<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Inter Press ServiceGlimmerglass Topics</title>
	<atom:link href="https://www.ipsnews.net/topics/glimmerglass/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ipsnews.net/topics/glimmerglass/</link>
	<description>News and Views from the Global South</description>
	<lastBuildDate>Wed, 13 May 2026 08:17:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
		<item>
		<title>Eavesdropping on the Whole World</title>
		<link>https://www.ipsnews.net/2013/08/eavesdropping-on-the-whole-world/</link>
		<comments>https://www.ipsnews.net/2013/08/eavesdropping-on-the-whole-world/#respond</comments>
		<pubDate>Sat, 24 Aug 2013 12:03:08 +0000</pubDate>
		<dc:creator>Pratap Chatterjee</dc:creator>
				<category><![CDATA[Africa]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Regional Categories]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Glimmerglass]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[telecommunications]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=126807</guid>
		<description><![CDATA[How do U.S. intelligence agencies eavesdrop on the whole world? The ideal place to tap trans-border telecommunications is undersea cables that carry an estimated 90 percent of international voice traffic. These cables date back in history to 1858 when they were first installed to support the international telegraph system, with the British taking the lead [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Pratap Chatterjee<br />BERKELEY, California, Aug 24 2013 (IPS) </p><p>How do U.S. intelligence agencies eavesdrop on the whole world? The ideal place to tap trans-border telecommunications is undersea cables that carry an estimated 90 percent of international voice traffic.<span id="more-126807"></span></p>
<p>These cables date back in history to 1858 when they were first installed to support the international telegraph system, with the British taking the lead to wire the far reaches of its empire. Today a multi-billion dollar shipping industry continues to lay and maintain hundreds of such cables that crisscross the planet &#8211; over half a million miles of such cables are draped along the ocean floor and snaked around coastlines &#8211; to make landfall at special locations to be connected to national telecommunications systems.</p>
<p>The original cables were made of copper but about 25 years ago, they were replaced by fibre-optic cables. The oldest undersea cable was Trans Atlantic-8 (installed in 1988 by AT&amp;T to transmit data from Tuckerton, New Jersey to Bude, Cornwall) which transmitted data at 280 megabits per second.</p>
<p>The latest cables like Yellow/Atlantic Crossing 2 (installed in 2000 and upgraded in 2007 by Level Three Communications from Brookhaven, New York to Bude, Cornwall) is capable of transmitting data at an astonishing 640 gigabits per second, which is roughly equal to 7.5 million simultaneous phone calls.</p>
<p>In order to make sure that data and voice are transmitted quickly and accurately across the world even if cables break or equipment fails, cable companies break the data into separate tiny packets that are dispatched over what they call &#8220;redundant fibre optic paths&#8221; across the ocean before it is captured and re-assembled on the other side, where it also becomes easy to intercept the data unobtrusively.</p>
<p>This is where Glimmerglass, a northern California company that sells optical fibre technology, comes in. In September 2002, the company started to ship a pioneering technology to help transmit data accurately over multiple optical paths.</p>
<p>Their patented &#8220;3D Micro-Electro-Mechanical-System (MEMS) mirror array&#8221; is composed of 210 gold-coated mirrors mounted on microscopic hinges, each measuring just one millimeter in diameter, etched on a single wafer of silicon.</p>
<p>Each mirror can be individually managed by remote operators anywhere in the world to capture or bounce the light signals and even more importantly, communicate with the other mirrors to make sure that the rest of the array stays in place, allowing very accurate data transmission. This technology slashed the cost of optical switching by a factor of 100, and the company claims that the switches are very robust with an expected failure rate of once in 30 years.</p>
<p>For telecommunication companies, Glimmerglass offers three hardware racks to handle optical data &#8211; the entry level &#8220;100&#8221; system which can handle as many as 96&#215;96 fibre ports for traffic as high as 100 gigabits per second all the way up to the &#8220;600&#8221; system which can handle 192&#215;192 fibre ports. It also offers the &#8220;3000&#8221; system which can hold up to 12 racks.</p>
