Narus Inc.

Last updated
Narus Inc.
TypeSubsidiary
Industry Software
Founded1997
Defunct2014
Headquarters,
Number of locations
United States, India
ProductsOriginally a company focused on telecommunications billing and customer market intelligence. After 2001 the company pivoted towards providing network intelligence gathering software to governments around the world.

Narus Inc. was a software company and vendor of big data analytics for cybersecurity.

Contents

History

In 1997, Ori Cohen, Vice President of Business and Technology Development for VDONet, founded Narus with Stas Khirman in Israel. [1] Presently, they are employed with Deutsche Telekom AG and are not members of Narus' executive team. [2] [3] [4] In 2010, Narus became a subsidiary of Boeing, located in Sunnyvale, California. [5] [6] In 2015, Narus was sold to Symantec. [7]


Here are some of the key events in Narus's history:

Narus was a pioneer in the field of big data analytics for cybersecurity. The company's products helped to protect organizations from a variety of cyber threats. Narus's products are no longer available, but Boeing's Phantom Works Intelligence & Analytics business continues to offer cybersecurity solutions.

Management

In 2004, Narus employed former Deputy Director of the National Security Agency, William Crowell as a director. From the Press Release announcing this: [8]

Crowell is an independent security consultant and holds several board positions with a variety of technology and technology-based security companies.
Since 11 September 2001, Crowell served on the Defense Advanced Research Projects Agency (DARPA) Task Force on Terrorism and Deterrence, the National Research Council Committee on Science and Technology for Countering Terrorism, and the Markle Foundation Task Force on National Security in the Information Age.

Narus software

Narus software primarily captures various computer network traffic in real-time and analyzes results. [9] [10]

Before 9/11 Narus built carrier-grade tools to analyze IP network traffic for billing purposes, to prevent what Narus called "revenue leakage". Post-9/11 Narus added more "semantic monitoring abilities" for surveillance.

Mobile

Narus provided Telecom Egypt with deep packet inspection equipment, a content-filtering technology that allows network managers to inspect, track and target content from users of the Internet and mobile phones, as it passes through routers. The national telecommunications authorities of both Pakistan and Saudi Arabia are global Narus customers. [11]

Controversies

AT&T wiretapping room

Narus supplied the software and hardware used at AT&T wiretapping rooms, according to whistleblowers Thomas Drake, [12] and Mark Klein. [13]

See also

Related Research Articles

<span class="mw-page-title-main">National Security Agency</span> U.S. signals intelligence organization

The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The NSA has roughly 32,000 employees.

<span class="mw-page-title-main">RSA Security</span> American computer security company

RSA Security LLC, formerly RSA Security, Inc. and trade name RSA, is an American computer and network security company with a focus on encryption and encryption standards. RSA was named after the initials of its co-founders, Ron Rivest, Adi Shamir and Leonard Adleman, after whom the RSA public key cryptography algorithm was also named. Among its products is the SecurID authentication token. The BSAFE cryptography libraries were also initially owned by RSA. RSA is known for incorporating backdoors developed by the NSA in its products. It also organizes the annual RSA Conference, an information security conference.

<span class="mw-page-title-main">Gen Digital</span> Multinational software company

Gen Digital Inc. is a multinational software company co-headquartered in Tempe, Arizona and Prague, Czech Republic. The company provides cybersecurity software and services. Gen is a Fortune 500 company and a member of the S&P 500 stock-market index. The company also has development centers in Pune, Chennai and Bangalore. Its portfolio includes Norton, Avast, LifeLock, Avira, AVG, ReputationDefender, and CCleaner.

Booz Allen Hamilton Holding Corporation is the parent of Booz Allen Hamilton Inc., an American government and military contractor, specializing in intelligence. It is headquartered in McLean, Virginia, in Greater Washington, D.C., with 80 other offices around the globe. The company's stated core business is to provide consulting, analysis and engineering services to public and private sector organizations and nonprofits.

<span class="mw-page-title-main">Allot (company)</span>

Allot Ltd., formerly Allot Communications, is an Israeli high-tech company that develops telecommunications software. The company is headquartered in Hod Hasharon, Israel.

<i>Hepting v. AT&T</i>

Hepting v. AT&T, 439 F.Supp.2d 974, was a class action lawsuit argued before the United States District Court for the Northern District of California, filed by Electronic Frontier Foundation (EFF) on behalf of customers of the telecommunications company AT&T. The plaintiffs alleged that AT&T permitted and assisted the National Security Agency (NSA) in unlawfully monitoring the personal communications of American citizens, including AT&T customers, whose communications were routed through AT&T's network.

Verint Systems is a Melville, New York–based analytics company which was founded in 2002. The company sells software and hardware products for customer engagement management and business intelligence. Their products are designed to assist clients in data analysis, specifically large data sets.

<span class="mw-page-title-main">Room 641A</span> Telecommunication facility allegedly used for U.S. National Security Agency surveillance

<span class="mw-page-title-main">Gil Shwed</span>

Gil Shwed is an Israeli software engineer and entrepreneur. He is the co-founder and CEO of Check Point Software Technologies Ltd, one of Israel's largest technology companies and the world's largest pure-play cybersecurity company.

Brightmail Inc. was a San Francisco–based technology company focused on anti-spam filtering. Brightmail's system has a three-pronged approach to stopping spam, the Probe Network is a massive number of e-mail addresses established for the sole purpose of receiving spam. The Brightmail Logistics and Operations Center (BLOC) evaluates newly detected spam and issues rules for ISPs. The third approach is the Spam Wall, a filtering engine that identifies and screens out spam based on the updates from the BLOC.

