Talk:PRISM/Archive 3

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
Archive 1 Archive 2 Archive 3

I miss a section about involved companies creating/developing all these tools and frameworks

For example: The israelian company [Ltd] is specialist in surveillance systems like protocol analyzers and developping tools for fixed line networks (glass and cable) for ISP and TELCO as well as radio-based systems and networks.

They cooperated in 1998+ with Boeing for military solutions in the fields of investigative tools for wireless sniffing and spoofing: Press announcement Radcom Ltd Israel with Boeing for mil-solutions


I was personally involved in tech and sales activities for RADCOM in Europe and participated on staff trainings in Praha, Tel-Aviv and Nizza between 2000 and 2003. In this time Radcom introduced theyr Product series - a hardware based protocol analyzer for realtime sniffing of low level and content filtering (and spoofing) at that time able to run on a OC-48 line (2 Gigabit of glass fiber). One of the late 2003 developpement was a splitter to read out glass fibers without opening or cutting them. They used a curved segment of intakt fiber for reading the multimode modulated signals by using the really small loss of signal in the curved intact part of glass fibers. These kind of taps are not detectable neither by senders/receiver nor by service providers.

I guess that this technology has to be used by NSA as described in Snowdens documents.

The prism series has been used for ISP's and TELCO's for GSM/GPRS and IP4 and IP6-based packet - orineted networks as ATM.. Later in 2002 Radcom published and distributed a SW-based Protocol Analyzer called Prism-lite for distributing in Universities and for Sales workshops. The layout of the GUI was widely identical with the expensif hw-based solutions. Captured dates could be analyzed posteriory with this tool. See Prism lite

In a Radcom's own eclaration in a Form 20-F 1.4.2004 for fiscal year 2003 they introduce themself as [1]

"..RADCOM Ltd. develops, manufactures, markets and supports innovative, high-performance internetworking test and analysis equipment and quality management for data communications and telecommunications networks. We were incorporated in 1985 under the laws of the State of Israel and commenced operations in 1991.

    Except for the historical information contained herein, the statements contained in this annual report are forward-looking statements, within the meaning of the Private Securities Litigation Reform Act of 1995, with respect to our business, financial condition and results of operations. Actual results could differ materially from those anticipated in these forward-looking statements as a result of various factors, including all the risks discussed in “Item 3–Key Information–Risk Factors” and elsewhere in this annual report.
    We urge you to consider that statements which use the terms “believe,” “do not believe,” “expect,” “plan,” “intend,” “estimate,” “anticipate,” and similar expressions are intended to identify forward-looking statements. These statements reflect our current views with respect to future events and are based on assumptions and are subject to risks and uncertainties. Except as required by applicable law, including the securities laws of the United States, we do not intend to update or revise any forward-looking statements, whether as a result of new information, future events or otherwise.
    As used in this annual report, the terms “we,” “us,” “our,” and “RADCOM” mean RADCOM Ltd. and its subsidiaries, unless otherwise indicated.
    PrismLite™, Omni-Q™, MediaPro™ and Wirespeed™ are our trademarks. All other trademarks and trade names appearing in this annual report are owned by their respective holders..."

Hope that helps.. --Cosy-ch (talk) 14:06, 2 January 2014 (UTC)

This may be along the lines of what you are talking about, but I am curious: Why, if the information is known, is there not a section on the companies that worked with/for the US government to create this networks and data filtering programs, specifically the PRISM data program itself? Cottletj (talk) 08:32, 12 January 2014 (UTC)

Don't forget Google: "GLENN BECK EXPLAINS WHY GOOGLE’S STRENGTHENING RELATIONSHIP WITH THE MILITARY SHOULD ALARM YOU" is the headline:

NASA (U.S. government agency) works with Google Inc on super-speed computer that will crack encrypted messages for NSA. FYI -- Charles Edwin Shipp (talk) 02:52, 14 January 2014 (UTC)

Invitation to help craft a proposal

Surveillance awareness day is a proposal for the English Wikipedia to take special steps to promote awareness of global surveillance on February 11, 2014. That date is chosen to coincide with similar actions being taken by organizations such as Mozilla, Reddit, and the Electronic Frontier Foundation.