<p>A major advantage of the Glimmerglass technology, according to the company, is that operators can &#8220;monitor and test remote facilities&#8221; at undersea cable landings from a central office and then select any one of multiple optical signals to distribute it to multiple recipients, as well as the ability to redirect any signal.</p>
<p>&#8220;With Glimmerglass Intelligent Optical Systems, any signal travelling over fibre can be redirected in milliseconds, without adversely affecting customer traffic,&#8221; the company writes on its website. &#8220;At a landing site, this connectivity permits optical layer connections between the wet side and dry side to be re-provisioned in milliseconds from the Network Operations Center with a few clicks of a mouse.&#8221;</p>
<p>In another section of the public website the company also promotes a product named Glimmerglass Intelligent Optical System (IOS) that combines the 3D-MEMS switches with another Glimmerglass product called CyberSweep into an integrated product that has the ability to &#8220;monitor and selectively intercept communications&#8221;.</p>
<p>&#8220;Service Providers can use the speed and flexibility of the IOS to select and deliver signals to Law Enforcement Agencies (LEA),&#8221; add company brochures uncovered by Wikileaks. &#8220;The agency gains rapid access, not just to signals, but to individual wavelengths on those signals (and) make perfect photonic copies of optical signals for comprehensive analysis.&#8221;</p>
<p>Could the new Glimmerglass optical switching technology be the means by which the U.S. National Security Agency (NSA) is tapping international phone calls, as revealed by whistleblower Edward Snowden to the Guardian newspaper?</p>
<p>Vanee Vines, a spokesperson for the NSA, declined to comment on either Glimmerglass or the tapping of the undersea cables. Glimmerglass officials did not return multiple email and phone calls.</p>
<p>But Glimmerglass has told industry media that it sells this technology to some major government intelligence agencies.</p>
<p>&#8220;We&#8217;ve become a gold standard in the intel and defence community. They&#8217;re managing these optical signals so they can acquire, split, move and obtain the necessary information to protect the country,&#8221; Robert Lundy, the CEO of Glimmerglass for the last nine years, told Fierce Telecom, an industry blog, in an interview about global malware threats.</p>
<p>&#8220;At their undersea landing locations, their major points of presence, on a selective basis they need to acquire and monitor those optical signals rather than wait to get it off somebody&#8217;s, when it hits a PC or cellphone.&#8221;</p>
<p>Keith May, his deputy in charge of business development, has gone even further. &#8220;We believe that our 3D MEMS technology &#8211; as used by governments and various agencies &#8211; is involved in the collection of intelligence from sensors, satellites and undersea fibre systems,&#8221; May told the magazine. &#8220;We are deployed in several countries that are using it for lawful interception.&#8221;</p>
<p><strong>Fulfilling a dream</strong></p>
<p>Analysis of bulk telecommunications data to track as yet unknown targets has long been on the NSA wish list. For decades, the agency stuck to following specific individuals because there was no way to capture and analyse everything.</p>
<p>In 2000, two rival projects were commissioned to try to collect &#8220;all the signals all the time&#8221;. Science Applications International Corporation, based in Tyson&#8217;s Corner, Virginia, was given a contract to design a collection system called TrailBlazer, while the NSA&#8217;s in-house Signals Intelligence Automation Research Center (SARC) worked on a project called ThinThread.</p>
<p>TrailBlazer was eventually jettisoned as unworkable after 1.2 billion dollars had been spent. ThinThread was more successful, according to its proponents, because it was able to selectively process important information and dump the rest. The designers also created controls to anonymise the data collection to avoid violating privacy laws.</p>
<p>ThinThread could &#8220;correlate data from financial transactions, travel records, Web searches, G.P.S. equipment, and any other &#8216;attributes&#8217; that an analyst might find useful in pinpointing &#8216;the bad guys,'&#8221; writes Jane Mayer in the New Yorker magazine, based on her interviews with former NSA staff.</p>
<p>Unfortunately for the SARC team, ThinThread was vetoed by upper management at the NSA in August 2001. But after the Sep. 11, 2001 attacks, the NSA is believed to have returned to the drawing board. Rumor has it that the project was restarted, stripped of any privacy controls.</p>
<p>Some of the scientists who worked on the project recently came forward to say that they had made a mistake.</p>
<p>&#8220;I should apologise to the American people,&#8221; William Binney, a former NSA staffer who was in charge of designing ThinThread, told Mayer. &#8220;It&#8217;s violated everyone&#8217;s rights. It can be used to eavesdrop on the whole world.&#8221;</p>
<p><em>Pratap Chatterjee is executive director of CorpWatch. This story originally appeared on <a href="http://www.CorpWatch.org">CorpWatch.org</a>.</em></p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/08/glimmerglass-taps-undersea-cables-for-spy-agencies/" >Glimmerglass Taps Undersea Cables for Spy Agencies</a></li>
<li><a href="http://www.ipsnews.net/2013/08/spying-scandal-engulfs-other-u-s-agencies/" >Spying Scandal Engulfs Other U.S. Agencies</a></li>
<li><a href="http://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/" >Fight over NSA Spying Spills into U.S. Courts</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/08/eavesdropping-on-the-whole-world/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Glimmerglass Taps Undersea Cables for Spy Agencies</title>
		<link>https://www.ipsnews.net/2013/08/glimmerglass-taps-undersea-cables-for-spy-agencies/</link>
		<comments>https://www.ipsnews.net/2013/08/glimmerglass-taps-undersea-cables-for-spy-agencies/#respond</comments>
		<pubDate>Fri, 23 Aug 2013 14:18:55 +0000</pubDate>
		<dc:creator>Pratap Chatterjee</dc:creator>
				<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Glimmerglass]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=126783</guid>
		<description><![CDATA[Glimmerglass, a northern California company that sells optical fibre technology, offers government agencies a software product called &#8220;CyberSweep&#8221; to intercept signals on undersea cables. The company says their technology can analyse Gmail and Yahoo! Mail as well as social media like Facebook and Twitter to discover &#8220;actionable intelligence&#8221;. Could this be the technology that the [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Pratap Chatterjee<br />BERKELEY, California, Aug 23 2013 (IPS) </p><p>Glimmerglass, a northern California company that sells optical fibre technology, offers government agencies a software product called &#8220;CyberSweep&#8221; to intercept signals on undersea cables.<span id="more-126783"></span></p>
<p>The company says their technology can analyse Gmail and Yahoo! Mail as well as social media like Facebook and Twitter to discover &#8220;actionable intelligence&#8221;.</p>
<p>Could this be the technology that the U.S. National Security Agency (NSA) is using to tap global communications? The company says it counts several intelligence agencies among its customers but refuses to divulge details. One thing is certain &#8211; it is not the only company to offer such capabilities &#8211; so if such data mining is not already taking place, that day is not far off.<div class="simplePullQuote"><b>The GCHQ Advantage</b><br />
<br />
Why go overseas to collect the data? Well, there are legal obstacles in the U.S. to collecting phone calls made by U.S. citizens - such a programme would violate the fourth amendment to the U.S. constitution that protects individuals against invasion of privacy. (Exceptions are granted for communications with foreigners if government agencies suspect terrorism under a 1981 presidential executive order, although they still need approval of the U.S. Attorney General).<br />
<br />
But given that U.S. laws stop at the border, foreign spy agencies like GCHQ can legally pick up and store any and all information from data that travels outside the country, suggest reporters at the Guardian newspaper.<br />
<br />
"We know the NSA is forbidden from spying on American citizens; in the case of (Faizal) Shahzad (the would-be Times Square bomber in New York), this question remains - was GCHQ doing it for them?" ask the Guardian reporters, noting that the GCHQ now has the "opportunity to build such a complete record of someone's life through their texts, conversations, emails and search records" allowing it to make a "unique contribution to the NSA in providing insights into some of their highest priority targets."</div></p>
<p>&#8220;Revolutions in communications technologies are usually followed by revolutions in collection capabilities,&#8221; said Jeffrey Richelson, a senior fellow at the National Security Archives and the author of the definitive guide to the U.S. intelligence agencies.</p>
<p>The recent leaks by whistleblower Edward Snowden to the Guardian newspaper specifically suggest that the NSA is tapping undersea cables, although no details on the specific technology have yet been published. Notably Snowden has revealed evidence that the NSA paid 15.5 million pounds (25 million dollars) in 2009 to &#8220;radically&#8221; upgrade a listening station operated by its U.K. equivalent &#8211; the Government Communications Head Quarters (GCHQ) in Bude, north Cornwall, England, where many of the cables surface.</p>
<p>If GCHQ and the NSA installed Glimmerglass&#8217;s commercial optical fibre switching technology on the undersea cables to tap the torrent of data that crosses the Atlantic, they will be able to pair it up with CyberSweep to make sense of the information, according to advertising claims made in a treasure trove of documents on dozens of surveillance contractors released by Wikileaks.</p>
<p>Privacy experts say that if the NSA is using this Glimmerglass technology, it will prove whistleblower Edward Snowden&#8217;s claim that the government is collecting everyone&#8217;s communications, regardless of their citizenship or innocence.</p>
<p>Vanee Vines, a spokesperson for the NSA, declined to comment to IPS on either Glimmerglass or the tapping of the undersea cables. Glimmerglass officials did not return multiple email and phone calls.</p>
<p><strong>CyberSweep</strong></p>
<p>On the Glimmerglass website, the company claims that CyberSweep can process optical signals to &#8220;extract the data source format&#8221; and aggregate the data for &#8220;probes&#8221; to uncover &#8220;actionable information from the flood of data on persons of interest, known and unknown targets, anticipated and known threats.&#8221;</p>
<p>More details on what Glimmerglass claims CyberSweep can do are explained in &#8220;Paradigm Shifts&#8221; &#8211; a confidential 18 page Powerpoint presentation made in 2011 by Jim Donnelly, the Glimmerglass vice president of North American sales. The document was released by Wikileaks as part of the Spy Files series in December of that year.</p>
<p>On page five of the presentation, Glimmerglass notes that CyberSweep is an &#8220;end to end cyber security solution&#8221; that can &#8220;select, extract and monitor&#8221; all &#8220;mobile and fixed line data, voice and video, internet, web 2.0 and social networking&#8221; with &#8220;probes and sniffers.&#8221; On the following page, it notes that its product can be used at &#8220;submarine landing stations&#8221; &#8211; a reference to the locations where the undersea cables are connected to terrestrial systems.<div class="simplePullQuote"><b>Are Companies Helping Invade Privacy?</b><br />
<br />
Civil liberties experts have denounced the practice of wholesale data collection. "By injecting the N.S.A. into virtually every crossborder interaction, the U.S. government will forever alter what has always been an open exchange of ideas," says Jameel Jaffer, the deputy legal director of the American Civil Liberties Union.<br />
<br />
Such collection would also violate numerous legal principles that safeguard individual privacy. In addition to the fourth amendment to the U.S. constitution, human rights experts say that it would violate Article 8 of the European Convention on Human Rights and Article 12 of the Universal Declaration of Human Rights.<br />
<br />
The big questions now are what role did the telecommunication companies play in the data interception and are intelligence contractors like Glimmerglass helping to design the collection and analysis system?<br />
<br />
"Tempora would not have been possible without the complicity of these undersea cable providers," says Eric King, head of research at Privacy International. "What we, and the public, deserve to know is this: To what extent are companies cooperating with disproportionate intelligence gathering, and are they doing anything to protect our right to privacy?"<br />
</div></p>
<p>On page eight, Glimmerglass provides specific examples of what it can gather &#8211; like Gmail, Yahoo! Mail as well as Facebook and Twitter. Over the next four pages it offers screenshots of these capabilities.</p>
