It was a powerful piece of technology created for an important customer. The Medusa system, named after the mythical Greek monster with snakes instead of hair, had one main purpose: to vacuum up vast quantities of internet data at an astonishing speed.
The technology was designed by Endace, a little-known New Zealand company. And the important customer was the British electronic eavesdropping agency, Government Communications Headquarters, or GCHQ.
Dozens of internal documents and emails from Endace, obtained by The Intercept and reported in cooperation with Television New Zealand, reveal the firm’s key role helping governments across the world harvest vast amounts of information on people’s private emails, online chats, social media conversations, and internet browsing histories.
The leaked files, which were provided by a source through SecureDrop, show that Endace listed a Moroccan security agency implicated in torture as one of its customers. They also indicate that the company sold its surveillance gear to more than half a dozen other government agencies, including in the United States, Israel, Denmark, Australia, Canada, Spain, and India.
Some of Endace’s largest sales in recent years, however, were to the United Kingdom’s GCHQ, which purchased a variety of “data acquisition” systems and “probes” that it used to covertly monitor internet traffic.
Documents from the National Security Agency whistleblower Edward Snowden, previously disclosed by The Intercept, have shown how GCHQ dramatically expanded its online surveillance between 2009 and 2012. The newly obtained Endace documents add to those revelations, shining light for the first time on the vital role played by the private sector in enabling the spying.
Stuart Wilson, Endace’s CEO, declined to answer questions for this story. Wilson said in a statement that Endace’s technology “generates significant export revenue for New Zealand and builds important technical capability for our country.” He added: “Our commercial technology is used by customers worldwide … who rely on network recording to protect their critical infrastructure and data from cybercriminals, terrorists, and state-sponsored cybersecurity threats.”
Former Endace Director Ian Graham, right, meets New Zealand Prime Minister John Key in 2010.
Photo: NZNationalParty/Flickr
Endace says it manufactures technology that allows its clients to “monitor, intercept and capture 100% of traffic on networks.” The Auckland-based company’s motto is “power to see all” and its logo is an eye.
The company’s origins can be traced back to Waikato University in Hamilton, New Zealand. There, in 1994, a team of professors and researchers began developing network monitoring technology using university resources. A central aim of the project was to find ways to measure different kinds of data on the internet, which was at that time only just beginning to take off. Within a few years, the academics’ efforts proved successful; they had managed to invent pioneering network monitoring tools. By 2001, the group behind the research started commercializing the technology — and Endace was formed.
Today, Endace presents itself publicly as focused on providing technology that helps companies and governments keep their networks secure. But in the past decade, it has quietly entered into a burgeoning global spy industry that is worth in excess of an estimated $5 billion annually.
In 2007, Endace representatives promoted their technology at a huge surveillance technology trade show in Dubai that was attended by dozens of government agencies from across the world. Endace’s advertising brochures from the show, which described the company’s products and promoted the need for greater state surveillance, were published by WikiLeaks in 2013.
One Endace brochure explained how the company’s technology could help clients “monitor all network traffic inexpensively.” It noted that telecommunications networks carry many types of information: Skype calls, videos, emails, and instant message chats. “These networks provide rich intelligence for law enforcement,” the brochure stated, “IF they can be accessed securely and with high precision.”
The United Kingdom’s geographic location — situated between North America, mainland Europe, and the Middle East — made it a good market for Endace.
Many major international undersea data cables cross British territory, and according to top-secret documents from Snowden, as much as 25 percent of all the world’s internet traffic flows through the U.K. The country’s spies have worked to exploit this, with GCHQ tapping into as many of the cables as it can, sifting through huge volumes of emails, instant messages, social media interactions, and web browsing records as they are being transmitted across the internet.
As of 2009, GCHQ’s surveillance of undersea cables was well underway. The agency was measuring the amount of traffic it monitored in tens of gigabits per second (10Gs) — the equivalent in data of about 1 million average-sized emails every minute. The electronic eavesdropping agency was tapping into 87 different 10Gs capacity cables and funneling the collected data into its processing systems for analysis.
By March 2011, GCHQ’s aim was to tap into 415 of the 10Gs cables, and its longer-term goal was to “grow our internet access to 800 10Gs.” The agency wanted to build what it described as the largest covert surveillance apparatus in the world. And in an effort to fulfill that plan, it turned to Endace’s technology.
Leaked documents and emails from Endace, obtained by The Intercept, lay out a series of deals the company made with GCHQ to help it broaden its mass surveillance capabilities. A confidential February 2010 Endace statement of work for GCHQ, for instance, outlined a £245,000 ($299,500) deal to upgrade “monitoring solutions” for the British agency that were designed to intercept large amounts of internet traffic and send it into “memory holes” — repositories used to store the data.
The agency wanted to build the largest covert surveillance apparatus in the world.
Between November 2010 and March 2011, GCHQ purchased more technology from Endace, including specialized surveillance technology built for “FGA only,” a code name the company often uses in its internal documents to refer to GCHQ; it stands for “friendly government agency.”
A November 2010 company document said that “FGA” had an order of 20 systems scheduled for delivery in March 2011. Each system was equipped with two “data acquisition” cards capable of intercepting 20Gs of internet traffic. The total capacity of the order would enable GCHQ to monitor a massive amount of data — the equivalent of being able to download 3,750 high-definition movies every minute, or 2.5 billion average-sized emails an hour.
Endace added in the document that “a potential for 300-500 systems over the next two to three years is being discussed” and noted that it was soon anticipating another order of “30-40 additional systems.” Indeed, the following month a new $167,940 purchase order for 27 more systems arrived, and the items were swiftly dispatched for delivery to GCHQ’s headquarters in Cheltenham, England.
The records of the Endace sales are confirmed by internal GCHQ documents, provided by Snowden, which describe the company’s data capture devices being used as part of mass surveillance programs. GCHQ documents from 2010 and 2011 repeatedly mention the Endace products while discussing the capture of “internet-derived” data to extract information about people’s usage of services such as Gmail, Hotmail, WhatsApp, and Facebook.
