Langbahn Team – Weltmeisterschaft

Digital Collection System Network

Official logo of DCS3000 system.

The Digital Collection System Network (DCSNet) is the Federal Bureau of Investigation (FBI)'s point-and-click surveillance system that can perform instant wiretaps on almost any telecommunications device in the United States.[1]

It allows access to cellphone, landline, SMS communications anywhere in the US from a point-and-click interface. It runs on a fiber-optic backbone that is separate from the Internet.[2] It is intended to increase agent productivity through workflow modeling, allowing for the routing of intercepts for translation or analysis with only a few clicks. The DCSNet real-time intelligence data intercept has the capability to record, review and playback intercepted material in real-time.[1]

The DCSNet systems operate on a virtual private network parallel to the public Internet, with services provided at least for some time by the Sprint Peerless IP network.[3]

Much of the information available on this system has come from the results of Freedom of Information Act (FOIA) requests made by the Electronic Frontier Foundation (EFF).[4]

Components

It is composed of at least three classified software components that run on the Windows operating system—DCS3000, DCS5000, DCS6000.

DCS-1000

DCS-3000

DCS-3000 and "Red Hook" were first mentioned publicly in a March 2006 report from the United States Department of Justice Office of the Inspector General (OIG) on the implementation of the Communications Assistance for Law Enforcement Act (CALEA).[5] The report described Red Hook as "a system to collect voice and data calls and then process and display the intercepted information in the absence of a CALEA solution."[5] and it described DCS-3000 "as an interim solution to intercept personal communications services delivered via emerging digital technologies used by wireless carriers in advance of any CALEA solutions being deployed."[5]

Citing the OIG report, the Electronic Frontier Foundation (EFF) filed an FOIA request later that year in order to obtain more information about the two programs. When the FBI did not respond with more information, the EFF sued, and in May 2007 obtained a court order to release documents concerning the programs.[6][7]

On August 29, 2007, Wired magazine published an article on these systems, citing the EFF documents.[1] The DCS-3000 collects information associated with dialed and incoming numbers like traditional trap-and-trace and pen registers. The article named "Red Hook" as the client for DCS-3000.[1] Wired reported that the DCS-3000 cost $320 per number targeted, and that the software is maintained by Booz Allen Hamilton.[8]

DCS-5000

The DCS-5000 is a system used by the FBI unit responsible for counter-intelligence to target suspected spies, alleged terrorists, and others with wiretaps.

DCS-6000

The DCS-6000 (a.k.a. "Digital Storm") captures the content of phone calls and text messages for analysis.[1][9] Once the data has been captured, it is indexed and prioritized using the Electronic Surveillance Data Management System (ELSUR).[9]

See also

References

  1. ^ a b c d e Ryan Singel (29 Aug 2007). "Point, Click ... Eavesdrop: How the FBI Wiretap Net Operates". Wired. Retrieved 12 Aug 2015.
  2. ^ Army Guard and FBI sign up for Peerless IP net Archived 2007-09-27 at the Wayback Machine
  3. ^ Sprint. "FBI Will Use Unique New Network, Sprint Peerless IP" (Press release). PR Newswire. Retrieved 12 Aug 2015.
  4. ^ Marcia Hofmann (29 Aug 2007). "EFF Documents Shed Light on FBI Electronic Surveillance Technology". Electronic Frontier Foundation. Retrieved 12 Aug 2015.
  5. ^ a b c "OIG Audit Report 06-13". www.usdoj.gov.
  6. ^ "FBI forced to divulge spying details". The Sydney Morning Herald. 31 Aug 2007. Retrieved 12 Aug 2015.
  7. ^ "DCS-3000 and Red Hook". eff.org. 10 July 2011.
  8. ^ Singel, Ryan (December 19, 2007). "FBI E-Mail Shows Rift Over Warrantless Phone Record Grabs". Wired. Archived from the original on June 27, 2018. DCS 3000 – the FBI's tool for recording the phone numbers a target calls, or is called from – was set loose on 5,300 phones in 2005, at a cost of $320 per targeted number. Those costs did not include payments to telecoms for the intercepts. The software is maintained by Booz Allen Hamilton and contained more than 490,000 lines of code as of 2005.
  9. ^ a b James Bamford (14 October 2008). The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America. Knopf Doubleday Publishing Group. p. 185. ISBN 978-0-385-52839-9.