SlideShare a Scribd company logo
1 of 11
Download to read offline
Accumulo: The NSA's Open Source Storage Solution
Saul Tannenbaum, NeighborMedia
saultannenbaum.org
@stannenb
NSA's Utah Data Center,
courtesy Swilsonmc
The NSA and Open Source have a
history
Continued Collaboration
Morning Keynote Speaker (confirmed):
Dr. Patrick Dowd is the National Security Agency/Central Security Service (NSA/CSS)’s Chief Technical Officer and also serves as Chief Architect. He
recently transitioned to this role after serving as Deputy Director of Mission Capabilities within the Technology Directorate of the National Security
Agency.
Dr. Dowd joined the Research Directorate of NSA in 1996, and is co-founder of the Laboratory for Telecommunications Science (R4). He moved from
Research to the SIGINT Directorate in 2004, where he directed projects to unify Computer Network Operations (CNO) and developed technical
strategies to integrate CNO, SIGINT, and Defense. He then became the Deputy Directorate for Modernization within the Information Technology
Directorate in 2006 to execute his work and build out the world-wide operational environment of NSA at scale.
http://oss-institute.org/component/events/event/47
From Edward Snowden and The
Guardian, we know some of what they
deploy
NSA uses FOSS software for the same
reasons we do
http://www.theguardian.com/world/interactive/2013/jun/08/
nsa-boundless-informant-data-mining-slides
The NSA's Big Data Problem
● Storing all our telephone metadata and internet
transactions is a serious technical challenge
● Searching it is even harder
● Google solved this with “Big Table” which it
publicly described in 2006
– Inspired a number of other implementations of similar
massively scaleable data stores
● None had the security features the NSA needed
The NSA's Big Data Solution
(http://c4i.gmu.edu/events/reviews/2013/pdfs/AFCEA2013-Kahn.pdf)
The NSA's Big Data Solution
● NSA creates “Accumulo” in 2008
– Adds cell level security and real time, server-side
computation to typical big data feature set
● NSA offers it to the Apache Foundation in 2011 as
an incubator project
● Apache promotes it to top level project in 2012
● NSAAccumulo technical staff leave government to
form sqrrl
● sqrrl receives $2 million venture funding, moves to
Cambridge, ships Sqrrl Enterprise, a commercial
version of Accumulo
Sqrrl Use Cases
(http://c4i.gmu.edu/events/reviews/2013/pdfs/AFCEA2013-Kahn.pdf)
Intelligence AnalysisIntelligence Analysis: Apache Accumulo was born at NSA within the U.S. Intelligence Community. While we can't say much about how NSA currently uses Accumulo due
to classification reasons, Accumulo was designed to help the Intelligence Community take advantage of the massive amounts of structured, semi-structured, and
unstructured information available to it, while adhering to the strictest of security and privacy requirements.
http://www.sqrrl.com/solutions#government
Sqrrl Whiteboard Video Transcript: NSA Lessons Learned
“Those are the four basic lessons learned over my decade of experience at NSA. We follow through here. We
start small, but design for scale. Iterative schema refinement. Discovery analytics as big app building blocks,
and datacentric security throughout.”
http://blog.sqrrl.com/post/56965175259/sqrrl-whiteboard-video-transcript-nsa-lessons-learned
Accumulo: The NSA's Open Source
Storage Solution
Read more at: http://cctvcambridge.org/sqrrl
Saul Tannenbaum
@stannenb
saul@tannenbaum.org
saultannenbaum.org

More Related Content

What's hot

Underwater Cloud Storage
Underwater Cloud StorageUnderwater Cloud Storage
Underwater Cloud StorageAkashBorse2
 
Detection, Response and the Azazel Rootkit
Detection, Response and the Azazel RootkitDetection, Response and the Azazel Rootkit
Detection, Response and the Azazel RootkitThreat Stack
 
Secure Infrastructure for the Mobile Legion
Secure Infrastructure for the Mobile LegionSecure Infrastructure for the Mobile Legion
Secure Infrastructure for the Mobile LegionRaphael Reitzig
 
There is no impenetrable system - So, why we are still waiting to get breached?
There is no impenetrable system - So, why we are still waiting to get breached?There is no impenetrable system - So, why we are still waiting to get breached?
There is no impenetrable system - So, why we are still waiting to get breached?Nane Kratzke
 
Nagios Conference 2013 - Thomas Dunbar - Building Technology for Storage Syst...
Nagios Conference 2013 - Thomas Dunbar - Building Technology for Storage Syst...Nagios Conference 2013 - Thomas Dunbar - Building Technology for Storage Syst...
Nagios Conference 2013 - Thomas Dunbar - Building Technology for Storage Syst...Nagios
 
Promat 2015 floor seminar
Promat 2015 floor seminarPromat 2015 floor seminar
Promat 2015 floor seminarDavid Schneider
 
