Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged supercomputers

Rss Feed Group items tagged

Paul Merrell

The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Leve... - 0 views

    • Paul Merrell
       
      There goes the neighborhood; the Feds are moving in. 
  • According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.
  • In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas. It has created a supercomputer of almost unimaginable speed to look for patterns and unscramble codes. Finally, the agency has begun building a place to store all the trillions of words and thoughts and whispers captured in its electronic net. And, of course, it’s all being done in secret.
  • ...8 more annotations...
  • as a 2007 Department of Defense report puts it, the Pentagon is attempting to expand its worldwide communications network, known as the Global Information Grid, to handle yottabytes (1024 bytes) of data. (A yottabyte is a septillion bytes—so large that no one has yet coined a term for the next higher magnitude.) It needs that capacity because, according to a recent report by Cisco, global Internet traffic will quadruple from 2010 to 2015, reaching 966 exabytes per year. (A million exabytes equal a yottabyte.
  • The data stored in Bluffdale will naturally go far beyond the world’s billions of public web pages. The NSA is more interested in the so-called invisible web, also known as the deep web or deepnet—data beyond the reach of the public. This includes password-protected data, US and foreign government communications, and noncommercial file-sharing between trusted peers.
  • The broad outlines of the so-called warrantless-wiretapping program have long been exposed—how the NSA secretly and illegally bypassed the Foreign Intelligence Surveillance Court, which was supposed to oversee and authorize highly targeted domestic eavesdropping; how the program allowed wholesale monitoring of millions of American phone calls and email. In the wake of the program’s exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits. What wasn’t revealed until now, however, was the enormity of this ongoing domestic spying program. For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail.
  • one of the deepest secrets of the Stellar Wind program—again, never confirmed until now—was that the NSA gained warrantless access to AT&T’s vast trove of domestic and international billing records, detailed information about who called whom in the US and around the world. As of 2007, AT&T had more than 2.8 trillion records housed in a database at its Florham Park, New Jersey, complex. Verizon was also part of the program
  • the NSA succeeded in building an even faster supercomputer. “They made a big breakthrough,” says another former senior intelligence official, who helped oversee the program. The NSA’s machine was likely similar to the unclassified Jaguar, but it was much faster out of the gate, modified specifically for cryptanalysis and targeted against one or more specific algorithms, like the AES.
  • The breakthrough was enormous, says the former official, and soon afterward the agency pulled the shade down tight on the project, even within the intelligence community and Congress. “Only the chairman and vice chairman and the two staff directors of each intelligence committee were told about it,” he says. The reason? “They were thinking that this computing breakthrough was going to give them the ability to crack current public encryption.”
  • But the real competition will take place in the classified realm. To secretly develop the new exaflop (or higher) machine by 2018, the NSA has proposed constructing two connecting buildings, totaling 260,000 square feet, near its current facility on the East Campus of Oak Ridge. Called the Multiprogram Computational Data Center,
  • n the meantime Cray is working on the next step for the NSA, funded in part by a $250 million contract with the Defense Advanced Research Projects Agency. It’s a massively parallel supercomputer called Cascade, a prototype of which is due at the end of 2012. Its development will run largely in parallel with the unclassified effort for the DOE and other partner agencies. That project, due in 2013, will upgrade the Jaguar XT5 into an XK6, codenamed Titan, upping its speed to 10 to 20 petaflops.
Gary Edwards

Liberty's backlash -- why we should be grateful to Edward Snowden | Fox News - 1 views

