Digital Collection System Network: Difference between revisions
Flemingdon (talk | contribs) Undid revision 932637506 by 86.99.215.13 (talk) thumb|Official logo of DCS3000 system. |
|||
(15 intermediate revisions by 8 users not shown) | |||
Line 1: | Line 1: | ||
[[File:Dcs3000 logo.jpg|thumb|Official logo of DCS3000 system.]] |
[[File:Dcs3000 logo.jpg|thumb|Official logo of DCS3000 system.]] |
||
⚫ | The '''Digital Collection System Network''' ('''DCSNet''') is the [[Federal Bureau of Investigation]] (FBI)'s [[point-and-click]] surveillance system that can perform instant wiretaps on almost any telecommunications device in the |
||
⚫ | The '''Digital Collection System Network''' ('''DCSNet''') is the [[Federal Bureau of Investigation]] (FBI)'s [[point-and-click]] [[surveillance]] system that can perform instant wiretaps on almost any telecommunications device in the [[United States]].<ref name="wired.com">{{cite magazine|url=https://www.wired.com/politics/security/news/2007/08/wiretap|title=Point, Click ... Eavesdrop: How the FBI Wiretap Net Operates|magazine=Wired|author=Ryan Singel|date=29 Aug 2007|accessdate=12 Aug 2015}}</ref> |
||
⚫ | It allows access to [[Mobile phone|cellphone]], [[landline]], [[Short message service|SMS]] communications anywhere in the [[United States|US]] from a point-and-click interface. |
||
⚫ | It allows access to [[Mobile phone|cellphone]], [[landline]], [[Short message service|SMS]] communications anywhere in the [[United States|US]] from a point-and-click interface. It runs on a [[fiber-optic]] [[Backbone network|backbone]] that is separate from the [[Internet]].<ref>[http://www.gcn.com/print/22_31/23967-1.html Army Guard and FBI sign up for Peerless IP net] {{webarchive|url=https://web.archive.org/web/20070927194538/http://www.gcn.com/print/22_31/23967-1.html |date=2007-09-27 }}</ref> It is intended to increase agent productivity through workflow modeling, allowing for the routing of intercepts for translation or analysis with only a few clicks. The DCSNet real-time [[Military intelligence|intelligence]] data intercept has the capability to record, review and playback intercepted material in real-time.<ref name="wired.com" /> |
||
The DCSNET systems operate on a [[virtual private network]] parallel to the public internet, with services provided at least for some time by the [[Sprint Corporation|Sprint]] peerless IP network.<ref>{{cite web|url=http://www.prnewswire.com/news-releases/fbi-will-use-unique-new-network-sprint-peerless-ip-72640567.html|title=FBI Will Use Unique New Network, Sprint Peerless IP |publisher=PR Newswire|author=Sprint|accessdate=12 Aug 2015}}</ref> |
|||
The DCSNet systems operate on a [[virtual private network]] parallel to the public Internet, with services provided at least for some time by the [[Sprint Corporation|Sprint]] Peerless IP network.<ref>{{cite press release |url=http://www.prnewswire.com/news-releases/fbi-will-use-unique-new-network-sprint-peerless-ip-72640567.html|title=FBI Will Use Unique New Network, Sprint Peerless IP |publisher=PR Newswire|author=Sprint|accessdate=12 Aug 2015}}</ref> |
|||
Much of the information available on this system has come from the results of [[Freedom of Information Act (United States)|Freedom of Information Act]] (FOIA) requests made by the [[Electronic Frontier Foundation]] (EFF).<ref>{{cite web|url=https://www.eff.org/deeplinks/2007/08/eff-documents-shed-light-fbi-electronic-surveillance-technology|title=EFF Documents Shed Light on FBI Electronic Surveillance Technology|publisher=Electronic Frontier Foundation|author=Marcia Hofmann|date=29 Aug 2007|access-date=12 Aug 2015}}</ref> |
|||
==Components== |
==Components== |
||
Line 15: | Line 16: | ||
===DCS-3000=== |
===DCS-3000=== |
||