<span class="mw-page-title-main">Susan Landau</span> American mathematician and engineer

Susan Landau is an American mathematician, engineer, cybersecurity policy expert, and Bridge Professor in Cybersecurity and Policy at the Fletcher School of Law and Diplomacy at Tufts University. She previously worked as a Senior Staff Privacy Analyst at Google. She was a Guggenheim Fellow and a visiting scholar at the Computer Science Department, Harvard University in 2012.

<span class="mw-page-title-main">Utah Data Center</span> NSA data storage facility

The Utah Data Center (UDC), also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, is a data storage facility for the United States Intelligence Community that is designed to store data estimated to be on the order of exabytes or larger. Its purpose is to support the Comprehensive National Cybersecurity Initiative (CNCI), though its precise mission is classified. The National Security Agency (NSA) leads operations at the facility as the executive agent for the Director of National Intelligence. It is located at Camp Williams near Bluffdale, Utah, between Utah Lake and Great Salt Lake and was completed in May 2014 at a cost of $1.5 billion.

<i>Jewel v. National Security Agency</i>

Jewel v. National Security Agency, 673 F.3d 902, was a class action lawsuit argued before the District Court for the Northern District of California and the Court of Appeals for the Ninth Circuit, filed by Electronic Frontier Foundation (EFF) on behalf of American citizens who believed that they had been surveilled by the National Security Agency (NSA) without a warrant. The EFF alleged that the NSA's surveillance program was an "illegal and unconstitutional program of dragnet communications surveillance" and claimed violations of the Fourth Amendment.

<span class="mw-page-title-main">Sqrrl</span> Cyber security company

Sqrrl Data, Inc. is an American company founded in 2012 that markets software for big data analytics and cyber security. The company has roots in the United States Intelligence Community and National Security Agency. Sqrrl was involved in the creation of, and actively contributes to Apache Accumulo and other related Apache projects. Sqrrl’s primary product is its threat hunting platform, designed for active detection of advanced persistent threats.

<span class="mw-page-title-main">Tailored Access Operations</span> Unit of the U.S. National Security Agency

The Office of Tailored Access Operations (TAO), now Computer Network Operations, and structured as S32, is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA). It has been active since at least 1998, possibly 1997, but was not named or structured as TAO until "the last days of 2000," according to General Michael Hayden.

<span class="mw-page-title-main">Mass surveillance in the United States</span>

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

The mass surveillance industry is a multibillion-dollar industry that has undergone phenomenal growth since 2001. According to data provided by The Wall Street Journal, the retail market for surveillance tools has grown from "nearly zero" in 2001 to about US$5 billion in 2011. The size of the video surveillance market rose to US$13.5 billion in 2012 and is expected to reach US$39 billion by 2020.

<span class="mw-page-title-main">Upstream collection</span> Term used by the National Security Agency (NSA) of the United States

Upstream collection is a term used by the National Security Agency (NSA) of the United States for intercepting telephone and Internet traffic from the Internet backbone, meaning major Internet cables and switches, both domestic and foreign. Besides the Upstream collection, NSA also gathers information from Internet communications through arrangements with Internet companies under the program codenamed PRISM. Both the Upstream programs and PRISM are part of the Special Source Operations (SSO) division, which is responsible for collection in cooperation with corporate partners.

This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid.

References

  1. "Ori Cohen: Executive Profile & Biography". Bloomberg Businessweek . Archived from the original on October 15, 2012. Retrieved 17 September 2011.
  2. "Executive Team | Narus". Archived from the original on 2013-08-06. Retrieved 2013-09-06.
  3. Fogel, Raphael (11 July 2006). "Ori Cohen, private eye". Haaretz . Retrieved 17 September 2011.
  4. "Executive Team". Narus. Archived from the original on 3 March 2013. Retrieved 25 February 2013.
  5. "Boeing buying cybersecurity firm Narus". Bloomberg Businessweek . St. Louis. Associated Press. 8 July 2010. Archived from the original on 1 May 2011. Retrieved 18 September 2011.
  6. "Boeing Completes Acquisition of Narus". benzinga.com. 29 July 2010. Retrieved 18 September 2011.
  7. "Symantec Acquires Boeing's Cybersecurity Unit in a Bid to Boost Big Data Capabilities". Forbes. Retrieved 2016-03-28.
  8. "Narus Appoints Former Deputy Director of the National Security Agency To Its Board of Directors". Archived from the original on February 6, 2005. Retrieved 2017-09-14.{{cite web}}: CS1 maint: bot: original URL status unknown (link)
  9. "Boeing: Narus". Boeing. Archived from the original on September 2, 2011. Retrieved 17 September 2011.
  10. "Narus Networks Private Limited: Private Company Information". Bloomberg Businessweek . Archived from the original on October 15, 2012. Retrieved 17 September 2011.
  11. "One U.S. Corporation's Role in Egypt's Brutal Crackdown". HuffPost . 2011-01-28.
  12. "Drake declaration in support of plaintiffs' motion". Electronic Frontier Foundation. 2012-07-02.
  13. What was the Israeli involvement in collecting U.S. communications intel for NSA? The Marker, Haaretz, The Associated Press and Reuters, Jun. 8, 2013 at http://www.haaretz.com/news/diplomacy-defense/1.528529 .retrieved on 7-18-13