  •  
    Liberty's backlash -- why we should be grateful to Edward Snowden By Judge Andrew P. Napolitano Published August 01, 2013 FoxNews.com Last week, Justin Amash, the two-term libertarian Republican congressman from Michigan, joined with John Conyers, the 25-term liberal Democratic congressman from the same state, to offer an amendment to legislation funding the National Security Agency (NSA). If enacted, the Amash-Conyers amendment would have forced the government's domestic spies when seeking search warrants to capture Americans' phone calls, texts and emails first to identify their targets and produce evidence of their terror-related activities before a judge may issue a warrant. The support they garnered had a surprising result that stunned the Washington establishment. It almost passed. The final vote, in which the Amash-Conyers amendment was defeated by 205 to 217, was delayed for a few hours by the House Republican leadership, which opposed the measure. The Republican leadership team, in conjunction with President Obama and House Minority Leader Nancy Pelosi, needed more time for arm-twisting so as to avoid a humiliating loss. But the House rank-and-file did succeed in sending a message to the big-government types in both parties: Nearly half of the House of Representatives has had enough of government spying and then lying about it, and understands that spying on every American simply cannot withstand minimal legal scrutiny or basic constitutional analysis. The president is deeply into this and no doubt wishes he wasn't. He now says he welcomed the debate in the House on whether his spies can have all they want from us or whether they are subject to constitutional requirements for their warrants. Surely he knows that the Supreme Court has ruled consistently since the time of the Civil War that the government is always subject to the Constitution, wherever it goes and whatever it does. As basic as that sounds, it is not a universally held belief am
Paul Merrell

N.S.A. Able to Foil Basic Safeguards of Privacy on Web - NYTimes.com - 1 views

  • The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.
  • The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.
  • The N.S.A. hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.
  • ...11 more annotations...
  • “For the past decade, N.S.A. has led an aggressive, multipronged effort to break widely used Internet encryption technologies,” said a 2010 memo describing a briefing about N.S.A. accomplishments for employees of its British counterpart, Government Communications Headquarters, or GCHQ. “Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.”
  • Some of the agency’s most intensive efforts have focused on the encryption in universal use in the United States, including Secure Sockets Layer, or SSL; virtual private networks, or VPNs; and the protection used on fourth-generation, or 4G, smartphones. Many Americans, often without realizing it, rely on such protection every time they send an e-mail, buy something online, consult with colleagues via their company’s computer network, or use a phone or a tablet on a 4G network.
  • For at least three years, one document says, GCHQ, almost certainly in collaboration with the N.S.A., has been looking for ways into protected traffic of popular Internet companies: Google, Yahoo, Facebook and Microsoft’s Hotmail. By 2012, GCHQ had developed “new access opportunities” into Google’s systems, according to the document. (Google denied giving any government access and said it had no evidence its systems had been breached).
  • Paul Kocher, a leading cryptographer who helped design the SSL protocol, recalled how the N.S.A. lost the heated national debate in the 1990s about inserting into all encryption a government back door called the Clipper Chip. “And they went and did it anyway, without telling anyone,” Mr. Kocher said. He said he understood the agency’s mission but was concerned about the danger of allowing it unbridled access to private information.