DCS-3000 and "Red Hook" were first mentioned publicly in a March 2006 report from the [[United States Department of Justice Office of the Inspector General]] on the implementation of the [[Communications Assistance for Law Enforcement Act]] (CALEA).<ref name=OIG /> The report described Red Hook as "a system to collect voice and data calls and then process and display the intercepted information in the absence of a [[Communications Assistance for Law Enforcement Act|CALEA]] solution."<ref name=OIG>{{cite web|url=http://www.usdoj.gov/oig/reports/FBI/a0613/app8.htm|title=OIG Audit Report 06-13|website=www.usdoj.gov}}</ref> and it described DCS-3000 "as an interim solution to intercept personal communications services delivered via emerging digital technologies used by wireless carriers in advance of any CALEA solutions being deployed."<ref name=OIG/> |
DCS-3000 and "Red Hook" were first mentioned publicly in a March 2006 report from the [[United States Department of Justice Office of the Inspector General]] (OIG) on the implementation of the [[Communications Assistance for Law Enforcement Act]] (CALEA).<ref name=OIG /> The report described Red Hook as "a system to collect voice and data calls and then process and display the intercepted information in the absence of a [[Communications Assistance for Law Enforcement Act|CALEA]] solution."<ref name=OIG>{{cite web|url=http://www.usdoj.gov/oig/reports/FBI/a0613/app8.htm|title=OIG Audit Report 06-13|website=www.usdoj.gov}}</ref> and it described DCS-3000 "as an interim solution to intercept personal communications services delivered via emerging digital technologies used by wireless carriers in advance of any CALEA solutions being deployed."<ref name=OIG/> |
||
Citing the OIG report, the [[Electronic Frontier Foundation]] (EFF) filed an [[Freedom of Information Act (United States)|FOIA]] request later that year in order to obtain more information about the two programs. When the FBI did not respond with more information, the EFF sued, and in May 2007 obtained a court order to release documents concerning the programs.<ref>{{cite news|url=http://www.smh.com.au/news/World/FBI-forced-to-divulge-spying-details/2007/08/31/1188067331398.html|title=FBI forced to divulge spying details|newspaper=The Sydney Morning Herald|date=31 Aug 2007|accessdate=12 Aug 2015}}</ref><ref>{{cite web|url=https://www.eff.org/issues/foia/061708CKK|title=DCS-3000 and Red Hook|date=10 July 2011|website=eff.org}}</ref> |
Citing the OIG report, the [[Electronic Frontier Foundation]] (EFF) filed an [[Freedom of Information Act (United States)|FOIA]] request later that year in order to obtain more information about the two programs. When the FBI did not respond with more information, the EFF sued, and in May 2007 obtained a court order to release documents concerning the programs.<ref>{{cite news|url=http://www.smh.com.au/news/World/FBI-forced-to-divulge-spying-details/2007/08/31/1188067331398.html|title=FBI forced to divulge spying details|newspaper=The Sydney Morning Herald|date=31 Aug 2007|accessdate=12 Aug 2015}}</ref><ref>{{cite web|url=https://www.eff.org/issues/foia/061708CKK|title=DCS-3000 and Red Hook|date=10 July 2011|website=eff.org}}</ref> |
||
On August 29, 2007, ''[[Wired (magazine)|Wired]]'' magazine published an article on these systems, citing the EFF documents.<ref name="wired.com" /> The DCS-3000 collects information associated with dialed and incoming numbers like traditional [[Trap and trace device|trap-and-trace]] and [[pen register]]s. The article named "Red Hook" as the client for DCS-3000.<ref name="wired.com"/> ''Wired'' reported that the DCS-3000 cost $320 per number targeted, and that the software is maintained by [[Booz Allen Hamilton]].<ref>{{cite magazine |url=https://www.wired.com/2007/12/fbi-e-mail-shows-rift-over-warrantless-phone-record-grabs/?currentPage=1 |magazine=[[Wired (magazine)|Wired]] |title=FBI E-Mail Shows Rift Over Warrantless Phone Record Grabs |date=December 19, 2007 |archive-url=https://archive. |
