How to Make Your Own NSA Bulk Surveillance System | Wired

How to Make Your Own NSA Bulk Surveillance System; ; In Wired; 2016-01-27 (two years ago).


  • National Security Agency (NSA)
  • Nicholas Weaver, staff, International Computer Science Institute (ICSI), University of California, Berkeley (UCB)


  • Bro
  • Hadoop
  • OpenFlow
  • Vortex
    • Lockheed-Martin




  • Intrusion Detection System (IDS)
  • Load Balancer


In order of appearance

RFC 7624 – Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement

RFC 7624Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement; R. Barnes, B. Schneier, C. Jennings, T. Hardie, B. Trammell, C. Huitema, D. Borkmann; IETF; 2015-08.


Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered. In this document, we develop a threat model that describes these attacks on Internet confidentiality. We assume an attacker that is interested in undetected, indiscriminate eavesdropping. The threat model is based on published, verified attacks.


Keeping Secrets | Stanford Magazine

Keeping Secrets; Henry Corrigan-Gibbs; In Stanford Magazine on Medium; 2015-(04?)


  • National Security Agency (NSA)
  • International Symposium on Information Theory
    • Cornell University
    • 1977-10-10
  • Martin Hellman, Steve Pohlig, Ralph Merkle; Distribution-Free Inequalities for the Deleted and Holdout Error Estimates; In Proceedings of the International Symposium on Information Theory; 1977-10-10.
  • Martin Hellman, Whitfield Diffie; New Directions in Cryptography; 1976.
  • IEEE Transactions on Information Theory
  • Computer (Magazine)
  • Joseph A. Meyer, NSA
    • Wrote to IEEE
    • Discovered by
      • Deborah Shapley
      • Gina Kolata
      • Science (Magazine)
  • John Schwartz, counsel, Stanford University
  • Bobby Ray Inman
    • Vice Admiral
    • Director of NSA, 1977-Q3.
  • Steven Levy; Crypto; 2001.
  • The RSA Cryptosystem
    • Ron Rivest, MIT
    • Adi Shamir, MIT
    • Leonard Adleman, MIT.
  • Scientific American, 1977-09.
    • publishes the RSA system.
  • Susan Landau; Privacy on the Line; 2007.
  • Agencies
    • National Security Agency (NSA)
    • Defense Advanced Research Projects Agency (DARPA)
    • Office of Naval Research
    • Army Research Office
    • National Bureau of Standards (NBS)
  • Data Encryption Standard (DES)
    • 64 bits vs 48 bits
    • compromise: 56 bits
  • Steven Aftergood of the Federation of American Scientists
  • Theft of the designs of the F-35
  • Day After Trinity, a documentary, a movie

New Documents on NSA’s Cryptanalysis Capabilities | Bruce Schneier

Bruce Schneier; New Documents on NSA’s Crypanalysis Capabilities; In His Blog; 2014-12-28.

Original Sources

NSA partners with Apache to release open-source data traffic program | ZDNet

NSA partners with Apache to release open-source data traffic program; ; In ZDNet; 2014-11-25.



Niagarafiles (Nifi) Logo

How the NSA Almost Killed the Internet | Steven Levy, Wired

How the NSA Almost Killed the Internet; In Wired; 2014-01-07.
Teaser: Google, Facebook, Microsoft, and the other tech titans have had to fight for their lives against their own government. An exclusive look inside their year from hell—and why the Internet will never be the same.

A recital of the now-known facts.

The Coming Tech-Lash | The Economist

Adrian Wooldrich; The Coming Tech-Lash; In The Economist; 2013-11-18.
Teaser: The tech elite will join bankers and oilmen in public demonology, predicts Adrian Wooldridge


As a litany of an indictment.

  • <quote>So far they have succeeded in protecting themselves from the tax authorities and shareholders alike.</quote>
  • <quote>Geeks have turned out to be some of the most ruthless capitalists around.</quote>
  • <quote>They employ remarkably few people</quote>
  • <quote>At the same time the tech tycoons have displayed a banker-like enthusiasm for hoovering up public subsidies and then avoiding taxes.</quote>
  • <quote>But tech giants have structured their businesses so that they give as little back as possible.</quote>
  • <quote>Top techies are upping their profile in politics. This is partly by design: they are employing an army of Washington lobbyists to advance their interests.</quote>

You Are What You Click: On Microtargeting | The Nation

David Auerbach; You Are What You Click: On Microtargeting; In The Nation; 2013-03-04.
Teaser: Why privacy and anonymity are being violated online by an unstoppable process of data profiling.

Zegart joins scholars at NSA for rare briefing on spy agency’s woes – CISAC

Beth Duff-Brown (CSIAC, Stanford)Zegart joins scholars at NSA for rare briefing on spy agency’s woes; In Their Blog; 2013-09-26.

Amy Zegart is Co-Director of CISAC; Senior Fellow, Hoover Institution; Professor of Political Economy (by courtesy), Graduate School of Business

<quote>CISAC Co-Director Amy Zegart and nine other national security and intelligence scholars were recently invited to the headquarters of the National Security Agency in Fort Meade, Md., for unprecedented talks with high-ranking officials. They discussed cybersecurity, the plummeting public trust in the agency, its relationship with Congress and how to rebuild the agency’s reputation and rethink its program operations.</quote>