  • The documents are among more than 50,000 shared by The Guardian with The New York Times and ProPublica, the nonprofit news organization. They focus on GCHQ but include thousands from or about the N.S.A. Intelligence officials asked The Times and ProPublica not to publish this article, saying it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read. The news organizations removed some specific facts but decided to publish the article because of the value of a public debate about government actions that weaken the most powerful privacy tools.
  • The files show that the agency is still stymied by some encryption, as Mr. Snowden suggested in a question-and-answer session on The Guardian’s Web site in June. “Properly implemented strong crypto systems are one of the few things that you can rely on,” he said, though cautioning that the N.S.A. often bypasses the encryption altogether by targeting the computers at one end or the other and grabbing text before it is encrypted or after it is decrypted.
  • Because strong encryption can be so effective, classified N.S.A. documents make clear, the agency’s success depends on working with Internet companies — by getting their voluntary collaboration, forcing their cooperation with court orders or surreptitiously stealing their encryption keys or altering their software or hardware.
  • At Microsoft, as The Guardian has reported, the N.S.A. worked with company officials to get pre-encryption access to Microsoft’s most popular services, including Outlook e-mail, Skype Internet phone calls and chats, and SkyDrive, the company’s cloud storage service.
  • Simultaneously, the N.S.A. has been deliberately weakening the international encryption standards adopted by developers. One goal in the agency’s 2013 budget request was to “influence policies, standards and specifications for commercial public key technologies,” the most common encryption method. Cryptographers have long suspected that the agency planted vulnerabilities in a standard adopted in 2006 by the National Institute of Standards and Technology and later by the International Organization for Standardization, which has 163 countries as members. Classified N.S.A. memos appear to confirm that the fatal weakness, discovered by two Microsoft cryptographers in 2007, was engineered by the agency. The N.S.A. wrote the standard and aggressively pushed it on the international group, privately calling the effort “a challenge in finesse.” “Eventually, N.S.A. became the sole editor,” the memo says.
  • But the agencies’ goal was to move away from decrypting targets’ tools one by one and instead decode, in real time, all of the information flying over the world’s fiber optic cables and through its Internet hubs, only afterward searching the decrypted material for valuable intelligence. A 2010 document calls for “a new approach for opportunistic decryption, rather than targeted.” By that year, a Bullrun briefing document claims that the agency had developed “groundbreaking capabilities” against encrypted Web chats and phone calls. Its successes against Secure Sockets Layer and virtual private networks were gaining momentum.
  • Ladar Levison, the founder of Lavabit, wrote a public letter to his disappointed customers, offering an ominous warning. “Without Congressional action or a strong judicial precedent,” he wrote, “I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.”
  •  
    Lengthy article, lots of new information on NSA decryption capabilities, none of it good for those who value their data privacy.
  •  
    Thanks Paul - nice job cutting this monster down to size :)
Paul Merrell

