Digital Collection System Network

Last updated
Official logo of DCS3000 system. Dcs3000 logo.jpg
Official logo of DCS3000 system.

The Digital Collection System Network (DCSNet) is the Federal Bureau of Investigation (FBI)'s point-and-click surveillance system that can perform instant wiretaps on almost any telecommunications device in the US. [1]

Contents

It allows access to cellphone, landline, SMS communications anywhere in the US from a point-and-click interface. It runs on a fiber-optic backbone that is separate from the internet. [2] It is intended to increase agent productivity through workflow modeling, allowing for the routing of intercepts for translation or analysis with only a few clicks. The DCSNet real-time intelligence data intercept has the capability to record, review and playback intercepted material in real-time. [1]

The DCSNet systems operate on a virtual private network parallel to the public internet, with services provided at least for some time by the Sprint peerless IP network. [3]

Much of the information available on this system has come from the results of Freedom of Information Act (FOIA) requests made by the Electronic Frontier Foundation (EFF). [4]

Components

It is composed of at least three classified software components that run on the Windows operating system—DCS3000, DCS5000, DCS6000.

DCS-1000

DCS-3000

DCS-3000 and "Red Hook" were first mentioned publicly in a March 2006 report from the United States Department of Justice Office of the Inspector General on the implementation of the Communications Assistance for Law Enforcement Act (CALEA). [5] The report described Red Hook as "a system to collect voice and data calls and then process and display the intercepted information in the absence of a CALEA solution." [5] and it described DCS-3000 "as an interim solution to intercept personal communications services delivered via emerging digital technologies used by wireless carriers in advance of any CALEA solutions being deployed." [5]

Citing the OIG report, the Electronic Frontier Foundation (EFF) filed an FOIA request later that year in order to obtain more information about the two programs. When the FBI did not respond with more information, the EFF sued, and in May 2007 obtained a court order to release documents concerning the programs. [6] [7]

On August 29, 2007, Wired magazine published an article on these systems, citing the EFF documents. [1] The DCS-3000 collects information associated with dialed and incoming numbers like traditional trap-and-trace and pen registers. The article named "Red Hook" as the client for DCS-3000. [1] Wired reported that the DCS-3000 cost $320 per number targeted, and that the software is maintained by Booz Allen Hamilton. [8]

DCS-5000

The DCS-5000 is a system used by the FBI unit responsible for counter-intelligence to target suspected spies, alleged terrorists, and others with wiretaps.

DCS-6000

The DCS-6000 (a.k.a. "Digital Storm") captures the content of phone calls and text messages for analysis. [1] [9] Once the data has been captured, it is indexed and prioritized using the Electronic Surveillance Data Management System (ELSUR). [9]

See also

Related Research Articles

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

Telephone tapping is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on the telephone line. Legal wiretapping by a government agency is also called lawful interception. Passive wiretapping monitors or records the traffic, while active wiretapping alters or otherwise affects it.

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

The Communications Assistance for Law Enforcement Act (CALEA), also known as the "Digital Telephony Act," is a United States wiretapping law passed in 1994, during the presidency of Bill Clinton.

<span class="mw-page-title-main">Carnivore (software)</span> Electronic communication monitor used by the FBI

Carnivore, later renamed DCS1000, was a system implemented by the Federal Bureau of Investigation (FBI) that was designed to monitor email and electronic communications. It used a customizable packet sniffer that could monitor all of a target user's Internet traffic. Carnivore was implemented in October 1997. By 2005 it had been replaced with improved commercial software.

Lawful interception (LI) refers to the facilities in telecommunications and telephone networks that allow law enforcement agencies with court orders or other legal authorization to selectively wiretap individual subscribers. Most countries require licensed telecommunications operators to provide their networks with Legal Interception gateways and nodes for the interception of communications. The interfaces of these gateways have been standardized by telecommunication standardization organizations. As with many law enforcement tools, LI systems may be subverted for illicit purposes.

The USA PATRIOT Act was passed by the United States Congress in 2001 as a response to the September 11, 2001 attacks. It has ten titles, each containing numerous sections. Title II: Enhanced Surveillance Procedures granted increased powers of surveillance to various government agencies and bodies. This title has 25 sections, with one of the sections containing a sunset clause which sets an expiration date, December 31, 2005, for most of the title's provisions. This was extended twice: on December 22, 2005 the sunset clause expiration date was extended to February 3, 2006 and on February 2 of the same year it was again extended, this time to March 10.

<span class="mw-page-title-main">NSA warrantless surveillance (2001–2007)</span> Part of the Terrorist Surveillance Program

NSA warrantless surveillance — also commonly referred to as "warrantless-wiretapping" or "-wiretaps" — refers to the surveillance of persons within the United States, including U.S. citizens, during the collection of notionally foreign intelligence by the National Security Agency (NSA) as part of the Terrorist Surveillance Program. In late 2001, the NSA was authorized to monitor, without obtaining a FISA warrant, the phone calls, Internet activity, text messages and other communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lay within the U.S.