GCHQ declined to comment for this story.
Throughout the summer of 2011, at Endace’s offices in Auckland, New Zealand, the orders from GCHQ were continuing to flow in. Meanwhile, the company’s engineers were busy turning their sights to new technology that could vastly increase surveillance capability. Endace was developing a powerful new product for GCHQ called Medusa: interception equipment that could capture internet traffic at up to 100 gigabits per second.
Medusa was first logged in Endace’s sales systems in September 2011. Endace staff produced weekly status reports about their progress and updated GCHQ at biweekly review meetings. By November 18, 2011, the first version of Medusa arrived at GCHQ. “FGA are very pleased with the prototypes we delivered last week,” Endace noted.
Apparently after testing the Medusa prototype, GCHQ requested some refinements. One feature the agency wanted was called “Separate MAC insertion by IP type.” This suggests the British agency may have sought the ability to target individuals by searching internet traffic for the built-in hardware address of their computers, routers, or phones.
Notably, the Medusa status reports reveal that Endace was using taxpayers’ money to develop the new equipment for GCHQ. They state that the Medusa system was being built for “FGA” with funding from the Foundation of Research Science and Technology, the body that handed out New Zealand government research grants.
In 2010, Endace received two grants totaling $11.1 million. A public announcement for the first grant — issued in July 2010 — said the funding was for “50% of the cost of a series of substantial product developments over the next two years,” but did not say what the products were nor who they were for.
A New Zealand government spokesperson told The Intercept that he could not immediately give a “definitive” answer on whether the funding body had known Endace would use the grants to develop surveillance technology for GCHQ, but said it was “highly unlikely Endace would have provided that information, as they were under no obligation to do so.”
Endace has never publicly disclosed any of its work with GCHQ, likely because it is subject to strict confidentiality agreements. In one contract obtained by The Intercept, GCHQ states that Endace staff are bound to the U.K.’s Official Secrets Act, a sweeping law that can be used to prosecute and imprison people who disclose classified information. GCHQ warned Endace that it must not “make any press announcements or publicize the contract or any part thereof in any way.”
Endace’s leaked client lists show three main categories of customers: governments, telecommunications companies, and finance companies.
The government clients appear to be mostly intelligence agencies. A 2008 Endace customer list included: GCHQ; the Canadian and Australian defense departments (where their electronic spy agencies are located); a U.S. government contractor called Rep-Tron Systems Group, located in Baltimore, Maryland; and Morocco’s domestic surveillance agency, the DGST.
Other Endace customer lists contained in the leaked trove include the U.S. Army and the U.S. Navy’s Space and Naval Warfare Systems Command, called SPAWAR; the Israeli Ministry of Defense (home of its Unit 8200 electronic spy agency); the government of India, the Spanish Ministry of Defense; and Denmark’s Defense Intelligence Service.
Endace’s apparent dealings with the Moroccan agency, the DGST, are particularly controversial. Moroccan authorities have been persistently accused over more than five decades of committing a range of severe human rights abuses.
In Morocco, digital surveillance is intimately linked with repression of peaceful dissent.
Amnesty International, in a 2015 report, specifically singled out the DGST agency as a key perpetrator of recent abuses, accusing it of detaining people incommunicado and using brutal torture methods that included beatings, electric shocks, sexual violence, simulated drowning, drugging, mock executions, and food and sleep deprivation.
Sirine Rached, Amnesty’s North Africa researcher, told The Intercept that sales of surveillance technology to Morocco raised major concerns.
“In Morocco, digital surveillance is intimately linked with repression of peaceful dissent — people who are peacefully protesting or criticizing the authorities face intimidation, arrest, unfair trials, and sometimes imprisonment,” said Rached. “We fear that the more that these surveillance tools are sold [to Moroccan agencies], the more we will see human rights abuses, especially in relation to freedom of expression and information.”
Endace declined to comment on its dealings with Morocco. Stuart Wilson, Endace’s CEO, claimed in a statement that he had to keep details about the company’s customers confidential in order to help them “battle cyberthreats and breaches.”
Alongside its government clients, Endace has many major corporate customers.
Endace’s sales lists include finance industry giants such as Morgan Stanley, Reuters, and Bank of America. Endace’s website says it provides financial companies with its monitoring technology to help “high-frequency traders to monitor, measure, and analyze critical network environments.”
In addition, Endace sells its equipment to some of the world’s largest telecommunications companies, among them AT&T, AOL, Verizon, Sprint, Cogent Communications, Telstra, Belgacom, Swisscom, Deutsche Telekom, Telena Italy, Vastech South Africa, and France Telecom.
Some of these companies may use the Endace equipment for checking the security of their networks. But a key strand of Endace’s business involves providing technology for telecommunications firms that enables law enforcement and intelligence agencies to intercept the messages and data of phone and internet users.
A company product strategy document from 2010 said that Endace had “seen early success” providing a Lawful Intercept product to the major U.S. telco and internet company Sprint Corporation.
All telcos and internet companies in the U.S., Europe, New Zealand, and a number of other countries are required by law to have “intercept capable” equipment on their networks. When police or spy agencies want private data about a customer (with or without a warrant, depending on the country), it can be extracted easily.
When installed on a network, Endace’s surveillance equipment can be used to perform targeted monitoring of individual people, but it can also be used to enable dragnet spying.
In one of the leaked Endace documents obtained by The Intercept — under a section titled “customer user stories” — the company describes a situation in which a government agency has obtained “the encryption keys for a well-known program.” An Endace surveillance “probe,” the document suggests, could help the government agency “unencrypt all packets sent by this program on a large network in the last 24 hours.”
Once the data has been decrypted, the agency will be able to “look for the text string ‘Domino’s Pizza,’” Endace joked, “as they have information suggesting this is the favorite pizza of international terrorists.”
