Dirtbox (cell phone)

Last updated

A dirtbox (or DRT box) is a cell site simulator, a phone device mimicking a cell phone tower, that creates a signal strong enough to cause nearby dormant mobile phones to switch to it. Mounted on aircraft, it has been used by the United States Marshals Service since at least 2007 to locate and collect information from cell phones believed to be connected with criminal activity. It can also be used to jam phones. The device's name comes from the company that developed it, Digital Receiver Technology, Inc. (DRT), owned by the Boeing company. Boeing describes the device as a hybrid of "jamming, managed access and detection". [1] :1 A similar device with a smaller range, the controversial StingRay phone tracker, has been widely used by U.S. federal entities, including the Federal Bureau of Investigation (FBI).

Contents

History

It is not known when Digital Receiver Technology, Inc. (DRT) first manufactured the dirtbox. As of 2014, the company did not publicly advertise it, stating on its web site: "Due to the sensitive nature of our work, we are unable to publicly advertise many of our products." [2] The Wall Street Journal wrote that the U.S. Marshals Service program utilizing the device had "fully matured by 2007". [3] Boeing bought DRT in 2008. [4]

Similar devices from the Harris Corporation, like the Stingray phone tracker, have been sold around the same time. Since 2008, their airborne mounting kit for cell phone surveillance has been said to cost $9,000. [5]

On June 11, 2010, the Boeing Company asked the National Telecommunications and Information Administration to advise the United States Congress that the "... Communications Act of 1934 be modified to allow prison officials and state and local law enforcement to use appropriate cell phone management", [1] and suggested that special weapons and tactics (SWAT) teams and other paramilitary tactical units could use their devices to control wireless communications during raids. [1] :5

Technology

The device is described as 2-square-foot (0.19 m2) in size. [3] To mimic a cell phone tower, [4] it utilizes IMSI-catcher (International Mobile Subscriber Identity) technology, which phone services use to identify individual subscribers. [3] It emits a pilot signal made to appear stronger than that from the nearest cell tower, causing phones within its range to broadcast their IMSI numbers and electronic serial numbers (ESN). Encryption does not prevent this process; [3] the devices can retrieve a phone's encryption session keys in less than one second, with success rates of 50–75% under "real world conditions". [4]

An aircraft-mounted device can locate a phone within 10 feet, [3] Another source claims that by triangulating flights, a dirtbox can pinpoint a phone's location in as few as two feet. [6]

The dirtbox is a hybrid of detection, managed access and jamming technologies. According to The Wall Street Journal , "people with knowledge of the program" can determine which phones belong to suspects and which to non-suspects, [3] and that "cell phones not of interest, such as those belonging to prison personnel or commercial users in the area, are returned to their local network." [1] :4 It can also selectively interrupt or prevent calls on certain phones, and has been used to block unauthorized phone use by prison inmates. [1] :4 It can also retrieve data from phones. According to Boeing, [1] :4 its technology is "unobtrusive to legitimate wireless communications", and bypasses phone companies in its operations.

Agency use

Law enforcement

As of November 2014, the U.S. Marshals Service Technical Operations Group has used the device, fixed on crewed airplanes, to track fugitives, and has said it can deploy it on "targets requested by other parts of the Justice Program". [3] The devices are operated out of at least five U.S. airports, "covering most of the U.S. population". It is unclear whether the U.S. Marshals Service requests court orders to use the devices. [3]

The Marshals Service has used dirtboxes in the Mexican Drug War, tracking fugitives in coordination with Mexico's Naval Infantry Force and flights in Guatemala. [7]

Dirtboxes are used by the United States Special Operations Command, the Drug Enforcement Administration, the FBI and U.S. Customs and Border Protection. According to procurement documents, the U.S. Navy bought dirtboxes to mount on drones at Naval Air Weapons Station China Lake, its research and development facility in Southern California. The Pentagon Washington Headquarters Services bought dirtboxes in 2011. [4]

The Chicago Police Department bought dirtboxes to eavesdrop on demonstrators during the 2012 NATO summit, and used them during the 2014 Black Lives Matter demonstrations. In 2015, it became known that the Los Angeles Police Department had purchased the devices. [4]

Signal intelligence

Based on references to "DRTBox" in NSA's Boundless informant screenshots [8] leaked by Edward Snowden, dirtboxes are probably used by the NSA. [9] In 2013, the French newspaper LeMonde wrote, "Thanks to DRTBOX, 62.5 million phone data were collected in France". [10] The United States Naval Special Warfare Development Group's Group One bought a Digital Receiver Technology 1301B System on April 2, 2007 for over $25,000, according to the United States government procurement web site. [11]

U.S. regulation

The National Telecommunications and Information Administration (NTIA) has known of dirtboxes since at least 2010. [1] In 2014, the United States Department of Justice refused to confirm or deny that government agencies used them, but an official said, "It would be utterly false to conflate the law-enforcement program with the collection of bulk telephone records by the National Security Agency". [12] The Federal Communications Commission, responsible for licensing and regulating cell-service providers, was not aware of dirtbox activity prior to The Wall Street Journal exposé. [12]