ICIC 2013 Conference Proceedings Tony Trippe Patinformatics
ICIC 2013 Conference Proceedings Tony Trippe PatinformaticsICIC 2013 Conference Proceedings Tony Trippe Patinformatics
ICIC 2013 Conference Proceedings Tony Trippe PatinformaticsDr. Haxel Consult
 

What's hot (7)

Underwater Cloud Storage
Underwater Cloud StorageUnderwater Cloud Storage
Underwater Cloud Storage
 
Detection, Response and the Azazel Rootkit
Detection, Response and the Azazel RootkitDetection, Response and the Azazel Rootkit
Detection, Response and the Azazel Rootkit
 
Secure Infrastructure for the Mobile Legion
Secure Infrastructure for the Mobile LegionSecure Infrastructure for the Mobile Legion
Secure Infrastructure for the Mobile Legion
 
There is no impenetrable system - So, why we are still waiting to get breached?
There is no impenetrable system - So, why we are still waiting to get breached?There is no impenetrable system - So, why we are still waiting to get breached?
There is no impenetrable system - So, why we are still waiting to get breached?
 
Nagios Conference 2013 - Thomas Dunbar - Building Technology for Storage Syst...
Nagios Conference 2013 - Thomas Dunbar - Building Technology for Storage Syst...Nagios Conference 2013 - Thomas Dunbar - Building Technology for Storage Syst...
Nagios Conference 2013 - Thomas Dunbar - Building Technology for Storage Syst...
 
Promat 2015 floor seminar
Promat 2015 floor seminarPromat 2015 floor seminar
Promat 2015 floor seminar
 
ICIC 2013 Conference Proceedings Tony Trippe Patinformatics
ICIC 2013 Conference Proceedings Tony Trippe PatinformaticsICIC 2013 Conference Proceedings Tony Trippe Patinformatics
ICIC 2013 Conference Proceedings Tony Trippe Patinformatics
 

Similar to Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enabling software

Cloud Testbeds for Standards Development and Innovation
Cloud Testbeds for Standards Development and InnovationCloud Testbeds for Standards Development and Innovation
Cloud Testbeds for Standards Development and InnovationAlan Sill
 
Cloud-Oriented Federated Projects and Testbeds: Current Status in the US and...
Cloud-Oriented Federated Projects and Testbeds:  Current Status in the US and...Cloud-Oriented Federated Projects and Testbeds:  Current Status in the US and...
Cloud-Oriented Federated Projects and Testbeds: Current Status in the US and...Alan Sill
 
Splunk .conf18 Updates, Config Add-on, SplDevOps
Splunk .conf18 Updates, Config Add-on, SplDevOpsSplunk .conf18 Updates, Config Add-on, SplDevOps
Splunk .conf18 Updates, Config Add-on, SplDevOpsHarry McLaren
 
Video Analytics on Hadoop webinar victor fang-201309
Video Analytics on Hadoop webinar victor fang-201309Video Analytics on Hadoop webinar victor fang-201309
Video Analytics on Hadoop webinar victor fang-201309DrVictorFang
 
Splunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout SessionSplunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout SessionSplunk
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionSplunk
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET Journal
 
Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...leonardjonh145
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior AnalyticsSplunk
 
1. Using the graphics below create a Microsoft Project..docx
1. Using the graphics below create a Microsoft Project..docx1. Using the graphics below create a Microsoft Project..docx
1. Using the graphics below create a Microsoft Project..docxjeremylockett77
 
GTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech DayGTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech DayZivaro Inc
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsCarl De Groote
 
EuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyEuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyCarlos Chalico
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionSplunk
 
Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03
Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03
Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03NiketNilay
 
SSE Overview Deck - Swedish User Group.pdf
SSE Overview Deck - Swedish User Group.pdfSSE Overview Deck - Swedish User Group.pdf
SSE Overview Deck - Swedish User Group.pdfUlf Thornander
 
OpenStack Explained: Learn OpenStack architecture and the secret of a success...
OpenStack Explained: Learn OpenStack architecture and the secret of a success...OpenStack Explained: Learn OpenStack architecture and the secret of a success...
OpenStack Explained: Learn OpenStack architecture and the secret of a success...Giuseppe Paterno'
 
The past, present, and future of big data security
The past, present, and future of big data securityThe past, present, and future of big data security
The past, present, and future of big data securityUlf Mattsson
 
Getting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionGetting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionSplunk
 

Similar to Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enabling software (20)

Cloud Testbeds for Standards Development and Innovation
Cloud Testbeds for Standards Development and InnovationCloud Testbeds for Standards Development and Innovation
Cloud Testbeds for Standards Development and Innovation
 
Cloud-Oriented Federated Projects and Testbeds: Current Status in the US and...
Cloud-Oriented Federated Projects and Testbeds:  Current Status in the US and...Cloud-Oriented Federated Projects and Testbeds:  Current Status in the US and...
Cloud-Oriented Federated Projects and Testbeds: Current Status in the US and...
 