———
Documents published with this article:
Sure it’s just the last gasp of the Transnational Capitalist Class who knows their beloved economic system is a crock and they are desperately clinging onto power in whatever way they can. It is their fear that makes them so furtive and underhanded, they can see the changes happening all around them and it spells out the end of their rule. So don’t worry about all the data they are collecting, remember these people are frightened and stupid and all it will take is one system crash for all this information to be wiped clean (which given 21st Century incompetence is an inevitability). If knowledge is power then we can rest assured that this period of hyper-capitalism is just another idiotic venture of the TCC and it will all end in a crash which we the people will survive while the barely human TCC will starve to death due to their own inbred incompetence. As the Dali Lama says, “You’ve gotta laugh”.
Billionaire Facebook Investor Peter Thiel Pours Money Into His “Utopia,”( New Zealand) but its not the Utopia you are thinking its a spying Utopia Peter Thiel, famous for making billions off Facebook knew facebook was a stolen idea invested $3 million in online accounting firm Xero and invested $4 million in Pacific fibre -optic cable from Australia to New Zealand to the US to Facebook and on to the NSA and they are all in bed with George Soros and the Clinton Foundation relationship (Cooper-McAuliffe-Clinton Emails) that FBI Deputy Director Andrew McCabe failed to disclose after his wife took $675,000 from McAuliffe GCHQ documents from 2010 and 2011 repeatedly mention the Endace products while discussing the capture of “internet-derived” data to extract information about people’s usage of services such as Gmail, Hotmail, WhatsApp, and Facebook. FACEBOOK IS NSA. HILLARY CLINTON IS A LIAR AND A FRAUD!!!! http://www.leader.com/leader-v-facebook-cv-08-862-JJF-LPS/facebook/2012-06-27-AFFIDAVIT-OF-DAVID-LONDON-EXHIBIT-D-Defendants-Motion-to-Enforce-Settlement-27-Jun-2012.pdf http://www.redflagnews.com/headlines-2016/white-house-cancels-all-obama-appearances-at-hillary-campaign-events-
What would change if this evil enterprise were eliminated from the planet? I suspect nothing would change, other than the group of bad guys trying to oppress all the people of the world.
This is pretty much where statism always leads. Treating the citizenry as suspects. As long as we allow masters, we will be treated thusly.
Have you read anything about ExtraHop? They are a Seattle based company that produces similar hardware and software and list the NSA and other federal agencies among their customers.
More and more surveillance. We have GOT to find a way to get back to some sort of sanity about t his and restore respect of privacy.
http://www.commondreams.org/news/2016/10/25/terrifying-att-spying-americans-profit-new-documents-reveal
Every goverment involves in surveillance and spying on their citizens. Thats why swoden recommend an encrypted tool like PureVPN.
This doesn’t seem to be the same billion dollar scale industry as the customers it supplies. So are Chinese knock-offs available yet?
It would appear – from the customers list – that swiping an Endace box might be a fairly easy and lucrative task compared to making a Wikileak data dump and considerably safer.
Given it’s harvesting abilities, it is really surprising that somebody equally bright, hasn’t devised an electronic ‘spanner’ to toss into the works, or some way to gum-up the system with bumpff.
I looked into the ownership of Endace, and as far as I can figure, they are owned by Echidna Capital LLC, which appears to be a Russian shell company of some sort???
Please feel free to double-check me on this, as it is a very sketchy affair!
Clandestine private eyes that are worst than groping by the corrupt establishment, without consent in order to advance Nimrod’s novus ordos seclorum by abolishing privacy. Disgusting is short Hemingway.
The fallout of Nimrod’s novus-ordos-seclorum/corrupt-establishment is one’s gullibility.– Alejandro Grace Ararat
One can only hope that Amnesty International receives “brutal torture methods that included beatings, electric shocks, sexual violence, simulated drowning, drugging, mock executions, and food and sleep deprivation” for its mis-prioritization of human rights abuses (Hey A.I.: go check out how muslim countries treat their “non-conforming” citizens, if you want barbarism to complain about!).
I would like to say I look forward to future revelations! However, I think I’m just going to unplug and sod the internet.
We pay taxes so that our governments can hire contractors to spy on us.
You couldn’t sleep as well at nights if you knew that they weren’t, right?
All those bad people out there in the darkness, when you’re not, and all.
Privacy Badger from the EFF is a better approach than Ghostery, or to use in tandem to see which one does more to identify and allow or deny access. Also incorporate NoScript to restrict any Java Script that you may not want.
$168,000 for 27 “systems”….can’t be much there!
The “Medusa” spy equipment? Medusa was slain by the HERO Perseus!
You can also be a hero. It is VERY safe and easy to leak text, and voice recordings. Use encrypted email, Wikileaks, or SecureDrop.
Any information can be safely leaked, from anywhere in the world, and appear in the press in 24 hours.
If you are being asked by a government to do something illegal, become a hero – LEAK it!!
Love,
L.
“It is VERY safe and easy to leak text, and voice recordings. Use encrypted email, Wikileaks, or SecureDrop”
That’s not exactly true. It’s only true if you are NOT being monitored 24/7 by an agency or agencies. If you’re personal PC has been compromised and your phone device actively monitoring everywhere you go, everything you say and everyone you interact with, it’s not that simple to feel safe in leaking vital information at the expense of a prison term.
Especially given this:
http://thehackernews.com/2015/07/fbi-hacking-team-tor-network.html
I use a VPN (Virtual Private Network) called PIA (Private Internet Access), which is headquartered in Britain. I suspect the GCHQ is monitoring them and by extension me as well. But the question is how much security do you need?
People who use the internet are being tracked and profiled by both private corporations an government institutions. The internet is infested with trackers like a dog covered in ticks and fleas. Check out a Firefox plugin called Ghostery to see how many tracker you are currently loading. This webpage shows two trackers. Twitter and an analytic tracker of some sort. The use and abuse of internet trackers should be regulated.