Feedback from editors of this article would be greatly appreciated. Please come join us as we brainstorm, polish, and present this proposal to the Wikipedia Community. --HectorMoffet (talk) 12:26, 18 January 2014 (UTC)

References

  1. ^ Toussia-Cohen, Arnon. "Form 20-F Radcom Ltd to USA". Radcom Ltd. Retrieved 1.1.2014. {{cite web}}: Check date values in: |accessdate= (help)

Israel

All major Israeli newspapers published the Snowden evidence that the NSA had been conducting surveillance on Sharon and Netanyahu. This was a rather big deal and caused quite a ruckus especially vis-a-vis Pollard. The mess was front-line for several days. Wouldn't this be a bit more relevant than an extremely poor (incoherent) translation? (Also, Narus has been owned by Boeing for quite some time and Verint had always been owned by Comverse until a few months ago.) The Business Insider article that the Calcalist bases itself upon has several flaws, including: its allegation that a wiretapping centre existed in 2004 (3 years before the beginning of the programme); one of Verint's major product lines is IVR systems, which everyone, particularly telecom companies, use nowadays to ensure that a call goes to exactly the wrong department; that such technologies would make direct surveillance of non-ISP players unnecessary, when such orders to Google, Yahoo and Microsoft have been reported by the companies themselves since at least 2011; and there is a kind of fundamental misunderstanding about Unit 8200: we don't think of most American innovative technologies as being offshoots of secret US Navy programmes, though very few would exist would their DARPA grants.

On JPost, Arutz7, Haaretz, Maariv or Yedidot Achronot, just put 'Snowden' in the search field and take your pick of articles worth citing. — Preceding unsigned comment added by Elfwiki (talkcontribs) 11:06, 3 March 2014 (UTC)

Continuing NSA developments

Headine-1: How the NSA Can Use Metadata to Predict Your Personality

QUOTE: “The president and congressional leaders want to end NSA bulk metadata collection, but not the use of metadata, which may even be expanded. From a technical perspective, the question of what your metadata can reveal about you, or potential enemies, remains as important as it was since the Edward Snowden scandal. The answer is more than you might think.” [Public opinion pressure?] — Charles Edwin Shipp (talk) 21:38, 29 March 2014 (UTC)

Headine-2: NSA denies it knew about Heartbleed flaw

QUOTE: “IDG News Service - The U.S. National Security Agency, which has a cybersecurity mission in addition to surveillance, has disputed a report that it knew about the Heartbleed security vulnerability for at least two years before other researchers disclosed the flaw this month. The NSA used Heartbleed to gather intelligence, according to a report from Bloomberg, quoting two anonymous sources. Heartbleed is a flaw in OpenSSL that could allow attackers to monitor all information passed between a user and a Web service. But an NSA spokeswoman called the report incorrect. "NSA was not aware of the recently identified vulnerability in OpenSSL, the so-called Heartbleed vulnerability, until it was made public in a private-sector cybersecurity report," she said by email. "Reports that say otherwise are wrong." At the same time that the NSA was accused of using Heartbleed to conduct surveillance, another agency was trumpeting its efforts to share information about the bug.” [Who knew? One radio commentator of note said that the 'bug' problem turned out to not be such a problem after all.] — Charles Edwin Shipp (talk) 13:23, 12 April 2014 (UTC)

Heartbleed bug/PRISM

Should this page be updated to detail the potential interaction between the PRISM operation and the Heartbleed bug to detail the possibility that the NSA collected data other than that targeted?

My understanding is that the Heartbleed bug resulted in system memory being transmitted between both servers and clients which was unrelated to the communications between the two. In that case the NSA collected data not requested and broke the law.