In January 2015, the US Senate Judiciary Committee asked the Department of Justice and Department of Homeland Security which law enforcement agencies used DRTboxes, and to specify the legal processes and policies that existed to protect the privacy of those whose information was collected. [13]

Criticism

In 2014, privacy advocates, including U.S. Rep. Alan Grayson (D-Florida), [4] have criticized dirtbox use as a violation of the Fourth Amendment to the United States Constitution. [14] Brian Owsley, a law professor at Indiana Institute of Technology and former United States magistrate, said in 2014 that to use the devices legally, "I think the government would need to obtain a search warrant based on probable cause consistent with the Fourth Amendment". [15]

The Guardian quoted Michael German, a professor at New York University Law School and former FBI agent, as saying: "The overriding problem is the excessive secrecy that hides the government’s ever-expanding surveillance programs from public accountability." [16]

In November 2014, Senator Edward Markey (D-Massachusetts) and former Senator Al Franken (D-Minnesota) have warned that Americans' privacy rights must be assured. [12]

See also

Related Research Articles

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and police investigations.

Wiretapping, also known as wire tapping or telephone tapping, is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on an analog telephone or telegraph line. Legal wiretapping by a government agency is also called lawful interception. Passive wiretapping monitors or records the traffic, while active wiretapping alters or otherwise affects it.

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

<span class="mw-page-title-main">Mass surveillance</span> Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, such as organizations like the NSA, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is also often distinguished from targeted surveillance.

<span class="mw-page-title-main">Clipper chip</span> Encryption device promoted by the NSA in the 1990s

The Clipper chip was a chipset that was developed and promoted by the United States National Security Agency (NSA) as an encryption device that secured "voice and data messages" with a built-in backdoor that was intended to "allow Federal, State, and local law enforcement officials the ability to decode intercepted voice and data transmissions." It was intended to be adopted by telecommunications companies for voice transmission. Introduced in 1993, it was entirely defunct by 1996.

<span class="mw-page-title-main">Cell site</span> Communications equipment location

A cell site, cell phone tower, cell base tower, or cellular base station is a cellular-enabled mobile device site where antennas and electronic communications equipment are placed to create a cell, or adjacent cells, in a cellular network. The raised structure typically supports antenna and one or more sets of transmitter/receivers transceivers, digital signal processors, control electronics, a GPS receiver for timing, primary and backup electrical power sources, and sheltering.

Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot intercept what is said. Other than spoken face-to-face communication with no possible eavesdropper, it is probable that no communication is guaranteed to be secure in this sense, although practical obstacles such as legislation, resources, technical issues, and the sheer volume of communication serve to limit surveillance.

Harris Corporation was an American technology company, defense contractor, and information technology services provider that produced wireless equipment, tactical radios, electronic systems, night vision equipment and both terrestrial and spaceborne antennas for use in the government, defense, emergency service, and commercial sectors. They specialized in surveillance solutions, microwave weaponry, and electronic warfare. In 2019, it merged with L3 Technologies to form L3Harris Technologies.

Surveillance abuse is the use of surveillance methods or technology to monitor the activity of an individual or group of individuals in a way which violates the social norms or laws of a society.

<span class="mw-page-title-main">Mobile phone tracking</span> Identifying the location of a mobile phone

Mobile phone tracking is a process for identifying the location of a mobile phone, whether stationary or moving. Localization may be affected by a number of technologies, such as the multilateration of radio signals between (several) cell towers of the network and the phone or by simply using GNSS. To locate a mobile phone using multilateration of mobile radio signals, the phone must emit at least the idle signal to contact nearby antenna towers and does not require an active call. The Global System for Mobile Communications (GSM) is based on the phone's signal strength to nearby antenna masts.

An international mobile subscriber identity-catcher, or IMSI-catcher, is a telephone eavesdropping device used for intercepting mobile phone traffic and tracking location data of mobile phone users. Essentially a "fake" mobile tower acting between the target mobile phone and the service provider's real towers, it is considered a man-in-the-middle (MITM) attack. The 3G wireless standard offers some risk mitigation due to mutual authentication required from both the handset and the network. However, sophisticated attacks may be able to downgrade 3G and LTE to non-LTE network services which do not require mutual authentication.

Triggerfish describes a technology of cell phone interception and surveillance using a mobile cellular base station. The devices are also known as cell-site simulators or digital analyzers.

<span class="mw-page-title-main">Stingray phone tracker</span> Cellular phone surveillance device

The StingRay is an IMSI-catcher, a cellular phone surveillance device, manufactured by Harris Corporation. Initially developed for the military and intelligence community, the StingRay and similar Harris devices are in widespread use by local and state law enforcement agencies across Canada, the United States, and in the United Kingdom. Stingray has also become a generic name to describe these kinds of devices.

<span class="mw-page-title-main">2010s global surveillance disclosures</span> Disclosures of NSA and related global espionage

During the 2010s, international media news reports revealed new operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly relate to top secret documents leaked by ex-NSA contractor Edward Snowden. The documents consist of intelligence files relating to the U.S. and other Five Eyes countries. In June 2013, the first of Snowden's documents were published, with further selected documents released to various news outlets through the year.

