Stories
Slash Boxes
Comments

SoylentNews is people

posted by takyon on Monday April 13 2015, @07:20PM   Printer-friendly
from the trusted-cloud-module dept.

Snowden's stream of leaked NSA secrets about classified surveillance programs shined the public spotlight on the clandestine government organization. Though the stream has now dissipated to a trickle, the impact to the intelligence community continues.

[...] Within NSA's Fort Meade, Maryland, headquarters, no one wants to face another Snowden. With NSA's widespread adoption of cloud computing, the spy agency may not have to.

NSA bet big on cloud computing as the solution to its data problem several years ago. [...] NSA's GovCloud - open-source software stacked on commodity hardware - creates a scalable environment for all NSA data. Soon, most everything NSA collects will end up in this ocean of information.

At first blush, that approach seems counterintuitive. In a post-Snowden world, is it really a good idea to put everything in one place -- to have analysts swimming around in an ocean of NSA secrets and data? It is, if that ocean actually controls what information analysts in the NSA GovCloud can access. That's analogous to how NSA handles security in its cloud.

NSA built the architecture of its cloud environment from scratch, allowing security to be baked in and automated rather than bolted on and carried out by manual processes. Any piece of data ingested by NSA systems over the last two years has been meta-tagged with bits of information, including where it came from and who is authorized to see it in preparation for the agency's cloud transition.

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2, Disagree) by bob_super on Tuesday April 14 2015, @12:03AM

    by bob_super (1357) on Tuesday April 14 2015, @12:03AM (#170091)

    You haven't been paying enough attention.
    1) Operative words in the Fourth: "searches and seizures"
    2) Do you remember what was said earlier: the data in the NSA's database is not "collected" until an analyst searches through it. Raw data is just "ingested" (or something like that)
    3) People keep arguing that copying media isn't theft in the usual sense, because the official "owner" is not deprived of it.

    Put these together, and you get mass surveillance without infringing the Fourth: The NSA is just ingesting all data as potentially vital to protecting the country and the constitution... Nobody is being deprived of their data nor "searched".

    Starting Score:    1  point
    Moderation   0  
       Disagree=1, Total=1
    Extra 'Disagree' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 0) by Anonymous Coward on Tuesday April 14 2015, @04:51AM

    by Anonymous Coward on Tuesday April 14 2015, @04:51AM (#170217)

    According to gun nuts, the wording of the second doesn't matter and anything which violates its spirit is unconstitutional, so this must mean that anything which violates the spirit of the fourth, regardless of whether it violates the letter, is also unconstitutional.

    • (Score: 2) by Leebert on Tuesday April 14 2015, @12:53PM

      by Leebert (3511) on Tuesday April 14 2015, @12:53PM (#170368)

      Huh? The wording of the second very much does matter, and "shall not be infringed" is pretty unambiguous. Certainly moreso than "unreasonable searches and seizures".

  • (Score: 2) by JNCF on Wednesday April 15 2015, @03:17PM

    by JNCF (4317) on Wednesday April 15 2015, @03:17PM (#170997) Journal

    2) Do you remember what was said earlier: the data in the NSA's database is not "collected" until an analyst searches through it. Raw data is just "ingested" (or something like that)

    I don't care whether the intelligence collecting my data is a brain or a microchip, and I don't see any distinction along these lines being made in the Constitution. If the data is being stored, it's obviously being seized (even if not directly by a human).

    3) People keep arguing that copying media isn't theft in the usual sense, because the official "owner" is not deprived of it.

    Now we're not talking about written laws, but rather what we would like the written law to be. I'm okay with that, just noting it. I see an important distinction between data that is intended to remain private and data that is intended to be distributed to the general public. I'm not saying that copying and distributing either type of data should be illegal, but I could see how somebody might argue for a law against intercepting data which is intended to be private.

    • (Score: 2) by bob_super on Wednesday April 15 2015, @03:29PM

      by bob_super (1357) on Wednesday April 15 2015, @03:29PM (#171011)

      > If the data is being stored, it's obviously being seized

      Says you, and you're not a lawyer for the NSA. My whole point is that they have publicly demonstrated that they play on words to go around restrictions.
      If you still have it, was it really seized under the common understanding of the Founding Fathers? Lots of people are paid to argue that the answer is no (whatever they actually personally believe).