In addition it would mean the NSA has stored a vast amount of data contesting sensitive information (encryption keys, passwords, credit card details, etc.) and continues to hold it. — Preceding unsigned comment added by 86.162.180.90 (talk) 03:27, 13 April 2014 (UTC)

No. If there's some evidence that the NSA actually exploited the bug (as far as I can tell there is no evidence of it being used in the wild at all), and reliable secondary sources supporting that it was related to the PRISM program, then we can include it. Not wild speculation. You'd have to actively be exploiting the bug to get the extra information, it doesn't happen automatically. 0x0077BE [talk/contrib] 04:40, 13 April 2014 (UTC)

Copyright problem removed

Prior content in this article duplicated one or more previously published sources. The material was copied from: here, here, here, and here. Copied or closely paraphrased material has been rewritten or removed and must not be restored, unless it is duly released under a compatible license. (For more information, please see "using copyrighted works from others" if you are not the copyright holder of this material, or "donating copyrighted materials" if you are.) For legal reasons, we cannot accept copyrighted text or images borrowed from other web sites or published material; such additions will be deleted. Contributors may use copyrighted publications as a source of information, and according to fair use may copy sentences and phrases, provided they are included in quotation marks and referenced properly. The material may also be rewritten, but only if it does not infringe on the copyright of the original or plagiarize from that source. Therefore such paraphrased portions must provide their source. Please see our guideline on non-free text for how to properly implement limited quotations of copyrighted text. Wikipedia takes copyright violations very seriously, and persistent violators will be blocked from editing. While we appreciate contributions, we must require all contributors to understand and comply with these policies. Thank you. Diannaa (talk) 20:45, 19 October 2014 (UTC)

Anti-terrorism

I notice in the latest revision of the article, "anti-terrorism", along with a reliable source, has been removed from the lead sentence, with instructions to see the talk page for reasoning why. Maybe I'm being impatient here, but it seems to me that while I probably agree that PRISM is not actually good at fighting terrorism, its nominal purpose is, in fact, counter-terrorism. Similarly, Homeopathy doesn't actually cure anything, but it is a type of medical intervention. Without a conflicting source saying that its purported purpose is something other than counter-terrorism, I'm thinking we should revert. 0x0077BE [talk/contrib] 12:43, 21 October 2014 (UTC)

I agree it should be there and have updated the article to reflect this. -- Somedifferentstuff (talk) 09:58, 29 October 2014 (UTC)

Prisms are used for the PRISM program

A key technology aspect of the program is that fiber tapping is used to monitor traffic. The light beam inside the optical fiber is split by a beam splitter. A beam splitter is made up of two prisms. This explaines the name of the program. — Preceding unsigned comment added by 188.142.5.44 (talk) 20:59, 27 February 2015 (UTC)

It sounds nice, but isn't true. Under PRISM, the NSA collects data from 9 major US internet companies (facebook, google, etc) - they hand over what's on their servers about a particular (foreign) target. This has nothing to do with the fiber optic cables. Tapping the fiber optic cables is actually done under another program: Upstream collection, which is with the help of telecom backbone operators like AT&T, Verizon, etc. P2Peter (talk) 05:57, 28 February 2015 (UTC)

Cost to US cloud computing industry: $35bn

First dollars-and-cents figure I've seen.

http://www.computing.co.uk/ctg/news/2287148/prism-could-cost-us-cloud-firms-usd35bn-but-benefit-european-providers

http://www2.itif.org/2013-cloud-computing-costs.pdf

--Paulmd199 (talk) 14:06, 6 August 2013 (UTC)

Above sources included with this edit. --P3Y229 (talkcontribs) 10:30, 11 August 2013 (UTC) An amazingly high amount she wanted to ask! Our <Gial.be> are more fleisig and flexiebel as cheaper. Its flexibility unite the legal interest to all interested parties, from US CIA to FSB Russia. Mossad, BND, narco-Banda "Baron", General Prokuroutur, Royal House and political party NVA are also Eussig satisfied with strong performances this small <Gial Group>. The costs also viell cheaper, only 2500, - Euro per month plus snout in a few grams of cocaine in cash. The working without guarantee, observe from your home, alor suchen weitere Aufgträge .109.128.197.219 (talk) 16:12, 11 September 2015 (UTC)

Technics/Technology Intrinsically Ethically Neutral; INDIVIDUAL HUMAN BEINGS ARE ALL

God bless the NSA if this stuff about their "psionic"-like "Counter-Subversive" prowess is actually true, not a population mind experiment itself...