We should agitate for VPN service at all major ISPs. If you need more security you can add another level of VPN. Both Google and Netflix make me drop my VPN security in order to access my account, which is annoying. Also you should be aware that Google data-mines your emails. You may think that it’s not a problem, but just ask John Podesta. Google has had access to Podesta’s emails for years probably lot’s of other government officials as well. Which is something to think about.
It has become obvious that the corporate model of letting the market alone dictate privacy policy is a bad one. We need better custodians for out personal data, bank accounts and such like. By putting their profit motives and security concerns ahead of our individual rights, governments and corporations have shown themselves to be poor defenders of our right to personal integrity.
TheFuture = VPN + StrongEncryption( PersonalData );
https://www.youtube.com/watch?v=DsdAnYLvGe4
I suspect the US government will put a business out of business if it does provide a secured private internet service as a condition of cooperation with the ISP’s in the US proper… The market is still the best place…..
Up here in space
I’m looking down on you
My lasers trace
Everything you do
You think you’ve private lives
Think nothing of the kind
There is no true escape
I’m watching all the time
I’m made of metal
My circuits gleam
I am perpetual
I keep the country clean
I’m elected electric spy
I’m protected electric eye
Always in focus
You can’t feel my stare
I zoom into you
You don’t know I’m there
I take a pride in probing all your secret moves
My tearless retina takes pictures that can prove
I’m made of metal
My circuits gleam
I am perpetual
I keep the country clean
Electric eye, in the sky
Feel my stare, always there
There’s nothing you can do about it
Develop and expose
I feed upon your every thought
And so my power grows
I’m made of metal
My circuits gleam
I am perpetual
I keep the country clean
Protected. Detective. Electric eye
– “Electric Eye”, Judas Priest, 1982
The admiral{…Poindexter} and his illegal, immoral, and ignorant, data collection program{…Carnivore} were rejected by Congress and the Courts.
Yet the Executive has overtly and covertly exercised its National Security ‘privilege’ to circumvent the meaning and intent of the law. “The law is not the truth, it is simply a matter of interpretation.”
It’s interesting to also note that Belgacom is on their customer list.
Hmm mm, why would a European telecom that was the supposed victim of suspected hack using Stuxnet (by GCHQ) be actively buying spyware from Endace?
Also recall that Belgacom is a distributor of MobileIron, a company know to be linked to the CIA.
Perhaps the reporting of Stuxnet against Belgacom was in error? Perhaps it wasn’t a hack at all.
Perhaps the Intercept could ask them why they are purchasing spyware and also be a distributor of supposed security software.
Sounds like a contradiction to me. (not)
“Moroccan agency, the DGST, are particularly controversial. Moroccan authorities have been persistently accused over more than five decades of committing a range of severe human rights abuses.”
Because none of the other countries mentioned have been accused of serious human rights abuse for more than five decades. Really, not accused by whom?
And furthermore, since the list is introduced with, ‘includes’ … just which countries aren’t mentioned? How about giving a complete list in a follow up article in language that it meaningful to the general public? Trying to make heads or tails of the customer lists is a bit daunting.
I am still curious about the technicalities of those “processing systems”? I think they use corpora-based models with forests of DAGs (not SQL kinds of indexes as some people have said/suggested even in the “Snowden” movie) or probably they are not that sophisticated and they just rely of massive parallelism and hardware power
Really!?!
https://en.wikibooks.org/wiki/Changing_Your_MAC_Address/Linux
a script to sniff the out facing network, change the MAC address, jail every browser session would be crafted by a script kiddie in less than a minute. This wouldn’t be 100% reliable, but it shouldn’t be anyway ;-)
I like to hear theIntercept talk like that. Those who were entertained by that IPhone/Mac vs FBI silly show not long ago should have known better.
All telcos and internet companies in the U.S., Europe, New Zealand … are underpinning the NSAs, GCHQs, … of the global pan police state in which we live. In fact, they were the ones who did the proof of concept and sold the “Collect it All,” “Process it All,” “Exploit it All,” “Partner it All,” “Sniff it All” and, ultimately, “Know it All” business model to the NSA.
RCL
a script to randomly change … should I have added and in not deterministic ways by exploiting hashes of the out-facing network traffic and pseudo random number generators
RCL
also, include some random endogenously created data like the position and movements of you mouth and the timing you click on links
RCL
https://www.youtube.com/watch?v=jvgZWDwWqEo
https://www.youtube.com/watch?v=aLKuPPe1IhY
https://www.youtube.com/watch?v=O0U-Y9wKmHs
https://www.youtube.com/watch?v=Kg1-vao5Ta8
Folks –
All this spying is very upsetting, to say the least. But have you all seen this:
http://www.commondreams.org/news/2016/10/23/google-has-quietly-dropped-ban-personally-identifiable-web-tracking
I think TI should get on this.
Meanwhile, this concerns me GREATLY as I do have a google account, (for my blogging), though not g-mail. The article SAID we had some opt-in given to us back in the summer? I don’t ever remember anything about that. Does anyone know if there is anyway to opt out? Would I have to delete my account to escape at least this bit of spying?
Thought I’d see if The Guardian has covered this at all and managed to find this:
https://www.theguardian.com/technology/2016/oct/21/how-to-disable-google-ad-tracking-gmail-youtube-browser-history
Hope it works…
To opt-out of Google’s identified tracking, visit the Activity controls on Google’s My Account page, and uncheck the box next to “Include Chrome browsing history and activity from websites and apps that use Google services.” You can also delete past activity from your account.
Probably works.
@Barabbas –
Well, I hope it does. I went to the said control and saw that my check box wasn’t checked (good so far!)…but something strange… on all activity things, after each heading it said in parentheses: (Paused). What does THAT mean?
Alice’s Wonderland has nothing on the strange things going on right now…
i dont use gmail but a friend says that the recording of ‘activity’ is paused – until you turn it back on.
you best check activity logs/content to make sure
i would not abandon gmail b/c they are most upfront, make the better effort, and have the most to lose. BUT that removal of personally identifiable info is their safety net against lawsuits.
the only thing i ever concern about is theftable information – impersonation, robbery. use a password that your service recommends.