Splunk .conf18 Updates, Config Add-on, SplDevOps
Splunk .conf18 Updates, Config Add-on, SplDevOpsSplunk .conf18 Updates, Config Add-on, SplDevOps
Splunk .conf18 Updates, Config Add-on, SplDevOps
 
Video Analytics on Hadoop webinar victor fang-201309
Video Analytics on Hadoop webinar victor fang-201309Video Analytics on Hadoop webinar victor fang-201309
Video Analytics on Hadoop webinar victor fang-201309
 
Splunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout SessionSplunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout Session
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
Ministry of Foreign Affairs
Ministry of Foreign AffairsMinistry of Foreign Affairs
Ministry of Foreign Affairs
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
 
Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior Analytics
 
1. Using the graphics below create a Microsoft Project..docx
1. Using the graphics below create a Microsoft Project..docx1. Using the graphics below create a Microsoft Project..docx
1. Using the graphics below create a Microsoft Project..docx
 
GTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech DayGTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech Day
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
 
EuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyEuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the sky
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03
Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03
Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03
 
SSE Overview Deck - Swedish User Group.pdf
SSE Overview Deck - Swedish User Group.pdfSSE Overview Deck - Swedish User Group.pdf
SSE Overview Deck - Swedish User Group.pdf
 
OpenStack Explained: Learn OpenStack architecture and the secret of a success...
OpenStack Explained: Learn OpenStack architecture and the secret of a success...OpenStack Explained: Learn OpenStack architecture and the secret of a success...
OpenStack Explained: Learn OpenStack architecture and the secret of a success...
 
The past, present, and future of big data security
The past, present, and future of big data securityThe past, present, and future of big data security
The past, present, and future of big data security
 
Getting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionGetting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout Session
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enabling software

  • 1. Accumulo: The NSA's Open Source Storage Solution Saul Tannenbaum, NeighborMedia saultannenbaum.org @stannenb NSA's Utah Data Center, courtesy Swilsonmc
  • 2. The NSA and Open Source have a history
  • 3. Continued Collaboration Morning Keynote Speaker (confirmed): Dr. Patrick Dowd is the National Security Agency/Central Security Service (NSA/CSS)’s Chief Technical Officer and also serves as Chief Architect. He recently transitioned to this role after serving as Deputy Director of Mission Capabilities within the Technology Directorate of the National Security Agency. Dr. Dowd joined the Research Directorate of NSA in 1996, and is co-founder of the Laboratory for Telecommunications Science (R4). He moved from Research to the SIGINT Directorate in 2004, where he directed projects to unify Computer Network Operations (CNO) and developed technical strategies to integrate CNO, SIGINT, and Defense. He then became the Deputy Directorate for Modernization within the Information Technology Directorate in 2006 to execute his work and build out the world-wide operational environment of NSA at scale. http://oss-institute.org/component/events/event/47
  • 4. From Edward Snowden and The Guardian, we know some of what they deploy
  • 5. NSA uses FOSS software for the same reasons we do http://www.theguardian.com/world/interactive/2013/jun/08/ nsa-boundless-informant-data-mining-slides
  • 6. The NSA's Big Data Problem ● Storing all our telephone metadata and internet transactions is a serious technical challenge ● Searching it is even harder ● Google solved this with “Big Table” which it publicly described in 2006 – Inspired a number of other implementations of similar massively scaleable data stores ● None had the security features the NSA needed
  • 7. The NSA's Big Data Solution (http://c4i.gmu.edu/events/reviews/2013/pdfs/AFCEA2013-Kahn.pdf)
  • 8. The NSA's Big Data Solution ● NSA creates “Accumulo” in 2008 – Adds cell level security and real time, server-side computation to typical big data feature set ● NSA offers it to the Apache Foundation in 2011 as an incubator project ● Apache promotes it to top level project in 2012 ● NSAAccumulo technical staff leave government to form sqrrl ● sqrrl receives $2 million venture funding, moves to Cambridge, ships Sqrrl Enterprise, a commercial version of Accumulo
  • 10. Intelligence AnalysisIntelligence Analysis: Apache Accumulo was born at NSA within the U.S. Intelligence Community. While we can't say much about how NSA currently uses Accumulo due to classification reasons, Accumulo was designed to help the Intelligence Community take advantage of the massive amounts of structured, semi-structured, and unstructured information available to it, while adhering to the strictest of security and privacy requirements. http://www.sqrrl.com/solutions#government Sqrrl Whiteboard Video Transcript: NSA Lessons Learned “Those are the four basic lessons learned over my decade of experience at NSA. We follow through here. We start small, but design for scale. Iterative schema refinement. Discovery analytics as big app building blocks, and datacentric security throughout.” http://blog.sqrrl.com/post/56965175259/sqrrl-whiteboard-video-transcript-nsa-lessons-learned
  • 11. Accumulo: The NSA's Open Source Storage Solution Read more at: http://cctvcambridge.org/sqrrl Saul Tannenbaum @stannenb saul@tannenbaum.org saultannenbaum.org