WA State Bill Proposes Criminalizing Help to NSA, Turning Off Resources to Yakima Facil... - 0 views

  • The state level campaign to turn off power and electricity to the NSA got a big boost Wednesday. In a bipartisan effort, Washington became first state with a physical NSA location to consider the Fourth Amendment Protection Act, designed to make life extremely difficult for the massive spy agency. Rep. David Taylor (R-Moxee) and Rep Rep. Luis Moscoso (D- Mountlake Terrace) introduced HB2272 late Tuesday night. Based on model language drafted by the OffNow coalition, it would make it the policy of Washington “to refuse material support, participation, or assistance to any federal agency which claims the power, or with any federal law, rule, regulation, or order which purports to authorize, the collection of electronic data or metadata of any person pursuant to any action not based on a warrant.” Practically speaking, the bill prohibits state and local agencies from providing any material support to the NSA within their jurisdiction. This includes barring government-owned utilities from providing water and electricity. It makes information gathered without a warrant by the NSA and shared with law enforcement inadmissible in state court. It blocks public universities from serving as NSA research facilities or recruiting grounds. And it disincentivizes corporations attempting to fill needs not met in the absence of state cooperation.
  • The state level campaign to turn off power and electricity to the NSA got a big boost Wednesday. In a bipartisan effort, Washington became first state with a physical NSA location to consider the Fourth Amendment Protection Act, designed to make life extremely difficult for the massive spy agency. Rep. David Taylor (R-Moxee) and Rep Rep. Luis Moscoso (D- Mountlake Terrace) introduced HB2272 late Tuesday night. Based on model language drafted by the OffNow coalition, it would make it the policy of Washington “to refuse material support, participation, or assistance to any federal agency which claims the power, or with any federal law, rule, regulation, or order which purports to authorize, the collection of electronic data or metadata of any person pursuant to any action not based on a warrant.” Practically speaking, the bill prohibits state and local agencies from providing any material support to the NSA within their jurisdiction. This includes barring government-owned utilities from providing water and electricity. It makes information gathered without a warrant by the NSA and shared with law enforcement inadmissible in state court. It blocks public universities from serving as NSA research facilities or recruiting grounds. And it disincentivizes corporations attempting to fill needs not met in the absence of state cooperation.
  • Lawmakers in Oklahoma, California and Indiana have already introduced similar legislation, and a senator in Arizona has committed to running it there, but Washington counts as the first state with an actual NSA facility within its borders to consider the Fourth Amendment Protection Act. The NSA operates a listening center on the Army’s Yakima Training Center (YTC). The NSA facility is in Taylor’s district, and he said he cannot sit idly by while a secretive facility in his own backyard violate the rights of people everywhere. “We’re running the bill to provide protection against the ever increasing surveillance into the daily lives of our citizens,” he said. “Our Founding Fathers established a series of checks and balances in the Constitution. Given the federal government’s utter failure to address the people’s concerns, it’s up to the states to stand for our citizens’ constitutional rights.”
  • ...3 more annotations...
  • According to documents made public by the US Military, as of 2008, a company called PacifiCorp serves as the primary supplier of electric power, and Cascade Natural Gas Corporation supplies natural gas to YTC. The Kittitas Public Utility District, a function of the state of Washington, provides electric power for the MPRC and the Doris site, but no documentation has yet proven that it also provides electricity used directly by the NSA facility on site. And while YTC does provide a bulk of its own water, documents also show that some of it gets there by first passing through upstream dams owned and operated by the State. The Army report states, “YTC lies within three WAUs whose boundaries coincide with WRIAs, as defined by the State of Washington natural resource agencies.” WAU’s are Washington State Water Administration Units. WRIAs are Washington State Water Resource Inventory Areas A Washington company also has a strong link to the NSA. Cray Inc. builds supercomputers for the agency.
  • If the bill passes, it would set in motion actions to stop any state support of the Yakima center as long as it remains in the state, and could make Cray ineligible for any contracts with the state or its political subdivisions. Three public universities in Washington join 166 schools nationwide partnering with the NSA. Taylor’s bill would address these schools’ status as NSA “Centers of Academic Excellence,” and would bar any new partnerships with other state colleges or universities. Tenth Amendment Center national communications director Mike Maharrey says the bills prohibition against using unconstitutionally gathered data in state court would probably have the most immediate impact. In fact, lawmakers in Kansas and Missouri will consider bills simply addressing this kind of data sharing.
  • “We know the NSA shares data with state and local law enforcement. We know from a Reuters report that most of this shared data has absolutely nothing to do with national security issues. This bill would make that information inadmissible in state court,” he said. “This data sharing shoves a dagger into the heart of the Fourth Amendment. This bill would stop that from happening. This is a no-brainer. Every state should do it.” Maharrey said he expects at least three more states to introduce the act within the next few weeks. “This idea is catching fire,” he said. “And why wouldn’t it? We have an out of control agency spying on virtually everybody in the world. We have a president and a Congress that appears poised to maybe put a band aid on it. Americans are realizing if we are going to slow down the NSA, we are going to have to take a different approach. This is it.”
Paul Merrell