<span class="mw-page-title-main">Terrorist Surveillance Program</span> NSA program

The Terrorist Surveillance Program was an electronic surveillance program implemented by the National Security Agency (NSA) of the United States in the wake of the September 11, 2001 attacks. It was part of the President's Surveillance Program, which was in turn conducted under the overall umbrella of the War on Terrorism. The NSA, a signals intelligence agency, implemented the program to intercept al Qaeda communications overseas where at least one party is not a U.S. person. In 2005, The New York Times disclosed that technical glitches resulted in some of the intercepts including communications which were "purely domestic" in nature, igniting the NSA warrantless surveillance controversy. Later works, such as James Bamford's The Shadow Factory, described how the nature of the domestic surveillance was much, much more widespread than initially disclosed. In a 2011 New Yorker article, former NSA employee Bill Binney said that his colleagues told him that the NSA had begun storing billing and phone records from "everyone in the country."

<i>Hepting v. AT&T</i>

Hepting v. AT&T is a United States class action lawsuit filed in January 2006 by the Electronic Frontier Foundation (EFF) against the telecommunications company AT&T, in which the EFF alleges that AT&T permitted and assisted the National Security Agency (NSA) in unlawfully monitoring the communications of the United States, including AT&T customers, businesses and third parties whose communications were routed through AT&T's network, as well as voice over IP telephone calls routed via the Internet.

<span class="mw-page-title-main">Room 641A</span> Telecommunication facility allegedly used for U.S. National Security Agency surveillance

Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency, as part of its warrantless surveillance program as authorized by the Patriot Act. The facility commenced operations in 2003 and its purpose was publicly revealed in 2006.

Investigative Data Warehouse (IDW) is a searchable database operated by the FBI. It was created in 2004. Much of the nature and scope of the database is classified. The database is a centralization of multiple federal and state databases, including criminal records from various law enforcement agencies, the U.S. Department of the Treasury's Financial Crimes Enforcement Network (FinCEN), and public records databases. According to Michael Morehart's testimony before the House Committee on Financial Services in 2006, the "IDW is a centralized, web-enabled, closed system repository for intelligence and investigative data. This system, maintained by the FBI, allows appropriately trained and authorized personnel throughout the country to query for information of relevance to investigative and intelligence matters."

Lincoln, manufactured by the company Pen-Link, Ltd., is a class of electronic data interception products—including both computer hardware and software packages—whose function is to extract and analyze internet traffic for mass surveillance purposes, such as those outlined under the Communications Assistance For Law Enforcement Act (CALEA).

The Computer and Internet Protocol Address Verifier (CIPAV) is a data gathering tool that the Federal Bureau of Investigation (FBI) uses to track and gather location data on suspects under electronic surveillance. The software operates on the target computer much like other forms of spyware, whereas it is unknown to the operator that the software has been installed and is monitoring and reporting on their activities.

<span class="mw-page-title-main">President's Surveillance Program</span>

The President's Surveillance Program (PSP) is a collection of secret intelligence activities authorized by the President of the United States George W. Bush after the September 11 attacks in 2001 as part of the War on Terrorism. Information collected under this program was protected within a Sensitive Compartmented Information security compartment codenamed STELLARWIND.

Triggerfish describes a technology of cell phone interception and surveillance using a mobile cellular base station. The devices are also known as cell-site simulators or digital analyzers.

<span class="mw-page-title-main">Mass surveillance in the United States</span> Overview of mass surveillance in the United States of America

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

<span class="mw-page-title-main">Data Intercept Technology Unit</span> US FBI special unit

The Data Intercept Technology Unit is a unit of the Federal Bureau of Investigation (FBI) of the United States, which is responsible for intercepting telephone calls and e-mail messages of terrorists and foreign intelligence targets inside the US. It is not known when DITU was established, but the unit already existed in 1997.

<span class="mw-page-title-main">Barack Obama on mass surveillance</span> Overview of the statements of former U.S. president Barack Obama on mass surveillance

U.S. president Barack Obama has received widespread criticism due to his support of government surveillance. President Obama had released many statements on mass surveillance as a result.

References

  1. 1 2 3 4 5 Ryan Singel (29 Aug 2007). "Point, Click ... Eavesdrop: How the FBI Wiretap Net Operates". Wired. Retrieved 12 Aug 2015.
  2. Army Guard and FBI sign up for Peerless IP net Archived 2007-09-27 at the Wayback Machine
  3. Sprint. "FBI Will Use Unique New Network, Sprint Peerless IP" (Press release). PR Newswire. Retrieved 12 Aug 2015.
  4. Marcia Hofmann (29 Aug 2007). "EFF Documents Shed Light on FBI Electronic Surveillance Technology". Electronic Frontier Foundation. Retrieved 12 Aug 2015.
  5. 1 2 3 "OIG Audit Report 06-13". www.usdoj.gov.
  6. "FBI forced to divulge spying details". The Sydney Morning Herald. 31 Aug 2007. Retrieved 12 Aug 2015.
  7. "DCS-3000 and Red Hook". eff.org. 10 July 2011.
  8. Singel, Ryan (December 19, 2007). "FBI E-Mail Shows Rift Over Warrantless Phone Record Grabs". Wired . Archived from the original on June 27, 2018. DCS 3000 – the FBI's tool for recording the phone numbers a target calls, or is called from – was set loose on 5,300 phones in 2005, at a cost of $320 per targeted number. Those costs did not include payments to telecoms for the intercepts. The software is maintained by Booz Allen Hamilton and contained more than 490,000 lines of code as of 2005.
  9. 1 2 James Bamford (14 October 2008). The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America . Knopf Doubleday Publishing Group. p.  185. ISBN   978-0-385-52839-9.