& cplSiteName &

Prism in a Big Data World

Ray Le Maistre
6/10/2013
50%
50%

The revelations concerning the U.S. National Security Agency (NSA)'s Prism surveillance program and the global implications of that program are fascinating. But are they shocking?

I don't think so. Wherever data is stored in a digital format, it will be accessed by those other than the guardians of that data -- that is a reality in 2013.

And is there a communications service provider in the world that doesn't hand over customer records to security agencies? That would be shocking. Verizon Communications Inc. has been named in the early reports about the NSA's recent activities, but that is just a matter of timing. If this story had broken on another date, it might have been AT&T Inc.

Of course, there is a major ethical debate concerning data security and surveillance strategies and rightly so: There are policies in place globally that enable security agencies to request data downloads from telcos and ISPs but even the suggestion that the NSA is plucking data from the servers of Web services giants as and when it feels the need to do so will likely have major implications for the likes of Apple Inc., Facebook, Google et al. In what way might regular users change their social media habits? Will people be scared to wear Google glasses for fear of having their lives and experiences tracked by an invisible security application? (See NSA Dragnet Debacle: What It Means to IT.)

Whether any debates, rulings or even legal decisions will ever change the modus operandi of any security agencies is, I believe, very much in doubt. It will be business as usual for the spooks that spy on anyone they feel deserves being spied upon, whether domestic or overseas.

Putting aside the ethical issues involved, what the Prism revelations have done is bring the topics of Big Data and analytics under the global spotlight. In that context, it's intriguing just how data is extracted, sorted and examined: Exactly what do the security agencies do with the data and how much "intelligence" can they gather from it? Already the names of various Israeli vendors are being linked to the Prism operations and, again, that doesn't come as a surprise -- if you want the best data technology, then you start by asking companies from the most tech-centric country in the world, right?

All the major CSPs and Web services firms have their own Big Data strategies (for commercial reasons, you understand, though of course there's a major element of "snooping" involved). Those strategies are now set to come under the spotlight too.

After Prism, paranoia could be the next major "P word" of the year. But whatever the fallout from the Prism program, don't expect to be too shocked. Outraged, maybe, but not shocked.

— Ray Le Maistre, Editor-in-Chief, Light Reading

(11)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Page 1 / 2   >   >>
TTDCorp
50%
50%
TTDCorp,
User Rank: Light Beer
8/12/2013 | 11:04:03 PM
re: Prism in a Big Data World
I think I attribute this to Scott McNealy, but we do have to "get over this". Popular URLs and hosts, including required vendors all require us to use tools where they collect and use our information without our consent. How many times using Taco or NoScript do we argue with websites about undisclosed site referrals, even if we were to read the fair use policy. Very popular sites, including light reading. Even if the sites did not use the information pro-actively; the information is enabled in the tools and protocol raw records we enable for the industry.

My only two concerns have been mitigated by the sheer fire-hose method of collecting information and inability for operations groups to effectively store, search and effectively apply decisions. The two concerns I have 1) the people and companies who capture data - what they can manage and then abuse what they are able to manage, organized crime is all over their own hydrants and all over everyone else's hydrant. Why not the government? 2) There are trusted people/companies who are learning to capture and use what they can to make a half informed decision. Perfect example of #2 a) how many of us log-into Vz as a vendor, as an applicant, as a customer, as a agent for mutual business partners. You simply cannot use your log-ins and profiles on the Vz website with any success. You have not been able to for more than 10 years. example b) is as innocent as the 1999 conversion of Google from search results obtained through the crawler analysis they gained market share with. When transitioning to relative-results associated to SIC results associated with advertisers. All simple search became obscured by the three metrics, Today, I believe it is impossible to get a website address to an authorative site with a query. Then again, many sites try marking their sites private from crawlers as if the crawler would honor the request

We as technology enable a lot of people by default in protocols. We have no enforcement ability and worse yet nobody willing to pay us to enforce the use of the tools.

So get-over this issue. We let anyone with our technical skills and test tools access our data. As a country we enabled Satellite and trans-ocean cables only on the condition that all information was collected. As a government we grabbed all security/encryption keys. Way before 9/11 we enabled SF and Seattle storage and analysis offices adjacent to telecommunication offices for the government. Even if we wanted to enforce ethics, we are not willing to pay anyone to be vigilant.
Ray Le Maistre
50%
50%
Ray Le Maistre,
User Rank: Light Sabre
6/11/2013 | 8:57:25 AM
re: Prism in a Big Data World
Johan, I think you hit the key point -- this sort of program, behavior and strategy is preventable "if there is a political will to do so."
Not just at the politicians' level (those currently elected representatives) but also those that carry out the day-to-day tasks of 'government' (including security) ie in the U.S. the CIA.