Cut Off the NSA's Juice | Global Research - 0 views

  • The National Security Agency depends on huge computers that guzzle electricity in the service of the surveillance state. For the NSA’s top executives, maintaining a vast flow of juice to keep Big Brother nourished is essential — and any interference with that flow is unthinkable. But interference isn’t unthinkable. And in fact, it may be doable. Grassroots activists have begun to realize the potential to put the NSA on the defensive in nearly a dozen states where the agency is known to be running surveillance facilities, integral to its worldwide snoop operations. Organizers have begun to push for action by state legislatures to impede the electric, water and other services that sustain the NSA’s secretive outposts.
  • Those efforts are farthest along in the state of Washington, where a new bill in the legislature — the Fourth Amendment Protection Act — is a statutory nightmare for the NSA. The agency has a listening post in Yakima, in the south-central part of the state. The bill throws down a challenge to the NSA, seeking to block all state support for NSA activities violating the Fourth Amendment. For instance, that could mean a cutoff of electricity or water or other state-government services to the NSA site. And the measure also provides for withholding other forms of support, such as research and partnerships with state universities. Here’s the crux of the bill: “It is the policy of this state to refuse material support, participation, or assistance to any federal agency which claims the power, or with any federal law, rule, regulation, or order which purports to authorize, the collection of electronic data or metadata of any person pursuant to any action not based on a warrant that particularly describes the person, place, and thing to be searched or seized.” If the windup of that long sentence has a familiar ring, it should. The final dozen words are almost identical to key phrases in the Fourth Amendment of the U.S. Constitution.
  • In recent days, more than 15,000 people have signed a petition expressing support for the legislation. Launched by RootsAction.org, the petition is addressed to the bill’s two sponsors in the Washington legislature — Republican Rep. David Taylor, whose district includes the NSA facility in Yakima, and Democrat Luis Moscoso from the Seattle area. Meanwhile, a similar bill with the same title has just been introduced in the Tennessee legislature — taking aim at the NSA’s center based in Oak Ridge, Tenn. That NSA facility is a doozy: with several hundred scientists and computer specialists working to push supercomputers into new realms of mega-surveillance capacities. A new coalition, OffNow, is sharing information about model legislation. The group also points to known NSA locations in other states including Utah (in Bluffdale), Texas (San Antonio), Georgia (Augusta), Colorado (Aurora), Hawaii (Oahu) and West Virginia (Sugar Grove), along with the NSA’s massive headquarters at Fort Meade in Maryland. Grassroots action and legislative measures are also stirring in several of those states.
  • ...2 more annotations...
  • “By working together to tackle the erosion of the Fourth Amendment presented by bulk data collection,” Kellegrew said, “people from across partisan divides are resurrecting the lost art of collaboration and in the process, rehabilitating the possibility of a functional American political dialogue denied to the people by dysfunction majority partisan hackery.” From another vantage point, this is an emerging faceoff between reliance on cynical violence and engagement in civic nonviolence.
  • Serving the warfare state and overall agendas for U.S. global dominance to the benefit of corporate elites, the NSA persists in doing violence to the Constitution’s civil-liberties amendments — chilling the First, smashing the Fourth and end-running the Fifth. Meanwhile, a nascent constellation of movements is striving to thwart the surveillance state, the shadowy companion of perpetual war. This is a struggle for power over what kind of future can be created for humanity. It’s time to stop giving juice to Big Brother.
Paul Merrell

Remarks by Director David H. Petraeus at In-Q-Tel CEO Summit - Central Intelligence Agency - 0 views