<span class="mw-page-title-main">Global surveillance</span> Mass surveillance across national borders

Global mass surveillance can be defined as the mass surveillance of entire populations across national borders.

<span class="mw-page-title-main">Cellphone surveillance</span> Interception of mobile phone activity

Cellphone surveillance may involve tracking, bugging, monitoring, eavesdropping, and recording conversations and text messages on mobile phones. It also encompasses the monitoring of people's movements, which can be tracked using mobile phone signals when phones are turned on.

Catherine Crump is an American law professor and civil liberties expert focused on the effects of digital surveillance technology on privacy and free speech. She is the Director of the Samuelson Law, Technology and Public Policy Clinic, Co-Director of Berkeley Center for Law and Technology, and a Clinical Professor of Law at the UC Berkeley School of Law. Crump's expertise on digital data collection and the law is regularly featured in the media. In 2023, Crump served as a senior policy advisor for criminal justice for the White House Domestic Policy Council.

The use of stingrays by United States law enforcement is an investigative technique used by both federal and local law enforcement in the United States to obtain information from cell phones by mimicking a cell phone tower. The devices which accomplish this are generically known as IMSI-catchers, but are commonly called stingrays, a brand sold by the Harris Corporation.

Carpenter v. United States, 585 U.S. ___, 138 S.Ct. 2206 (2018), is a landmark United States Supreme Court case concerning the privacy of historical cell site location information (CSLI). The Court held that the government violates the Fourth Amendment to the United States Constitution when it accesses historical CSLI records containing the physical locations of cellphones without a search warrant.

References

  1. 1 2 3 4 5 6 7 The Boeing Company (11 June 2010). "Technical Approaches to Preventing Contraband Cell Phone Use in Prisons;Docket No. 100504212-0212-01" (PDF). National Telecommunications and Information Administration. p. 7. Archived (PDF) from the original on 19 October 2011. Retrieved 16 November 2014.
  2. "DRT Products". Digital Receiver Technology, Inc. n.d. Retrieved 16 November 2014.
  3. 1 2 3 4 5 6 7 8 Devlin Barrett (13 November 2014). "Americans' Cellphones Targeted in Secret U.S. Spy Program". The Wall Street Journal. Dow Jones & Company. Retrieved 14 November 2014.
  4. 1 2 3 4 5 6 Winston, Ali (2015-08-07). "Chicago and Los Angeles have used 'dirt box' surveillance for a decade". Revealnews, Center of Investigative Reporting. Retrieved 26 April 2016.
  5. Kim Zetter (14 November 2014). "The Feds Are Now Using 'Stingrays' in Planes to Spy on Our Phone Calls". Wired. Condé Nast. Retrieved 16 November 2014.
  6. Iain Thomson (14 November 2014). "US Marshals commit DIRTBOX INTRUSION on Americans, says report". The Register. Situation Publishing. Retrieved 16 November 2014.
  7. Devlin Barrett (21 November 2014). "U.S. Marshals Service Personnel Dressed as Mexican Marines Pursue Cartel Bosses". The Wall Street Journal. Retrieved 21 November 2014.
  8. P/K (27 November 2013). "DRTBOX and the DRT surveillance systems". Top Level Telecommunications. electrospaces.net. Retrieved 16 November 2014.
  9. Stephanie K. Pell; Christopher Soghoian (May 15, 2014). "Your Secret Stingray's No Secret Anymore: The Vanishing Government Monopoly Over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy". Harvard Journal of Law & Technology. Social Science Electronic Publishing, Inc. 28 (1): 67. SSRN   2437678.
  10. Jacques Follorou, Glenn Greenwald (21 October 2013). "France in the NSA's crosshair : phone networks under surveillance". Le Monde.fr. Le Monde. Retrieved 27 May 2016.
  11. FedBizOpps (2 April 2007). "59 -- Portable Receiving System". FedBizOpps.gov. Retrieved 17 November 2014.
  12. 1 2 3 Devlin Barrett and Gautham Nagesh (14 November 2014). "U.S. Defends Marshals in Wake of Secret Cellphone Spying Report". The Wall Street Journal. Dow Jones Co. Retrieved 16 November 2014.
  13. Staff (January 02, 2015) "Senate wants more answers from feds about fake cell towers, other devices that collect smartphone data" Fox News, retrieved 26 April 2016
  14. Mark Weinstein (16 November 2014). "U.S. Marshals and Their "Dirtbox" Declare the 4th Amendment Dead". The Huffington Post. Retrieved 16 November 2014.
  15. Megan Geuss (13 November 2014). "Feds gather phone data from the sky with aircraft mimicking cell towers". Ars Technica. Condé Nast. Retrieved 16 November 2014.
  16. Spencer Ackerman; Dominic Rushe; Paul Lewis (14 November 2014). "US government planes mimic cellphone towers to collect user data – report". The Guardian. Retrieved 16 November 2014.