My view is that the political will is very much along the lines of "we know what's best, we'll do what's necessary" and that involves breaking pretty much every 'rule' in the book.

You can't hide a nuclear bomb, which is why there is such clear accountability. Cybersnooping is invisible until uncovered and the top folks always have an alibi.

Am I resigned? In a way. I see it more as being a realist than being resigned. That doesn't mean I don't think actions should not be taken to prevent this from happening.
This is a crime against the populace. Let's see if anyone is held to account and actions taken to prevent it happening again.
Ray Le Maistre
50%
50%
Ray Le Maistre,
User Rank: Light Sabre
6/11/2013 | 7:11:59 AM
re: Prism in a Big Data World
Not an earlier piece - just noted earlier in the blog. And I didn't go deep into the ethics because that would be repeating what 10,000 analysis articles from around the world during the past few days have focused on (quite rightly so).
And I held myself back, also, on noting how completely embarrassing the quite insulting response of the governing British politicians has been so far, particularly the UK foreign secretary, William Hague. I can't figure out whether he is stupid or if he thinks we're all stupid. I go for a combination of both.
Johan
50%
50%
Johan,
User Rank: Light Beer
6/11/2013 | 6:46:54 AM
re: Prism in a Big Data World
This article reeks of resignation. Sure, spies will always try to get all the information they can, but this is perfectly stoppable if there is a political will to do so. This kind of project is not something that can be done in a garage in a suburb. As telecom professionals we understand the infrastructure and resources that are needed - it's doable but quite massive. Since it is massive, it is also stoppable.

As experts we have an obligation to explain this.
Also, I'm struck with the lack of imagination as to what could go wrong with Prism. "Ethics aside", putting such power in the hands of thousands of humans (mostly men, I'm afraid) is outright scary. This is the nuclear bomb option of information gathering, but we don't let consultants decide whether to launch a missile.
Again, we are experts here, and we can all tell stories about humans screwing up telco networks. I think we have an obligation as experts to try to raise the level of the debate.
Johan
50%
50%
Johan,
User Rank: Light Beer
6/11/2013 | 6:32:22 AM
re: Prism in a Big Data World
Have you not done anything wrong or embarassing in your life? Congratulations.

You should be concerned about your democracy. Just as an obvious example, consider what would happen if Obama is a new Nixon, or if the director of NSA would have political ambitions. They have full access to the internal communication of the republican party, and the private communication of all the GOP candidates. They could feed the media 24/7 with nasty stuff and destroy any candidate they wish. Already at this point one must ask: Would the politicians dare to actually challenge NSA?

You should also be concerned as an individual. What if your wife's jealous ex gets a consulting job at NSA?

You should be concerned for your country's security. "Forces of evil" will sooner or later get an agent into the NSA system. This is inevitable, history tells us (There are 500 000 people involved). Just try to imagine the kind of information such a spy could get about the POTUS, the military, you name it.

What happens when a Snowden type decides to sell his knowledge instead?
philharvey
50%
50%
philharvey,
User Rank: Light Beer
6/11/2013 | 12:49:28 AM
re: Prism in a Big Data World
Or, Manoj, to flip your argument around, why should I welcome being treated like a criminal when I've done nothing wrong?
philharvey
50%
50%
philharvey,
User Rank: Light Beer
6/11/2013 | 12:41:36 AM
re: Prism in a Big Data World
Ooh. I didn't see the earlier piece. Granted, it's hard for me to see beyond the ethical, for the moment. It's so friggin' egregious and completely embarrassing.

And, yes, my 4square account looks like that of a man the government should pay attention to, especially if they want to know where gin and aged red wine is stored near the world's busiest train stations and bus stops.
Ray Le Maistre
50%
50%
Ray Le Maistre,
User Rank: Light Sabre
6/10/2013 | 11:53:34 PM
re: Prism in a Big Data World
People get concerned because it's an invasion of their civil liberties.
And, It has been shown time and time again that people who have not done anything 'wrong' have been persecuted by government agencies who collected information about them and drew either inaccurate conclusions or pursued politically (or other)-motivated campaigns against them. In the minds of those in power, nearly every adult can be construed to have done something wrong or be a potential wrongdoer.
Ray Le Maistre
50%
50%
Ray Le Maistre,
User Rank: Light Sabre
6/10/2013 | 11:48:51 PM
re: Prism in a Big Data World
Having already mentioned the ethical issue(s), I was 'putting them aside' (not ignoring them) to address some of the considerations not purely in the ethical domain ie. the actual processes involved in the access to, extraction and analysis of the data involved and the potential 'intelligence' outcome.