On August 29, 2007, ''[[Wired (magazine)|Wired]]'' magazine published an article on these systems, citing the EFF documents.<ref name="wired.com" /> The DCS-3000 collects information associated with dialed and incoming numbers like traditional [[Trap and trace device|trap-and-trace]] and [[pen register]]s. The article named "Red Hook" as the client for DCS-3000.<ref name="wired.com"/> ''Wired'' reported that the DCS-3000 cost $320 per number targeted, and that the software is maintained by [[Booz Allen Hamilton]].<ref>{{cite magazine |url=https://www.wired.com/2007/12/fbi-e-mail-shows-rift-over-warrantless-phone-record-grabs/?currentPage=1 |magazine=[[Wired (magazine)|Wired]] |title=FBI E-Mail Shows Rift Over Warrantless Phone Record Grabs |date=December 19, 2007 |archive-url=https://archive.today/20180627182253/https://www.wired.com/2007/12/fbi-e-mail-shows-rift-over-warrantless-phone-record-grabs/?currentPage=1 |archive-date=June 27, 2018 |first=Ryan |last=Singel |quote=DCS 3000 – the FBI's tool for recording the phone numbers a target calls, or is called from – was set loose on 5,300 phones in 2005, at a cost of $320 per targeted number. Those costs did not include payments to telecoms for the intercepts. The software is maintained by Booz Allen Hamilton and contained more than 490,000 lines of code as of 2005.}}</ref> |
||
===DCS-5000=== |
===DCS-5000=== |
||
The DCS-5000 is a system used by the FBI unit responsible for [[counter-intelligence]] to target suspected spies, alleged terrorists, and others with wiretaps. |
The DCS-5000 is a system used by the FBI unit responsible for [[counter-intelligence]] to target suspected [[Espionage|spies]], alleged [[Terrorism|terrorists]], and others with wiretaps. |
||
===DCS-6000=== |
===DCS-6000=== |
||
The DCS-6000 (a.k.a. "Digital Storm") captures the content of phone calls and [[Text messaging|text messages]] for analysis.<ref name="wired.com"/><ref name="Bamford2008">{{cite book|author=James Bamford|title=The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America|url=https:// |
The DCS-6000 (a.k.a. "Digital Storm") captures the content of phone calls and [[Text messaging|text messages]] for analysis.<ref name="wired.com"/><ref name="Bamford2008">{{cite book|author=James Bamford|title=The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America|url=https://archive.org/details/shadowfactory00bamf|url-access=registration|date=14 October 2008|publisher=Knopf Doubleday Publishing Group|isbn=978-0-385-52839-9|page=[https://archive.org/details/shadowfactory00bamf/page/185 185]}}</ref> Once the data has been captured, it is indexed and prioritized using the Electronic Surveillance Data Management System (ELSUR).<ref name="Bamford2008"/> |
||
== See also == |
== See also == |
||
Line 37: | Line 38: | ||
== References == |
== References == |
||
{{reflist|2}} |
{{reflist|2}} |
||
[[Category:Surveillance]] |
[[Category:Surveillance]] |
||
[[Category:Sprint Corporation]] |
[[Category:Sprint Corporation]] |
Latest revision as of 10:23, 5 August 2023
The Digital Collection System Network (DCSNet) is the Federal Bureau of Investigation (FBI)'s point-and-click surveillance system that can perform instant wiretaps on almost any telecommunications device in the United States.[1]
It allows access to cellphone, landline, SMS communications anywhere in the US from a point-and-click interface. It runs on a fiber-optic backbone that is separate from the Internet.[2] It is intended to increase agent productivity through workflow modeling, allowing for the routing of intercepts for translation or analysis with only a few clicks. The DCSNet real-time intelligence data intercept has the capability to record, review and playback intercepted material in real-time.[1]
The DCSNet systems operate on a virtual private network parallel to the public Internet, with services provided at least for some time by the Sprint Peerless IP network.[3]
Much of the information available on this system has come from the results of Freedom of Information Act (FOIA) requests made by the Electronic Frontier Foundation (EFF).[4]
Components
[edit]It is composed of at least three classified software components that run on the Windows operating system—DCS3000, DCS5000, DCS6000.