  • In any event, our partnership with In-Q-Tel is essential to helping identify and deliver groundbreaking technologies with mission-critical applications to the CIA and to our partner agencies.
  • As you know, our Agency has a global charter to collect intelligence. It’s our job to ensure that challenges that arise in any corner of the world are not surprises to the President or to other policymakers. Certainly, we will continue relentlessly to pursue terrorists and support the troops in several different theaters. That is imperative, and the last year has seen considerable achievement in the fight against al-Qa‘ida and its affiliates. But, to use the kids’ soccer analogy, we cannot turn the counterterrorist fight into a game of magnetball, in which the leadership is always focused on the counterterror mission. Everyone can’t flock to the ball and lose sight of the rest of the field—the whole rest of the world. And it’s an enormous field to cover:  again, the whole world, with proliferation of weapons and technology, cyber threats, counterintelligence threats, the next developments in the evolution of the Arab Spring, Iran, North Korea, China, illegal narcotics, emerging powers, non-state organizations, and even lone wolves. Our duty is nothing less than to be on top of every potential foreign challenge and opportunity facing the United States—and we now have to do it without the steady budget growth we saw in the years after 9/11. And this is why my job is so intellectually stimulating.
  • First, given the digital transparency I just mentioned, we have to rethink our notions of identity and secrecy. In the digital world, data is everywhere, as you all know well. Data is created constantly, often unknowingly and without permission. Every byte left behind reveals information about location, habits, and, by extrapolation, intent and probable behavior. The number of data points that can be collected is virtually limitless—presenting, of course, both enormous intelligence opportunities and equally large counterintelligence challenges. We must, for example, figure out how to protect the identity of our officers who increasingly have a digital footprint from birth, given that proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come. Moreover, we have to figure out how to create the digital footprint for new identities for some officers. As you all know, exploiting the intelligence opportunities—which is an easier subject to discuss in an unclassified setting than the counterintelligence challenges—will require a new class of in-place and remote sensors that operate across the electromagnetic spectrum. Moreover, these sensors will be increasingly interconnected.
  • ...2 more annotations...
  • The current “Internet of PCs” will move, of course, toward an “Internet of Things”—of devices of all types—50 to 100 billion of which will be connected to the Internet by 2020. As you know, whereas machines in the 19th century learned to do, and those in the 20th century learned to think at a rudimentary level, in the 21st century, they are learning to perceive—to actually sense and respond. Key applications developed by our In-Q-Tel investment companies are focused on technologies that are driving the Internet of Things. These include: Item identification, or devices engaged in tagging; Sensors and wireless sensor networks—devices that indeed sense and respond; Embedded systems—those that think and evaluate; And, finally, nanotechnology, allowing these devices to be small enough to function virtually anywhere.
  • Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters—all connected to the next-generation Internet using abundant, low cost, and high-power computing—the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing. In practice, these technologies could lead to rapid integration of data from closed societies and provide near-continuous, persistent monitoring of virtually anywhere we choose. “Transformational” is an overused word, but I do believe it properly applies to these technologies, particularly to their effect on clandestine tradecraft. Taken together, these developments change our notions of secrecy and create innumerable challenges—as well as opportunities.
  •  
    I missed this gem before, from March 1, 2012. Speech by then-CIA chief Gen. David Patraeus to a group of reps. from ICT startups who are employed by CIA through its In-Q-Tel technology development non-profit corp. See https://www.iqt.org/about-iqt/ Patraeus announces that the Internet of Things (devices of all kinds) is becoming an intelligence target. And that boils down to everything from your clock radio to your home's climate control system and more becoming a potential intelligence source. If the CIA is investing in this, you can bit your bippy that NSA is too; Patraeus mentions that "partner agencies" are also receiving applications via the In-Q-Tel investments.  Finally, Patraeus also acknowledges that the intelligence mission extends far beyond counter-terrorism, offering some detail. So it seems that before the Snowden leaks his the press, the intelligence mission was not all about counter-terrorism.
Paul Merrell

ITAR-TASS: Economy - Russia wants to replace US computer chips with local processors - 0 views

  • MOSCOW, June 19. /ITAR-TASS/. Russia’s Industry and Trade Ministry plans to replace US microchips Intel and AMD, used in government’s computers, with domestically-produced micro processor Baikal in a project worth dozens of millions of dollars, business daily Kommersant reported Thursday. The Baikal micro processor will be designed by a unit of T-Platforms, a producer of supercomputers, next year, with support from state defense conglomerate Rostec and co-financing by state-run technological giant Rosnano.
  • The first products will be Baikal M and M/S chips, designed on the basis of 64-bit nucleus Cortex A-57 made by UK company ARM, with frequency of 2 gigahertz for personal computers and micro servers. The Baikal chips will be installed on computers of government bodies and in state-run firms, which purchase some 700,000 personal computers annually worth $500 million and 300,000 servers worth $800 million. The total volume of the market amounts to about 5 million devices worth $3.5 billion.
  •  
    Wish there was more detail. Is this to save money, to protect from NSA intrusion, to lessen dependence on a U.S.-controlled critical technology, to wage economic warfare against the U.S., other?
1 - 7 of 7
Showing 20 items per page