But the Above, the "One" of Plotinus, the Absolute-Absolute, is harmoniously morally legislative beyond mere human rationality. The Above shall inflict due karmic redress if these espionage agencies of modernity depressingly do NOT *PERSONALLY* CORPOREALIZE IN THEIR OWN SELVES AND ACTIONS, the wise judgment allowing them the license solely, for their...why hide it?...CRIMINAL behavior... But "criminal" does not equate to "immoral", is forgotten - higher antinomianism motivated by agape, or metta, is the most burdensome burden of the directors - the decisive question, then, today, is - IS THE ETHICAL TENSION AND ETHICAL QUALITY, BEING TRULY MAINTAINED?

Only if the answer is negative, is such monitoring of a barbaric vastness of flesh illicit...

Plato knew all this - ONLY THOSE RIGHTLY-ORDERED IN SOUL, HAVE THE "RIGHT" TO MASTERY...

Our "demo-liberal humanist" idiotic excuse of a political system, knows nothing of these things - only if the NSA is "modern" in its inner orientation, is the slightest criticism justified... No one is in a position to offer any intelligent commentary, on any side.

So, opponents empirically prove immoral (not merely technically disputed methodological concerns of domesticating the human best) malfeasance or misprision or misconduct in office exists - otherwise, let the bestial cannibalistic apelike rabble in peace to obliviously enjoy its own self-induced virtual narcosis, the government only being secondarily causal to what existed previously and beforehand in the "TAMASIC" majoritarian multitude...

I trust the NSA over our beloved "democratic" Omni-competent planetary "divine right entitled peasant-tinkers"... — Preceding unsigned comment added by 2602:304:B34B:A940:F051:AB0F:3A76:DE48 (talk) 07:34, 16 October 2015 (UTC)

External links modified

Hello fellow Wikipedians,

I have just added archive links to 2 external links on PRISM (surveillance program). Please take a moment to review my edit. If necessary, add {{cbignore}} after the link to keep me from modifying it. Alternatively, you can add {{nobots|deny=InternetArchiveBot}} to keep me off the page altogether. I made the following changes:

When you have finished reviewing my changes, please set the checked parameter below to true to let others know.

checkY An editor has reviewed this edit and fixed any errors that were found.

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
  • If you found an error with any archives or the URLs themselves, you can fix them with this tool.

Cheers.—cyberbot IITalk to my owner:Online 15:01, 26 February 2016 (UTC)

US eavesdropping

@DrFleischman, EllenCT, and Charles Edwin Shipp: Is "US eavesdropping" covered somewhere in Wikipedia? Mhhossein (talk) 16:26, 20 December 2015 (UTC)

Mhhossein I created the article. What is your idea about it?Saff V. (talk) 09:28, 27 February 2016 (UTC)
Saff V. Nice job...there's much information to add. Mhhossein (talk) 10:31, 27 February 2016 (UTC)

Alternative for manual surveillance.

Programs and LCD monitor allow for secret Ciber spies to explore not only money bag internet users. But also internal organs. After that, start <OUR> "matahara" Harry Potter Spielle. Virtual shots, etc. Can this also Ciber program "Prism" ?Kukaj hier (talk) 14:40, 3 March 2017 (UTC)

External links modified

Hello fellow Wikipedians,

I have just modified 2 external links on PRISM (surveillance program). Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:

When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.

This message was posted before February 2018. After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than regular verification using the archive tool instructions below. Editors have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the RfC before doing mass systematic removals. This message is updated dynamically through the template {{source check}} (last update: 18 January 2022).

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
  • If you found an error with any archives or the URLs themselves, you can fix them with this tool.

Cheers.—InternetArchiveBot (Report bug) 20:56, 3 July 2017 (UTC)