DCS-1000
[edit]DCS-3000
[edit]DCS-3000 and "Red Hook" were first mentioned publicly in a March 2006 report from the United States Department of Justice Office of the Inspector General (OIG) on the implementation of the Communications Assistance for Law Enforcement Act (CALEA).[5] The report described Red Hook as "a system to collect voice and data calls and then process and display the intercepted information in the absence of a CALEA solution."[5] and it described DCS-3000 "as an interim solution to intercept personal communications services delivered via emerging digital technologies used by wireless carriers in advance of any CALEA solutions being deployed."[5]
Citing the OIG report, the Electronic Frontier Foundation (EFF) filed an FOIA request later that year in order to obtain more information about the two programs. When the FBI did not respond with more information, the EFF sued, and in May 2007 obtained a court order to release documents concerning the programs.[6][7]
On August 29, 2007, Wired magazine published an article on these systems, citing the EFF documents.[1] The DCS-3000 collects information associated with dialed and incoming numbers like traditional trap-and-trace and pen registers. The article named "Red Hook" as the client for DCS-3000.[1] Wired reported that the DCS-3000 cost $320 per number targeted, and that the software is maintained by Booz Allen Hamilton.[8]
DCS-5000
[edit]The DCS-5000 is a system used by the FBI unit responsible for counter-intelligence to target suspected spies, alleged terrorists, and others with wiretaps.
DCS-6000
[edit]The DCS-6000 (a.k.a. "Digital Storm") captures the content of phone calls and text messages for analysis.[1][9] Once the data has been captured, it is indexed and prioritized using the Electronic Surveillance Data Management System (ELSUR).[9]
See also
[edit]- Carnivore (FBI)
- ECHELON
- Investigative Data Warehouse
- Mass surveillance
- Signals intelligence (SIGINT)
References
[edit]- ^ a b c d e Ryan Singel (29 Aug 2007). "Point, Click ... Eavesdrop: How the FBI Wiretap Net Operates". Wired. Retrieved 12 Aug 2015.
- ^ Army Guard and FBI sign up for Peerless IP net Archived 2007-09-27 at the Wayback Machine
- ^ Sprint. "FBI Will Use Unique New Network, Sprint Peerless IP" (Press release). PR Newswire. Retrieved 12 Aug 2015.
- ^ Marcia Hofmann (29 Aug 2007). "EFF Documents Shed Light on FBI Electronic Surveillance Technology". Electronic Frontier Foundation. Retrieved 12 Aug 2015.
- ^ a b c "OIG Audit Report 06-13". www.usdoj.gov.
- ^ "FBI forced to divulge spying details". The Sydney Morning Herald. 31 Aug 2007. Retrieved 12 Aug 2015.
- ^ "DCS-3000 and Red Hook". eff.org. 10 July 2011.
- ^ Singel, Ryan (December 19, 2007). "FBI E-Mail Shows Rift Over Warrantless Phone Record Grabs". Wired. Archived from the original on June 27, 2018.
DCS 3000 – the FBI's tool for recording the phone numbers a target calls, or is called from – was set loose on 5,300 phones in 2005, at a cost of $320 per targeted number. Those costs did not include payments to telecoms for the intercepts. The software is maintained by Booz Allen Hamilton and contained more than 490,000 lines of code as of 2005.
- ^ a b James Bamford (14 October 2008). The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America. Knopf Doubleday Publishing Group. p. 185. ISBN 978-0-385-52839-9.