I am not for one minute suggesting that any clandestine access of digital (or non-digital) data is anything other than wrong, on many levels.

BY the way, your recent travel schedule, as identified by the analysis of your Foursquare data, suggests you hung out with some rather dodgy characters in some rather unsavoury establishments while in London recently...:-o
Manoj
50%
50%
Manoj,
User Rank: Light Beer
6/10/2013 | 8:21:51 PM
re: Prism in a Big Data World
I dont feel that this needs to be hyped this much. And I dont think this is something new. Even before this new IT world, we should remember government and intelligence agencies used to collect the data they need by different means.
Also, its not something which happens just in the USA. Not mentioning the country names here, but I have read allegations against various other governments doing similar things, asking google, blackberry or similar sevices to provide the data that the government needs and all...

After all, why should anyone get concerned if you are not doing anything wrong...
Page 1 / 2   >   >>
Educational Resources
sponsor supplied content
Educational Resources Archive
More Blogs from EuroBlog
Having taken a breather from its acquisition spree in the US, Zayo could kick-start some infrastructure consolidation action in Europe
Some good news for its Finnish parent – Nokia Siemens Networks is on a margin roll
Telefónica to boost its broadband lines in LatAm with DSL management the from ASSIA
According to the value of Nokia's takeover deal, Nokia Siemens Networks is worth less than $5B
As APAC and North America forge ahead, Europe seems stuck in yesteryear
Light Reading’s Upskill U is a FREE, interactive, online educational resource that delivers must-have education on themes that relate to the overall business transformation taking place in the communications industry.
NEXT COURSE
Wednesday, September 14, 1:00PM EDT
What Is Agile?
Kent J. McDonald, Product Owner, Agile Alliance
UPCOMING COURSE SCHEDULE
Friday, September 16, 1:00PM EDT
How to Implement Agile
,
Wednesday, September 21, 1:00PM EDT
What Is DevOps?
Colin Kincaid, CTO, Service Provider, Cisco
Friday, September 23, 1:00PM EDT
How to Implement DevOps
,
in association with:
From The Founder
Light Reading today starts a new voyage as part of a larger Enterprise.
Flash Poll
Live Streaming Video
Charting the CSP's Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
LRTV Custom TV
F5 Virtual Network Function Integrations With Partner Orchestration Platform

8|24|16   |   6:38   |   (0) comments


F5's Kishore Patnam, product manager for F5's service provider solutions, discusses why service providers are moving towards virtualization and how his clients are utilizing F5's solutions.
Between the CEOs
CEO Chat: Intel's Alexis Black Bjorlin

8|17|16   |   06:23   |   (0) comments


Join us for an in-depth interview between Steve Saunders of Light Reading and Alexis Black Bjorlin of Intel as they discuss the release of the company's Silicon Photonics platform, its performance, long-term prospects, customer expectations and much more.
Telecom Innovators Video Showcase
Accelerating Telecom Digital Transformation With Nominum DNS

8|1|16   |   12:04   |   (0) comments


Light Reading's Steve Saunders gets an update from Nominum CEO Gary Messiana on how his company is helping carriers on the digital transformation journey.
LRTV Custom TV
Reinventing Operations for a Virtual, Software-Defined World

7|28|16   |   5:23   |   (0) comments


Heavy Reading Senior Analyst Jim Hodges speaks with Accenture's Larry Socher and Matt Anderson about what service providers must do to transform their business to get the benefits of SDN and NFV including: leveraging DevOps, introducing real-time OSS and implementing analytics.
Women in Comms Introduction Videos
Fujitsu Sales Leader Shares Lessons Learned

7|27|16   |   5:12   |   (1) comment


As Fujitsu's only female sales leader, Annie Bogue knows the importance of asking for what you want, being flexible (she's been relocated five times), keeping a meticulous calendar, 'leaning in,' working harder than everyone else around you, being aware and more.
Telecom Innovators Video Showcase
VeEX Test & Measurement Solutions

7|25|16   |   08:57   |   (0) comments


Cyrille Morelle, president and CEO of VeEX Inc., talks test and measurement with Light Reading's Steve Saunders at BCE 2016. This includes innovative products such as VeSion Cloud-Based platform for network monitoring; MTTplus Modular Test platform for Access, Business, Carrier Ethernet, Transport and Core services; and OPX-BOX+ for Fiber Optics.
LRTV Custom TV
VeEX: Live From BCE 2016

