Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
United States Government Privacy The Internet Your Rights Online

Treasure Map: NSA, GCHQ Work On Real-Time "Google Earth" Internet Observation 267

wabrandsma) writes with the latest accusations about NSA spying activity in Germany. According to top-secret documents from the NSA and the British agency GCHQ, the intelligence agencies are seeking to map the entire Internet.
Furthermore, every single end device that is connected to the Internet somewhere in the world — every smartphone, tablet and computer — is to be made visible. Such a map doesn't just reveal one treasure. There are millions of them. The breathtaking mission is described in a Treasure Map presentation from the documents of the former intelligence service employee Edward Snowden which SPIEGEL has seen. It instructs analysts to "map the entire Internet — Any device, anywhere, all the time." Treasure Map allows for the creation of an "interactive map of the global Internet" in "near real-time," the document notes. Employees of the so-called "FiveEyes" intelligence agencies from Great Britain, Canada, Australia and New Zealand, which cooperate closely with the American agency NSA, can install and use the program on their own computers. One can imagine it as a kind of Google Earth for global data traffic, a bird's eye view of the planet's digital arteries.
This discussion has been archived. No new comments can be posted.

Treasure Map: NSA, GCHQ Work On Real-Time "Google Earth" Internet Observation

Comments Filter:
  • by Anonymous Coward on Sunday September 14, 2014 @08:22PM (#47904821)

    The last 4 or 5 major disclosures from Snowden documents have gone unreported in the mainstream US press. Sure, you can find them on some more off the path sites, but the mainstream press has moved on. It's not as important as (from current CNN site): "Is this a spaceship or super mall?", or "5 ways to think yourself well!"

    As far as the vast, vast majority of the public is concerned, it's over. Forgotten. Our cultural attention span was exhausted, and nothing happened. The chance of serious change now - like disbanding the organization and arresting those responsible for widespread constitutional violations - is now zero.

    And they know it.

    • What they don't tell you is anyone can do this in a few hours with a port scanner, at least the IP4 flavor of cyberspace.
    • by AHuxley ( 892839 ) on Sunday September 14, 2014 @08:48PM (#47904925) Journal
      The good news is people meeting the press are more aware of having their cell phone on or powered and with them.
      The press can now understand that turning off a phone can be seen as getting ready to meet a contact.
      Anyone in the same area at the same time who turns off their phone might be that contact. Kind of a short list :)
      The press is more aware of been under constant surveillance.
      Treasure Map just adds to the collect it all idea and that digital entry or exit points can be fully reconstructed or are always been tracked.
      Thats a lot of expensive effort to put into signals intelligence considering what most skilled nations fully understood about global telephone and computer networks going back over decades.
    • by Anonymous Coward

      The chance of serious change now - like disbanding the organization and arresting those responsible for widespread constitutional violations - is now zero.

      There was and still is a chance of serious change. There was and still is essentially no chance of NSA being disbanded and all its members being frog marched out in handcuffs. That is a silly fantasy based on a basic misunderstanding of the Constitution, statutory law, the courts, the political process, and plenty of other things.

    • by Mashiki ( 184564 )

      You think it started with this? US media didn't even want to report on the issues with Obama, rather all they wanted to do was sing about his racial background without doing any digging. Media in the US has long since moved from "providing information and letting you make a choice" to "telling you their point of view, framed as news." This is why Journolist [wikipedia.org] existed.

      As for cultural attention span being exhausted? Hah no. Rather the media is doing it's best to try and change the viewpoint on anything tha

    • by gweihir ( 88907 )

      Fits. The rest of the world is better, fortunately. The US is looking more and more like everybodies enemy.

      • by dryeo ( 100693 )

        Some of our governments look at what the USA is doing and salivate and of course the rest of the 5 eyes play right along.

    • Is that why you trolls are here in full force? Because your handlers think no-one cares? Yet here you paid fucks are here shilling lies, just like always. Fuck you, you lose. Collect your paycheck and kill yourself. You'll be doing a favor to anyone who values the truth.
    • by AmiMoJo ( 196126 ) *

      We have known for a long time that the war won't be won by convincing governments to behave and hold those responsible accountable. We have to fix the internet by making it secure and mass surveillance too expensive or impractical. As long as engineers pay attention there is still hope.