Thanks for that clarification. I’ll periodically monitor… I also have been trying to clear all my activity history.
If you read the article, we also have to be wary of our providers. And just look at who was buying this stuff. Is anyone NOT spying on us?
Thanks for sharing that info. The “information economy” relying on our personal information that much of our current “wealth” is based upon seems to be getting more problematic. I’m looking for the tech bubble to burst, as the real worth of that information has likely been oversold, and once everyone concerned with monetizing everything finds that out how overvalued that info really is, they’ll opt-out of this advertising scheme in lieu of a new, likely more invasive one.
Well, the purpose of ads following you is to sell you something. But if you are like me, and have a very low income, then THEY are wasting their effort. The bottom line is that before you have the desire to buy something, you have to have the money. I have no credit cards, or credit. I suspect there are many more like me out there, given the depression.
I suspect you’re right.
@Sillyputty –
Oh my, not a MORE invasive advertising scheme? Isn’t this one bad enough? But unfortunately, this points out that this kind of thing just gets more invasive all the time.
And that’s not even getting to that “internet of things.”
Sigh.
TI is a front group, that’s obvious enough by now, isn’t it? The only thing they’re going to “get on” is whatever billionaire Omidyar wants them to “get on” – these aren’t journalists, they’re a pack of pathetic PR monkeys looking for a handout, from Betsy Ross and Peter Maas and Glen Greenwald on down.
They know it, they know what they’ve been hired to do. Dishonest two-faced PR monkeys. A total lie from beginning to end. If that’s not the case, then why not have Pierre Omidyar hold an open interview and answer questions about his real agenda behind this operation? Will we have to bring in USAID and the State Department to cover all bases?
Really, what a travesty, Glenn.
@photosymbiosis –
Really, do you need to be so disagreeable if you reply to me?
Since you changed the “topic” to what’s the problem with TI —- what I have to say might surprise you.
First of all, a lot of the reporting here is still pretty good. I think this article is certainly worth the read. And I’ve been a supporter of TI from – Day 1.
But I am often shaking my head about the state I feel TI has fallen to. It has definitely lowered TI in my estimation that they have NOT supported Amy Goodman or Deia Schlosberg. Aren’t they concerned about Freedom of the Press and threats to journalism? FAIR even had an article about how journalists were NOT supporting Amy Goodman. I haven’t kept track of all, but one I do know that had her on for an entire show was Tavis Smiley. There has, that I know of, only been ONE article at all about the whole DAPL thing. That is not a good situation out there and is definitely a chilly atmosphere for dissent and freedom of assembly. They might say, this is “covered elsewhere” but the MSM isn’t really doing that and I am wondering that TI just doesn’t care. And if someone says, oh, they tweeted — well, what about those of us who AREN’T twitter users? I’ve gone to Glenn’s feed sometimes and have ended up more frustrated than anything. Kept losing my place or there would be this discussion and I’d click on the link in one tweet to see more about what it was all about, but usually could NEVER find anything related to that discussion.
Then there’s the fact that this website is a mess. Last time I tried I still couldn’t get the menu to work. Some of the problems seem to be alleviated, but who knows? They seemed to be not too long ago, then popped back again. And this whole endless scrolling thing is horrible. They don’t communicate anything about these problems, don’t respond to our concerns, and there doesn’t seem to be any mechanism to report website problems. It just gives me the feeling they just don’t care about the readers.
Even with its flaws, TI does do some good things and could have more potential – if they could fix things a bit.
This article is so idiotic, so badly written that the authors should be fired. It really sums up how the Intercept has become nothing but the Alex Jones show of the left, fervently blowing up everything into massive conspiracy.
1) “Apparently after testing the Medusa prototype, GCHQ requested some refinements. One feature the agency wanted was called “Separate MAC insertion by IP type.” This suggests the British agency may have sought the ability to target individuals by searching internet traffic for the built-in hardware address of their computers, routers, or phones.”
This is so idiotic and wrong that I almost broke my head banging in on the table. Anyone who has even basic knowledge of how networking works knows that your MAC address is only visible in the local LAN domain. You cannot identify individual user’s based on their MAC address outside of the LAN. Your cell phone does not even use a MAC address for it’s 3G/4G traffic. Do the authors of this article even understand that?
What they are talking about is that they want to separate the traffic by IP type. The flows from the “probe” cards are directed to blades in the “Kracken” storage blades based on the MAC address. This is clearly shown in section 7.5 and 7.6 of the Kracken overview document.
So no, this does NOT suggest that they have sought the ability to target individuals based on their MAC address, it means that they wanted to be able to separate IPv4,IPv6 and ARP/MPLS/VLAN traffic to different blades.
2) “As of 2009, GCHQ’s surveillance of undersea cables was well underway. The agency was measuring the amount of traffic it monitored in tens of gigabits per second (10Gs) — the equivalent in data of about 1 million average-sized emails every minute”
This is yet another example of the Intercept’s use of misleading statistics to support their utterly misleading conclusions. Yes it’s “equivalent” to 1 million average sized emails, but it is NOT 1 million average sized emails. On the internet probably 40% of the traffic is porn. Plain and simple. Another 40% is Netflix, another 15% is Youtube. Email probably accounts for less than 1% of internet traffic at any given time. So, no they are not capturing 1 million emails per minute.
3) “Endace’s apparent dealings with the Moroccan agency, the DGST, are particularly controversial. Moroccan authorities have been persistently accused over more than five decades of committing a range of severe human rights abuses.”
Again, the Intercept uses the transitive property to imply malfeasance where there is no evidence what so ever. They sold equipment to a nation’s security agency which has been known to engage in human rights abuses, therefore this equipment was used for human rights abuses.
