Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Iran's Web Spying Aided By Western Technology

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU
 
question everything Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jun-22-09 01:35 PM
Original message
Iran's Web Spying Aided By Western Technology
JUNE 22, 2009

Iran's Web Spying Aided By Western Technology
European Gear Used in Vast Effort to Monitor Communications

By CHRISTOPHER RHOADS in New York and LORETTA CHAO in Beijing
WSJ

The Iranian regime has developed, with the assistance of European telecommunications companies, one of the world's most sophisticated mechanisms for controlling and censoring the Internet, allowing it to examine the content of individual online communications on a massive scale. Interviews with technology experts in Iran and outside the country say Iranian efforts at monitoring Internet information go well beyond blocking access to Web sites or severing Internet connections.

Instead, in confronting the political turmoil that has consumed the country this past week, the Iranian government appears to be engaging in a practice often called deep packet inspection, which enables authorities to not only block communication but to monitor it to gather information about individuals, as well as alter it for disinformation purposes, according to these experts. The monitoring capability was provided, at least in part, by a joint venture of Siemens AG, the German conglomerate, and Nokia Corp., the Finnish cellphone company, in the second half of 2008, Ben Roome, a spokesman for the joint venture, confirmed. The "monitoring center," installed within the government's telecom monopoly, was part of a larger contract with Iran that included mobile-phone networking technology, Mr. Roome said. "If you sell networks, you also, intrinsically, sell the capability to intercept any communication that runs over them," said Mr. Roome.

(snip)

The Iranian government had experimented with the equipment for brief periods in recent months, but it had not been used extensively, and therefore its capabilities weren't fully displayed -- until during the recent unrest, the Internet experts interviewed said... Deep packet inspection involves inserting equipment into a flow of online data, from emails and Internet phone calls to images and messages on social-networking sites such as Facebook and Twitter. Every digitized packet of online data is deconstructed, examined for keywords and reconstructed within milliseconds. In Iran's case, this is done for the entire country at a single choke point, according to networking engineers familiar with the country's system. It couldn't be determined whether the equipment from Nokia Siemens Networks is used specifically for deep packet inspection.

(snip)

China's vaunted "Great Firewall," which is widely considered the most advanced and extensive Internet censoring in the world, is believed also to involve deep packet inspection. But China appears to be developing this capability in a more decentralized manner, at the level of its Internet service providers rather than through a single hub, according to experts. That suggests its implementation might not be as uniform as that in Iran, they said, as the arrangement depends on the cooperation of all the service providers. The difference, at least in part, has to do with scale: China has about 300 million Internet users, the most of any country. Iran, which has an estimated 23 million users, can track all online communication through a single location called the Telecommunication Infrastructure Co., part of the government's telecom monopoly. All of the country's international links run through the company.

(snip)

Countries with repressive governments aren't the only ones interested in such technology. Britain has a list of blocked sites, and the German government is considering similar measures. In the U.S., the National Security Agency has such capability, which was employed as part of the Bush administration's "Terrorist Surveillance Program." A White House official wouldn't comment on if or how this is being used under the Obama administration. The Australian government is experimenting with Web-site filtering to protect its youth from online pornography, an undertaking that has triggered criticism that it amounts to government-backed censorship.

(snip)

http://online.wsj.com/article/SB124562668777335653.html (subscription)

Printed in The Wall Street Journal, page A1

Printer Friendly | Permalink |  | Top
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jun-22-09 01:59 PM
Response to Original message
1. Part of the Wide, Wide World of surveillance technology developed in Israel, first marketed in US,
Edited on Mon Jun-22-09 02:13 PM by leveymg
resold to Europe (ETSI), copied by China (Great Wall), swapped with Iran (Telecom Infrastructure).

Israeli companies NARUS and VERINT were the first to manufacture this sort of web-based network surveillance technology mandated by amendments to the 1994 CALEA Act for installation by all US telcos and ISPs. These companies are still industry leaders. So, today we have a circle of nearly universal state surveillance of the web. The irony of this is almost inescapable.

A nice big circle of Big Brothers.


http:/cable.tmcnet.com/news/articles/1634-narus-pen-link-partner-deliver-calea-compliant-lawful.htm
June 22, 2006

Narus, Pen-Link, Partner to Deliver CALEA-Compliant Lawful Intercept Solution

By Patrick Barnard
TMCnet Associate Editor


--------------------------------------------------------------------------------


Narus and Pen-Link, which both provide software and systems for the collection, storage and analysis of call data and content, have reportedly teamed up to provide a lawful intercept solution that is fully compliant with the CALEA T1.678 VoIP standard in the United States, as well as the European ETSI TS 102 232/233/234 standards for Internet access and e-mail.