      What worries me is that Der Spiegel contacted the victims and they said they couldn't find any problems. Maybe GCHQ/NSA backed off, knowing they were likely to be discovered now. Maybe they just couldn't find the bugged hardw

  • Looking at where all data enters and exits the internet (www or the World Wide Wiretap)
    Wifi, VPN, implanted OS or hardware devices, pubic, private, down to MAC address as expected.
    Sorting by Infected hosts or Tor router?
    All part of collect it all :)
  • by BarbaraHudson ( 3785311 ) <<barbara.jane.hudson> <at> <icloud.com>> on Sunday September 14, 2014 @08:53PM (#47904949) Journal

    Too Much Information (TMI) can be as big a problem as too little information.

    With all that information, you can get a false sense of security that you know enough and get bitten.

    With all that information, you tend to focus on what you see and not what you don't - you develop tunnel vision.

    With all that information, resources that could have been devoted elsewhere are taken up sorting out the trash and the false positives.

    Blank spots stay blank. Example - Android phones have had NFC since Gingerbread, so if two operatives want to exchange data (photos of a target, NSA documents, etc), they can do it in person just by using Android Beam or Bump-to-Exchange, without saying a word to each other, just standing in line to pay for a newspaper.

    • The Internet of Things will be of help for this. We need hacks so that everything sends out random information. If they want information, let's drown them in a sea of it.

      • THIS! I love this idea!
        Your friend,
        Verizon
      • Start now - install orbot onto your android phone, and make sure it's set to start at boot time. Even if you don't pipe any information down the proxy, at least there'll be yet another Tor log on going on that they have to watch.

    • by AHuxley ( 892839 )
      Nations can just use their number stations. One time pads and decades of very safe trusted sleeper agents are promoted.
      Signals gathering expects the world to be using this generations ww2 ENIGMA like network over decades - tame telco crypto networks and internet will bring back lots of useful data as all other nations are not careful.
      The interview with whistleblower William Binney: 'The NSA's main motives: power and money' (19.08.2014)
      http://www.dw.de/binney-the-ns... [www.dw.de]
      "Money. It takes a lot of money
    • by gweihir ( 88907 )

      TMI is only a problem is you do not know whom to target. If you want, say, to eliminate a political activist or a foreign corporation, targeting is easy and TMI does not apply. Or if, in the longer term, you want some not conservative enough person from becoming president or a supreme-court judge, all the information is easily accessible and these people can be stopped without the public even knowing. Sounds scary? This is a primary reason to establish a surveillance state: Retaining power and undermining t

    • Blank spots stay blank. Example - Android phones have had NFC since Gingerbread, so if two operatives want to exchange data (photos of a target, NSA documents, etc), they can do it in person just by using Android Beam or Bump-to-Exchange, without saying a word to each other, just standing in line to pay for a newspaper.

      \ Or you can, you know, just swap a paper envelope full of printed documents. This solution to this problem has already be in use for centuries...

    • TMI isn't a thing if everything is digital. Machine learning classification techniques (go look up something as simple as maximum entropy) can do a great job of identifying classifications with high accuracy. What is being classified? Well, presumably whatever "they" think are threats to the nation, or at least to whoever has control of the system. One can analyze the behavior of targets deemed a threat and find common features shared between those targets. Even stuff a human would never, ever think to corr

    • Have you heard the good news about Big Data? It's, like, the new thing.

  • by Anonymous Coward
  • . . .stay for the Bond Villain who, knowing what he's up against, reads "Dorsai!" and comes with a completely off the grid attack.
  • by muphin ( 842524 )
    Ok say they get into every ISP's network...
    how are they going to monitor every device? pings? imagine the traffic overhead for that?
    will the NSA have to pay to be in the "fast-lane"?
    what about Dynamic IP's ? how often will they monitor those changes?
    • by AHuxley ( 892839 )
      Average nations internet service providers can keep ip, time and user name for a few years at a low cost?
      Average phone companies can keep all details on all calls connected over many years.
      Nations have the data split in real time, the ip, get help from the tame telcos and fully understand the internet crypto as used.
      Collect everything surrounding all message, keywords and usage, save and sort. Find people been tracked connecting to new people, trace the hops and then add in all the new people to trace.
    • by gweihir ( 88907 )

      You have a second network that transfers the surveillance information. Expensive, but nothing it to good or too expensive to establish a global surveillance-state.