I know this may come as as a shock, but most countries, including the US have LAWS which DEMAND that telecom providers provide capabilities called “lawful intercept”. This means that telecom providers must be able to track data across their networks and store it. This type of equipment provides such capabilities.
4) “An Endace diagram depicts a custom data capture system built for GCHQ”
I almost died laughing at this one… No, it doesn’t. It shows a 10G ethernet to 40G SONET mux card. It takes in 4x10G ethernet and shits out 40G ethernet over SONET. There is absolutely nothing magical about this at all.
So what did we learn from this article? That Endace sells lawful intercept and network monitoring equipment. We also learned a bit about their financials and their architecture. I’m sure that their competitors thank you very much!
If you want to learn more about “little known companies which enable world wide surveillance “, perhaps you can bother yourself to google “lawful intercept” or “deep packet inspection”. Then you can re-write your headline to read “little known company Cisco enables worldwide surveillance”.
This is the number one problem at the Intercept. All stolen information is unassailable, just because it is stolen. There is no thought or effort given to investigating the motivations of the leaker or the veracity of the information. The worst, most paranoid possibility is always the right one.
I for one am done. The intercept is nothing more than a ridiculous gossip rag with absolutely no journalistic integrity.
Dan,
Before banging your head on the table maybe you should have emailed me first. We are well aware that MAC addresses are only visible in the local LAN domain, and of course we considered that when writing the story. One of the sources we dealt with on this piece told us that the feature may have been for placement within a carrier’s network for LAN MAC intercept. In addition, we found examples in Snowden documents of GCHQ using MAC addresses as a form of “selector” to filter data it collects – hence, we posited it as a possible use case for the Endace technology. In short, I think you are wrong to assume that GCHQ does not or cannot access any LAN data.
Also, we were not suggesting that each 10Gs cable was carrying one million emails per minute; rather, what we were doing there was providing a tangible example for readers in an effort to communicate the kind of capacity at play. On its own “10Gs” means nothing to the average reader, so you have to find a way to make it real to people. I think it’s clear that this is what we were doing. It’s certainly not intended to be misleading.
And on your point about Morocco – I don’t agree with you here at all. That Endace may have been selling its surveillance technology to an agency known to be implicated in severe human rights abuses, including torture of dissidents, is significant and had to be reported. Companies should be obligated to behave in a responsible way and in line with human rights principles. Selling surveillance technology to an agency known to engage in torture is clearly questionable and should be exposed to public scrutiny.
Speak of the devil! The address of Endace’s head office is 666 Great South Rd, Ellerslie! The next suburb over from where I grew up.
Hillary + Diane + Rodham
18 letters in her birth name
18 = 6 + 6 + 6
That’s quite a stretch (although I agree this company and Clinton are nothing short of malevolent). It works better for Ronald Wilson Reagan (6 letters in each name), so perhaps the Great Beast has already been and gone, defeated by Alzheimer’s. Or maybe we shouldn’t look to the Bible or anywhere else for prophecy and numerology. Just a thought.
“Six six six” is actually how Australian nymphomaniacs list their hobbies, for the record.
I think you’re confusing Aussies with Kiwis there, Maisie. If you’re going to take the puss, make sure you’re right about it. No one wants to find a pahk sard in their chully bun ;)
Well, yes, you can squeeze 666 out of a lot of things, if you squeeze hard enough, but it kind of defeats the joke. In fact the “Number of the Beast” in Revelations is more likely 616 (blame it on transcription errors), but again, it defeats the joke.
Endace, born out of research at a New Zealand university, was created as a private company in 2001 and later sold to Emulex, a California company for $130M in 2013. Its performance was disappointing, however, with sales declining from $40M in 2013 to $23M in 2014. In 2015, Endace was valued at just $34M about $100M less than two years before. It was repurchased by company management in 2016.
So what happened? Were the sales to GCHQ in 2010-12 a one off, with the Moroccan secret service unable to fill the void, or did some other company poach its market? I suppose company management did well enough from the 2013 sale (better than NZ taxpayers, who haven’t seen any return from the $11M of grants they poured into the company). But it must be sad to lose your edge as one of the premier spying companies in the world. Hopefully, other companies will step forward to fill the void.
Maybe Emulex was played and cut their losses. Is it possible with this kind of tech that the entire future value of Endace was in a few brains who took the cash and waited for their baby to come home.
Just curious what techies might say, not a rhetorical question.
I have no knowledge of what happened. My guess is the acquisition by an American firm was in the hope of selling Endace’s products to the NSA. However, young tech firms don’t always know how to play the political game, and probably failed to hire enough ex-NSA officials to clinch a sale. So the expected returns never materialized.
Tech firms are often guilty of the hubris of believing their products are so good they will sell themselves.
Used to work for Narus. There are many companies around the world who make and sell this technology. It’s here to stay as it is necessary tech to run a large telco or secure a large bank network, etc. My first recommendation is to try to create international laws restricting sales to certain countries, but even then, don’t they have a right to secure their networks or monitor terrorists? Get used to it. My second recommendation is to watchdog our governments and support whistle blowers to find out how much our governments are overstepping our own laws. Third, encrypt.
Scummy, scummy people.
Endace and their like (including our governments) obviously haven’t figured out that once they’ve succeeding in wiping out all the little people there’ll be nothing left for them to feed on, and ultimately they will die as well. Immoral, greedy, and stupid is a bad combination. In this case, fatal.
Endace shows what is expected from surveillance from someone who has a King who owns slaves.
It’s not hard to do…. you can use “port mirroring” on network gear, too.
Seems like a waste of money unless someone enjoys watching me transmit a perpetual stream of “give ’em the bird” pictures.
P.S. Here’s the original Washington Post article describing the NSA/GCHQ program to intercept all Google and Yahoo information flowing across fiber optic cables, which Endace is no doubt deeply involved in:
https://www.washingtonpost.com/news/the-switch/wp/2013/11/04/how-we-know-the-nsa-had-access-to-internal-google-and-yahoo-cloud-data/
If we run down the list of criminals involved here, it’s quite long – legal justifications from John Yoo and David Addington (Bush/Cheney laywers), actions conducted by Keith Alexander, Michael Hayden, James Clapper, top-down authority and approval from the Senate Intelligence Committee and the White House – all in violation of the “due process” rules in the Constitution of the United States. What a bunch of STASI monkeys.