News of the partnership was announced June 13 - just days after the FCC (News - Alert) upheld a ruling that CALEA must be applied to all IP communications, including VoIP, for law enforcement purposes. VoIP service providers have until May of 2007 to comply with the FCC ruling - and, as per a separate action recently taken by the FCC, have until Aug. 1, 2006, to have the appropriate wiretapping equipment installed on their networks.

The agreement between the companies means they will work together to market the NarusInsight Intercept Suite (NIS) software in conjunction with Pen-Link’s LINCOLN 2 intercept collection and reporting solution. By combining the two solutions, the companies claim they have developed a single, turn-key solution which can be used by a wide variety of operators delivering services over a range of network architectures. The tested, combined solution is said to ensure “seamless integration and easy implementation for carriers - paramount as they strive to meet their respective government’s regulatory requirements.”

“Pen-Link’s relationship with Narus marks both companies’ continued dedication to providing the most comprehensive solution available for lawful intercept compliance,” said Mike Murman, CEO of Pen-Link, in a press release. “We are keenly aware of the difficulties surrounding the implementation of lawful intercept components that do not properly adhere to regulatory standards. Both Pen-Link and Narus have tremendous experience with LEAs and standards bodies around the world. We’ve leveraged that wealth of experience to deliver the industry’s most comprehensive end-to-end LI solution.”

Narus claims NarusInsight “is the only carrier-class IP traffic processing system that provides the complete, real-time network visibility essential to secure, manage and deliver Services over IP (SoIP).” The software, which serves as the foundation for many IP security, intercept and traffic classification applications, “is unique in its ability to simultaneously provide deep packet inspection from layer 3 to layer 7 and complete correlation across every link and element on the network.” The software can be deployed on the edge, on the network backbone, or both, and provides “additional application functionality that can turn the ‘sunk cost’ of LI into support for revenue-generating applications, such as IP security and traffic classification.”

Pen-Link’s LINCOLN 2 consists of a “collection server” that manages and distributes call content (CDC/HI2) and call data (CCC/HI3). According to the company’s website, the software “was developed in the mid-1990s to function as the front-end, real-time collection server for all advanced telecommunications that comply with U.S. Communication Assistance to Law Enforcement Agencies (CALEA) and the European Telecommunications Standards Institute (ETSI).” The company has also created interfaces proprietary standards such as the British GISH and other individual, country-based requirements.

LINCOLN 2 is designed to work with Pen-Link 8 – software which combines all intelligence data bases, reporting, GIS Mapping, and analysis graphics into one package. Pen-Link claims it is “the standard for nearly all law enforcement agencies in the United States and is experiencing wide-spread adoption internationally.” When combined, the two pieces of software enable law enforcement agents to seamlessly access call data and call content from a service provider’s interception delivery system, thus enabling an “authorized government’s collection system to receive all intelligence related to a call or session event in real-time.”

Narus and Pen-Link have each worked for a number of years in the area of legal intercept software solutions (as has SS8, another major player in this market), and, as a result, both companies are well-positioned to capitalize on the regulatory challenges U.S. service providers will be facing as the FCC’s deadline for CALEA compliance draws nearer.

For more information, visit www.narus.com and www.penlink.com.

--------
Printer Friendly | Permalink |  | Top
 
bananas Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jun-22-09 03:19 PM
Response to Original message
2. k&r nt
Printer Friendly | Permalink |  | Top
 
anigbrowl Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jun-22-09 03:48 PM
Response to Original message
3. Flatly denied by Nokia/Siemens - strictly for your info
That is, I have no opinion on who's telling the truth here, N/S or the WSJ. It would take time to research which I don't have right now.

http://www.nokiasiemensnetworks.com/global/Press/Press+releases/news-archive/Provision+of+Lawful+Intercept+capability+in+Iran.htm
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jun-22-09 03:55 PM
Response to Reply #3
4. You're probably right - the deep packet technology is CALEA compliant type intercept equipment
Edited on Mon Jun-22-09 04:12 PM by leveymg
This would be third-party vendor add-on equipment, not an inherent part of telco cell system made by Nokia.

Likely source would be the Chinese, who cribbed it from a western design.

What a sad irony that it's probably Israeli export technology being used by the hated Revolutionary Guards to track down election protesters in Tehran. Another indiscriminate weapon of state control. More blowback.

Interesting description by Nokia of what their "limited functionality" "legal intercept" center can not do (as opposed to what a full-blown NSA/Chinese Great Firewall or similar system can):

The restricted functionality monitoring center provided by Nokia Siemens Networks in Iran cannot provide data monitoring, internet monitoring, deep packet inspection, international call monitoring or speech recognition. Therefore, contrary to speculation in the media, the technology supplied by Nokia Siemens Networks cannot be used for the monitoring or censorship of internet traffic.
Printer Friendly | Permalink |  | Top
 
question everything Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-24-09 10:42 AM
Response to Reply #3
5. Thanks. This is good to know
though, I am sure, the Iranians are spying with whatever means they have.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu May 02nd 2024, 07:52 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC