back to article Intel bakes super-snooper to stop industrial espionage

Intel has created a Hadoop-based rig that analyses just about every network event in the company – four to six billion of them on business days - in close to real time so it can spot threats including industrial espionage. Intel officials declined to name the tool, saying it would not be "productive" to disclose its name, but …

COMMENTS

This topic is closed for new posts.
  1. John Smith 19 Gold badge
    Gimp

    Intel wants to start a "Federal Systems" divisions?

    Looks like it does it not?

    What every data fetishist needs, faster ways to collect more rubbish on more innocent people for use later.

    Yay for that.

    1. WatAWorld

      Re: Intel wants to start a "Federal Systems" divisions?

      Now I feel stupid.

      Of course, it isn't for checking packets to keep malware and foreign spies out, it is to do surveillance on our fellow countrymen in greater depth and detail.

  2. gregthecanuck

    Had a good laugh - the googleads inserted item was for a movie:

    They See Your Every Move

    CLOSED CIRCUIT

    In theatres August 28

  3. Chris G

    Where wil it all end?

    The rate of advance and development of surveillance technologies is not quite logarithmic but not for the want of trying.

    As the Reg suggests in the article this latest creation from intel has the potential to manage so much more snooping on so many aspects of our lives.

    Applications like this can be used at every level of our lives wherever monitoring or surveillance takes place from kindergarten to old folks home and the rest of our lives in between.

    With a little tweaking it has the potential for use as a behavioural monitor at schools, for ensuring workers have their heads down and are not pilfering and for all the multifarious uses that our caring governments can think of to protect us from terrists and ourselves.

    What none of these technologies do however is prevent the types of crime that affect ordinary everyday people; like mugging, burglary, violence in the home etc but there is a solution, we must every one of us have a Google glass fitted at birth so that we will be obliged to conform to a government inspired norm or suffer the consequences of re-education.

    Scary stuff!

  4. Anonymous Coward
    Anonymous Coward

    Intel contract worker here

    I did wonder why the network was a bit slow sometimes. Posting anon via an SSH tunnel to my own private web proxy, still I wonder how long it would take them if I mention the project name on the Intel Secret doc I found in the photocopier the other day?

  5. Anonymous Coward
    Anonymous Coward

    Genuine Enquiry

    Does anyone in the semiconductor industry actually use the term "bake" or is it a just a journalistic affectation?

    1. Anonymous Coward
      Anonymous Coward

      Re: Genuine Enquiry

      Baking is a real thing. It is used for mounting, and curing more advanced components, I think.

  6. Anonymous Coward
    Anonymous Coward

    No news here ..

    I have seen this in action on a live feed about 3 years ago, based on semantic web analysis. Quite impressive how you could identify correlating events and drill down into the details. What's more, this was realtime, off a 10GB network data tap.

    1. Michael Wojcik Silver badge

      Re: No news here ..

      Well, there's some news here. While it's true that packet-inspecting tools with predictive models have been done before, and massive modelling using map/reduce-style distributed processing is now old hat,1 it's notable that a major IT player has put the two together and put the resulting system into production.

      It'd be interesting to hear more details, like what algorithms they're using for their model and how they trained it. I may have to do some digging to see if Intel's published any more info on it.

      That said, I think calling it "an interesting proof of concept for ubiquitous surveillance being comfortably achievable", as the article does, is overstating the case. There are already firms selling deep-inspection tools for things like information control and liability reduction; typically these use approaches based on higher-order algebras (e.g. lattice algebras) for their models. Such products already claim to be able to scan all documents entering and leaving the organization2. This is at best an incremental step.

      I'm also amazed at the naivete of Sharwood's comment that governments might find it difficult to hire expertise on the same level as Intel's. You have to be reasonably bright to develop this kind of stuff, but it's not some sui generis act of supreme genius. And the NSA, for one, doesn't seem to have any problem hiring a great many very talented people.

      1With something like Apache UIMA, it's pretty easy these days to prototype this sort of thing, and even go into production if the workloads are feasible. And by "pretty easy" I mean "suitable for a grad student, or even a team of advanced undergrads, as a class project".

      2Modulo encryption and the like, of course; the software has to be able to extract something approximating plain text.

  7. WatAWorld

    Unless it can catch nation state espionage it is useless for tech companies

    Unless it can catch nation state espionage it is useless for tech design & development companies.

    The threat to tech companies in developed nations is mostly tech companies in other developed nations -- protecting UK companies from the US government handing US companies our ideas, and protecting US companies from the UK government handing UK companies their ideas.

    So long as the NSA has a back door to this Intel product it is useless to us.

  8. Inachu

    Love this hate that.

    It sounds nice on the surface but this sounds a lot like when Norton had crash guard putting all its windows hooks into the OS.

    If you run a OS CLOUD deivce would then this type of inspection crash your cloud?

    Inspection of VOIP? Expect bad sound quality because of this.

    If anything I do hope this works out and nothing is required on the client side or else more CPU usage and people trying to run reports will complain that reports that used to take 10 minutes to report will now take 45 minutes. GOOD LUCK!

    1. Michael Wojcik Silver badge

      Re: Love this hate that.

      This sort of packet-inspection technology typically doesn't add latency to the network; it records packets in flight at routers and forwards the copies to the cluster for analysis. Note that the article says "near real-time".

  9. PeterM42
    FAIL

    If they make it a McCrapAfee product.......

    .....it'll probably be McCRAP (you know, like the alleged Anti-Virus software).

This topic is closed for new posts.

Other stories you might like