7|25|16   |   03:20   |   (0) comments


VeEX's Senior Director of Business Development, Perry Romano, explains how VeEX provides tools to help install, maintain, monitor and manage network infrastructure efficiently and effectively. The portfolio of products on display include the RXT-6000, MTTplus and TX300s.
LRTV Custom TV
Real-Time Telemetry & Analytics for Intelligent SDN Orchestration

7|25|16   |   03:09   |   (0) comments


Packet Design CEO Scott Sherwood discusses how real-time network telemetry and analytics are enabling a new breed of SDN orchestration applications.
From the Founder
The Russo Report: Driving Disruption

7|25|16   |   07:44   |   (2) comments


In the first episode of a four-part series, Light Reading Founder and CEO Steve Saunders and Calix President and CEO Carl Russo drive around town discussing the disruptive mega-changes in the communications industry and where hope lies for service providers to meet the escalating demands of the cloud.
LRTV Custom TV
NetScout: Maximizing Enterprise Cloud for Digital Transformation

7|20|16   |   04:53   |   (0) comments


Light Reading Editor Mitch Wagner talks to NetScout CMO Jim McNiel about maximizing the benefits of enterprise cloud and digital transformation while minimizing potential pitfalls with a proper monitoring and instrumentation strategy.
Women in Comms Introduction Videos
Ciena's VP Offers a Career Crash Course

7|20|16   |   4:14   |   (2) comments


How did Ciena's Vice President of Sales, Angela Finn, carve out her career path? Simple, she tells WiC. She stayed true to her company, customers and principles. She shares her advice for women on how to be authentic and credible, as well as for companies that want to make a real change to their culture and practices.
LRTV Custom TV
NFV in 2016: Part 2 – Climbing the Virtualization Maturity Curve

7|19|16   |   06:56   |   (0) comments


Many of the initial use case implementations are single-vendor and self-contained. The industry is still climbing the virtualization maturity curve, needing further clarity and stability in the NFV infrastructure (NFVi) and greater availability and choice of virtualized network functions (VNFs). Interoperability between NFVis and VNFs from different vendors ...
Upcoming Live Events
September 13-14, 2016, The Curtis Hotel, Denver, CO
November 3, 2016, The Montcalm Marble Arch, London
November 30, 2016, The Westin Times Square, New York City
December 1, 2016, The Westin Times Square, New York, NY
December 6-8, 2016, The Westin Excelsior, Rome
May 16-17, 2017, Austin Convention Center, Austin, TX
All Upcoming Live Events
Infographics
Five of the Top 10 most targeted countries in Check Point Software Technologies' global Malware & Threat Index for Q1 2016 are in Africa.
Hot Topics
Cisco Developing 'Monica' Digital Assistant
Mitch Wagner, West Coast Bureau Chief, Light Reading, 8/22/2016
VoLTE Can Drive 4G Small Cells Adoption
Ravi Narayanan, Senior Analyst – Cloud & Next Generation Mobile Networks, Heavy Reading, 8/18/2016
'Most Wanted' Kobi Comes Home
Ray Le Maistre, Editor-in-chief, 8/23/2016
Rocket Fiber Lights Up Detroit With Gigabit
Elizabeth Miller Coyne, Managing Editor, 8/22/2016
CCIA Counter-Attacks on Set-Top Proposal
Mari Silbey, Senior Editor, Cable/Video, 8/23/2016
Like Us on Facebook
Twitter Feed
BETWEEN THE CEOs - Executive Interviews
Join us for an in-depth interview between Steve Saunders of Light Reading and Alexis Black Bjorlin of Intel as they discuss the release of the company's Silicon Photonics platform, its performance, long-term prospects, customer expectations and much more.
There's no question that, come 2020, 5G technology will turn the world's conception of what mobile networking is on its head. Within the world of 5G development, Dr. ...
Animals with Phones
Live Digital Audio

Bridging the tech skills gap is a major challenge for service providers and suppliers alike today – and the challenge is two-fold when it comes to increasing the number of women in the comms space. Level 3 Communications has made it a priority to overcome both challenges by implementing several unique programs focused on building the right candidates from within – in addition to filling the funnel by supporting STEM and other education programs. During this radio show, you’ll learn about these programs from Mary Beth McGrath, SVP of Global Talent Management at Level 3, and the best ways to bridge your own skills gap so that you are motivated and equipped for change. Plus you’ll have the chance to ask Mary Beth your questions live on the air.