<p>One display of what CyberSweep is capable of is a visual grid of Facebook messages of a presumably fictional person named John Smith. His profile is connected to a number of other individuals with arrows indicating how often he connected to each of them. Each individual can be identified with images, user names and IDs. Another pane shows the detailed chat records. Yet another graphic shows Facebook connections between multiple individuals, presumably to identify networks.</p>
<p>A third graphic is a grid of phone calls made by an individual with a pane that allows an operator to select and listen to audio of any specific conversation. Other images show similar demonstrations of monitoring webmail and instant message chats.</p>
<p>Where is this product being used? In a product video on the company website, Glimmerglass states that their optical data management products have been used by the U.S. intelligence agencies for the last five years. The video specifically mentions data transmissions from Predator drones and well as the tapping of undersea fibre optic cables, but it does not go into any details.</p>
<p>&#8220;The challenge of managing information has become the challenge of managing the light,&#8221; says an announcer. &#8220;With Glimmerglass, customers have full control of massive flows of intelligence from the moment they access them.&#8221;</p>
<p>The description mirrors the technology described in documents provided by Edward Snowden to the Guardian newspaper.</p>
<p><strong>Collecting all the signals</strong></p>
<p>In a document released by Snowden, Lieutenant General Keith Alexander, the NSA director, was quoted on a June 2008 visit to an intelligence facility in the U.K., saying: &#8220;Why can&#8217;t we collect all the signals all the time? Sounds like a good summer project.&#8221;</p>
<p>According to the leaked documents, a three year trial project was soon set up with a 25-million-dollar grant from the NSA to &#8220;radically enhance the infrastructure&#8221; at the Cyber Development Centre in Bude, Cornwall, as well as potentially at other sites like the GCHQ base in Cheltenham.</p>
<p>Probes were installed on 200 undersea cables and in the fall of 2011, a project code-named Tempora was launched with the help of NSA analysts who came to help at the Bude site. At least seven companies took part in the project &#8211; British Telecom, Global Crossing, Interoute, Level 3, Viatel, Verizon Business and Vodafone Cable &#8211; according to the German paper Suddeutsche Zeitung, all of whom manage major undersea cable systems.</p>
<p>Under Tempora, a three-day buffer of global internet traffic was held at any given time &#8211; totaling some 600 million &#8220;telephone events&#8221; a day or as much as 21 petabytes (million gigabytes) of data. While much of it was deleted through a process called Massive Volume Reduction for reasons of space, the meta-data (such as the details of who called whom, and when, but not the content) was held for as long as 30 days.</p>
<p>Snowden&#8217;s documents suggest that GCHQ now &#8220;produces larger amounts of metadata than NSA&#8221; which was being analysed by 300 U.K. analysts in addition to 250 NSA analysts, as of last May. The U.K. analysts were encouraged to dig deep since they had a less onerous oversight regime compared to the U.S.</p>
<p>&#8220;Over the last five years, GCHQ&#8217;s access to &#8216;light&#8217; (has) increased by 7,000 percent,&#8221; a Tempora official is quoted as saying in another Powerpoint document cited in the Guardian. &#8220;We will have exploited to the full our unique selling points of geography, partnerships, the UK&#8217;s legal regime and our skilled workforce.&#8221;</p>
<p>A recent interview of a &#8220;senior intelligence official&#8221; by the New York Times confirmed that &#8220;the N.S.A. is temporarily copying and then sifting through the contents of what is apparently most e-mails and other text-based communications that cross the border&#8221; by making a &#8220;clone of selected communication links.&#8221; The official did not state where the communications were being intercepted.</p>
<p><em>Pratap Chatterjee is executive director of CorpWatch. This story originally appeared on <a href="http://www.Corpwatch.org">Corpwatch.org</a>.</em></p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/08/spying-scandal-engulfs-other-u-s-agencies/" >Spying Scandal Engulfs Other U.S. Agencies</a></li>
<li><a href="http://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/" >Fight over NSA Spying Spills into U.S. Courts</a></li>
<li><a href="http://www.ipsnews.net/2013/07/big-brother-is-watching-us/" >Big Brother Is Watching Us</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/08/glimmerglass-taps-undersea-cables-for-spy-agencies/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
