you but the vast majority of what the NSA does is perfectly legal. Don't blame the NSA for the PATRIOT act and other absurd privacy violating laws. And feel free to educate me on what treaties they've violated.
Re: (Score:2)
>violate the US Constitution, US law, international treaties, the trust of US allies
Dude, they are an intelligence agency, what the fuck do you think they do? Except the constitutional violation part, that should be reigned in. Violate treaties and trust? Hello are you that naive? If you want to get all butthurt about US violations, start with the wars in Iraq and Afghanistan, which killed thousand, pissed away trillions, and had us take a dump on the world. That an intel agency is developing exploits -
I must have missed that law: (Score:2)
The closest thing I'm aware of is Bayh-Dole, which applies to grants from non-federal agencies. Such a policy would seem contrary to our philosophy on copyright regarding federal entities, which prohibits them from obtaining copyright on works created by the US government. I realize that copyright and patents are two different entities, but they have very similar intentions in their constitutional basis.
Whose rights does the NSA protect? (Score:2)
" 'A lot of the technology we put [in] is to protect rights," says Fuchs.
Yeah, their right to read our data, and their right to control *who* gets to read our data.
Anyone else notice the typo in their spokesman's name, Fuchs Yu?
Licensing? (Score:2)
Why should the government be licensing anything (the NSA no less)? It is not a commercial enterprise. Furthermore, it seems like the "technologies" at stake would be those that facilitate the kinds of illegal and unconstitutional activities that have been going on, unchecked, until Snowden exposed them.