  • With NATs, MAC randomization, WiFi hotspots, user agent spoofing, VPNs, TOR, it seems difficult if not impossible to fingerprint the devices that belong to those who strive to remain hidden.
    • That's the thing. This initiative probably won't help track down hard core terrorists or most pedophiles, unless they're also complete idiots. But that 15-year-old that just grabbed a copy of Kung Fu Panda off the Pirate Bay is screwed for life.

      • by gweihir ( 88907 )

        That seems to be the intention behind this. They also drive cost of doing business up around the globe, making everybody poorer. If that is not evil, then I do not know what is.

      • Here's the other thing. This is either a fool's errand or bullshit/wild exaggeration. It's probably impossible and certainly impractical to make a complete map of the internet.

  • Good to know at least one federal agency seems to know what it means to execute their mandate.
    • by gweihir ( 88907 )

      Not too well. It seems they have stopped zero terrorists so far. But if you think that their mandate is actually spying on ordinary people and economic espionage, then yes.

    • Actually, no one (outside the agency) knows what the NSA's mandate really is. Their charter was signed in secret by Truman and classified. The Senate Intelligence Committee had to beg and plead to eventually be allowed to see it.

  • by AbrasiveCat ( 999190 ) on Sunday September 14, 2014 @10:27PM (#47905327)
    While I am sure this is a project that will earn millions of dollars for some companies and promotions for individuals, I am not sure how successful you can be at mapping everything. I would imagine more than half of the Internet is hidden behind various NAT boxes. Even with the help of folks like Comcast, CenturyLink, Verizon, AT&T, and the rest of our friends who might help the NSA and GCHQ; we still have businesses, colleges and universities, and most households with most of their computers hidden behind NAT. Maybe when IPv6 becomes ubiquitous it might be possible. I agree with a earlier post too much data, no enough content.
    • by gweihir ( 88907 )

      There has been quite a bit of research identifying machines behind NAT. Have a look in the literature. Of course, it only works for small installations. With large numbers of hosts behind NAT, you need to penetrate. For banks, insurance companies, large hospitals, governments, etc. I am sure the NSA has achieved that globally, as their security typically sucks.

    • by AHuxley ( 892839 )
      The content can be sorted, saved once a person is found to be interesting. The ip, MAC and other data around all network use is the Treasure Map prize.
      What network data a business, university or household sends can be looked at in real time for keywords, voice prints or people been tracked.
      Treasure Map provides a much better/deeper understanding of the local network than just ending at an .edu or .com with a lot of users per day on different networks.
      Tame software, tame hardware, junk weak crypto, the t
    • I can't see how this would be that hard, especially when you consider DOD projects are used to costing tens of billions and lasting for decades (Think JSF, Nuke sub etc) Compared to those budgets and time frames, a big data store of most of everything online would be relatively trivial. Google and Facebook are probably already doing something similar.
  • Now, nobody can claim that they will not get attacked. There is this global, ethically-challenged attacker that does sabotage and industrial espionage and leaves targets vulnerable to other attackers as well because they are not perfect (far from it, they just have tons of money). So in the long run, this might do wonders for IT security in general, even if that revolution may come from countries not too friendly towards the US. Of course, the British run with the big bully, but everybody else is getting mo

  • It seems like mesh network initiatives like this haven't been covered extensively on Slashdot, though I'm curious as to anyone's take on what protocols like CJDNS and the experimental hyperbora network will be able to do to stop this... of course, the caveat being that we would have to assume that the networks were bigger than they are now, more accessible. Any thoughts?
  • I think it has been shown that they lack the technical knowledge to do the kind of science fiction hacks the media all gets in a tizzy about. They have show time and time again, that they do not need any such hacks anyway, as they can simply force companies to comply with handing over information by law.

    I mean why spend time developing the super widget to spy on everyone, when you can coerce any company they owns the applications, hardware, or infrastructure to do your bidding for you. Heck they will build

Math is like love -- a simple idea but it can get complicated. -- R. Drabek

Working...