DO PROCESS?
Dumb&Dumber couldnt read so they asked John Yoo to read some legal stuff aloud. When the ACLU went to challenge dumya&cheney about torturing and spying cheney simply replied,
Now the f…b…i… also do process stuff.
https://www.wired.com/2016/05/history-fbis-hacking/
Just not Hellary.
We know how to defeat Medusa. Don’t look it in the eye and cut off its head.
Endace sounds a lot like Narus (maker of the fiber-optic splitters that sit in AT&T buildings and direct all fiber-optic-carried data to the NSA data centers for analysis). In fact, a Google search reveals that Endace has been a Narus partner for many years:
Notice that the fiber-optic trunk taps (GCHQ/NSA) operate differently – as a ‘collect it all’ mass surveillance approach – than the “Lawful Intercept” described here:
In the latter case, the police/spy agency goes to the telco/internet company (supposedly with a warrant in the U.S.) to get full access to a particular individual’s email/text/phone logs. In the former case, NSA or GCHQ is collecting all the traffic and mining it for keywords, metadata etc. using something called SHELLTRUMPET, which in some cases moves the data into a long-term repository called “TRAFFICTHIEF.”
https://search.edwardsnowden.com/search?codewords_facet=TRAFFICTHIEF
Incidentally, notice how zero questions have been asked this election season about mass surveillance and internet privacy of any political candidate? And AT&T is set to buy up TimeWarner, likely to help ensure that no more questions are asked about the telcom relationship with NSA. All indications are that mass surveillance continues as before the Snowden revelations with almost no changes. Funny how that worked out, isn’t it? And Clinton’s policy is obviously to continue with this, which is probably why we see no discussion of it in American media.
The presidential appointees in all the agencies come from wallstreet corporations who have an agenda. And like the morons who fired they five people at the NSA who had objections to the wholesale-spy-on-americans program will do favors for their ongoing corporat relationship.
example
“It’s just business”
The business of robbing America. Wallstreet crooks tied to the head of the SEC are busy operating like organised crime to rob Americans all the time. Liz Warren is trying to stop the robbery in progress.
Barack very quitely tells Liz to go screw herself. The billions we-the-people spend on spy-ops every month will catch a few bad guys who could be caught likely in other ways and prevented in better ways. But the spy-on-all deal is a lot handier for wallstreet because it allows their appointeds (as in annointeds) to steal more stuff.
Where is the word “boondoggle” in this article, or did I miss it?
same with “cluster..something”.
“Amnesty International, in a 2015 report, specifically singled out the DGST agency as a key perpetrator of recent abuses, accusing it of detaining people incommunicado and using brutal torture methods that included beatings, electric shocks, sexual violence, simulated drowning, drugging, mock executions, and food and sleep deprivation.”
Ho hum, just the usual ‘enhanced interrogation techniques’, fully endorsed by the US government, including the current ‘forward-looking’ president.
Nothing to see here, folks; just keeping you bitches safe…
I wish we at least got some tangible benefits from living under this new totalitarianism.
Bush lied.
http://www.cnn.com/2006/POLITICS/02/09/bush.terror/
The truth is, all this spy rigging has save Americans from thousands of terrorist attacks that would have happened had the terrorists known that they were not being spied on.
I am sure that is the line they will adopt. I dont really mind all this spy riggable crap because it probably does thwart organised crime. What i do mind is the dumb&dumber who run it, the secrecy in which it is perpetrated on Americans, the denial of accountability, the fraudulent way in which it is cast, the cost of it all, the violation of constitutional provisions, and the interest of wallstreet thieves in it. Otherwise it’s ok.
Great article. Thanks.
From the article:
That’s a really strange few paragraphs because Amnesty International could have and should have included GCHQ and NSA or, more specifically, the United States of America into their specified area of “major concerns,” this:”In Morocco” and this: “[to Moroccan agencies]” and hardly changed a single word of their “major concerns.”
The GCHQ is governed by a legislative framework consistent with human rights legislation and is subject to rigorous oversight by both Parliament and senior members of the judiciary. The Moroccan security agency on the other hand, operates in secret with very little transparency or accountability. The difference should be apparent to even the casual observer.
Sirine Rached, Amnesty’s North Africa researcher, told The Intercept that sales of surveillance technology to Morocco raised major concerns.
This is not a concern for the sociopathic twisted mind of Hellary “the monster’s mother” Clinton. She likes this kind of stuff – better than sex. She would boost the economy by paying everyone to be part of her spy network even if it means everyone spies on everyone else.
Hellary’s idea of great sex is screwing everyone but her husband and donors
Internet has become useless for private communication.
Need to invent something new.
no problem. already invented but not implemented.
would become illegal in an eyeblink.
cheap too.
No cause for worry. I’m confident that, when Kim Dotcom gets elected PM of NZ, Endace will now be top of his agenda, and he and his Internet Party will soon sort things out.
The second picture is probably showing a power cable being laid by Eon EdisAG.
There is around 1000 people living on the island so no need for Fibre cables.
Further evidence for my view that digital technology in and of itself can not be used t communicate privately with anyone else. The entire digital world of the internet and beyond – even if it could have been deployed in such a way as to be private (which I do not believe is the case) the deliberate efforts by power to take it over for their own purposes of oppression and the sloppy get rich code coming from everywhere have resulted in cyberspace becoming as polluted as the Gulf of Mexico after BP. Just as the transnational corporations rape and despoil our physical environment they have polluted and filled the internet with rivers of garbage code easily exploited.
Now we read about the “internet of things” being used for spying and cyber attacks, that was hardly an accident, it is expedient for corporations not to bother with security and helpful in the joint corporate/government (fascism) project of domination and control.
Digital technology and the internet as it is built and operates today is almost entirely for the purposes of power and control by a global fascist/Neoliberal/neo-feudal empire.
Technology advances now nearing deployment will increase imperial power by many orders of magnitude.
It may not feel like it to you just yet but – this is the dystopia everyone speculated might evolve – it is right here right now.
it is expedient for corporations not to bother with security and helpful in the joint corporate/government (fascism) project of domination and control.
Operating system security is not a problem unless you have Dumb&Dumber using the Dumbest system on the planet that is always getting hacked like crap.
i dont really know if the following is the dumbest and most worthless system on the planet. Just because the chinese have banned it, what do they know?
http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/
>tens of gigabits per second (10Gs)
10Gbps*
wow. jaw dropping. unreal. wtf.
Great. Now wallstreet will steal your business contacts, customer information, contract info, business development plans, etc cheaply. It’s what wallstreet does, they steal. And thanks to BO and Hellary, wallstreet theft is legal.
Q1. Why would dumb and dumber want to see your cell phone data at the airports when they already have your data?
Q2. Why is AT&T (a telco) buying Time Warner and HBO?
Q3. Since the paranoia has progressed this far, what are the limits of this insanity?
Q4. Is this the planet you want for your children? What if it’s not?
Not exactly “Power to the People,” is it? Power over, rather. We are being enslaved by our own invention.
It’s nice to see they are making the world a safer – oh, they’re not. Well, nice to see they’re making a profit for themselves and enabling democratically-elected governments to spy on the people that empower them and pay their wages. Bless.
I doubt that MAC insertion refers to snoop gangs searching for users’ MACs because (1) MACs are not transmitted over the Internet beyond the first network and (2) that would be MAC matching not MAC insertion.
MAC insertion here sounds more like a device inserting MACs onto a wire so that it can pretend to be the real router that the remote end is looking to communicate with. MAC spoofing supports not only snooping but also modification, suppression, and insertion of data in transit.
Snoop gangs can use MACs when they have access to the first network – which would usually mean an antenna sniffing for Wifi or cell phones.
I’m not sure this is about MAC address spoofing. “MAC insertion” might just refer to copying selected frames into the outgoing device queue. This explanation seems plausible because 1) it sounds like these devices selectively copy frames and forward them on narrower links for further analysis or storage, 2) as you say, you can’t select on end user MAC addresses, and 3) the MAC sublayer sits right above the PHY layer in the Ethernet standard, so copying frames into an outgoing MAC queue performs minimal processing and thus can be accomplished quite fast.
Yeah, my little brain twirled through the same iterations, starting with the same impression Mike had (“They’re inserting MAC addresses!?!?”). Ultimately, Karl’s proposal seems more likely.
Incidentally, changing and/or spoofing MAC addresses (“early and often”) can be an excellent idea for end users in certain situations.
I’ve been randomly altering mine for years, but I wouldn’t call it a method for improving privacy. I wouldn’t put it past some monitor keying off the process as a flag up for further review by a human somewhere along the way. Simply put, it’s used to annoy the man. The only way to improve privacy is to lost in the “noise of the thundering herd” on the Internet.
It doesn’t help with privacy when you’re at a known or knowable IP (either static or dynamic, but assigned by an ISP to an account to which you can be associated).
It may well help in situations where you might, e.g., be using public/unsecured/guest WiFi networks. In those situations, there’s no baseline to permit associating your MAC-of-the-moment with a previous one. Enhances the possibility of being lost in the noise.
But annoying the man is reason enough by itself. ;^)
FYI, poofing a MAC address on your laptop or similar end user hardware does nothing. The MAC insertion being discussed here is at carrier-level networking.
As a fantasy example, let’s say the NSA is interested in traffic from router 10.10.10.1 whose peer is 10.10.10.2. They spoof 10.10.10.2 and suck up all the data before passing the data back to the real 10.10.10.2. Your personal MAC address is nowhere in those packets. Your personal data may be in there somewhere, some way. But there’s no MAC address.
So, don’t bother spoofing your MAC to “hide.”
All the Endace cards seem to do is convert IP packets travelling over SONET, as passed over international fibre cables, into Ethernet traffic. Presumably this is so they can be processed by computers that have 10Gb Ethernet interfaces. The MAC insertion by IP type sounds like different IP packet types are directed to different computers on Ethernet e.g. UDP traffic separated from TCP. Any evil applications will be down to software running on the computers processing the Ethernet traffic and there is no suggestion in the article that Endace had a hand in that. Whoever wrote this article has little understanding of datacoms. From the information available Endace has been unfairly vilified other than for having some unsavoury customers.
Looking at the bigger picture I concur that it is scary that governments appear to be able to observe nearly all internet communication while trying to keep that capability secret from the general population. I worry about them turning this capability on the general population. History suggests that trusting them not to is unrealistic.
Spot on.
Thank you to the intercept for not only poking at the government side, but also exposing the private sector that profits from building the Orwellian nightmare that this global surveillance system is turning into.
It’s terrifying to think that none of the major party candidates in the US election are the least bit concerned with this topic. In fact, the only thing we’ve heard on it is a couple of times in the debates when Hillary said she wanted an ‘intelligence surge’. To my mind, this gross overreach of government power should be an affront to liberals and conservatives alike, and they should be uniting behind a call to end the panopticon, permanently.
That’s because none of the major (or minor) party candidates (or incumbents) have the least bit of comprehension of this topic. This is way, way over their heads.
It’s way over my head, too.
Really excellent reporting. Thanks to whoever made this reveal possible. So much is hidden away, collusions on high levels so rarefied that principles have evaporated: it explains a lot about how little we know of these concerted pursuits if the participants are sometimes sworn to secrecy out of fraternity or under the stately guise of ‘security.’
These folks sure have made a lot of money in the Nosey Parker business. Such devotion, such nobility.
La plata o plomo.