The DCS-6000, or “Digital Storm,” captures and collects the - TopicsExpress



          

The DCS-6000, or “Digital Storm,” captures and collects the content—the spoken or written communications—of phone calls and text messages. bullet The most classified system of the three, the DCS-5000, is used for wiretaps targeting spies or terrorists. Between the three, the system can allow FBI agents to monitor recorded phone calls and messages in real time, create master wiretap files, send digital recordings to translators, track the location of targets in real time using cell-tower information, and stream intercepts to mobile surveillance vans. The entire system is operated through a private, secure and self-contained backbone that is run for the government by Sprint. Singel gives the following example: “The network allows an FBI agent in New York, for example, to remotely set up a wiretap on a cell phone based in Sacramento, California, and immediately learn the phone’s location, then begin receiving conversations, text messages and voicemail pass codes in New York. With a few keystrokes, the agent can route the recordings to language specialists for translation.” Dialed numbers are subjected to data mining, including so-called “link analysis.” The precise number of US phones being monitored and recorded in this way is classified. Genesis of DCSNet - The system was made possible by the 1994 Communications Assistance for Law Enforcement Act (CALEA) (see January 1, 1995), which mandated that telecom providers must build “backdoors” in US telephone switches to be used by government wiretappers. CALEA also ordered telecom firms to install only switching equipment that met detailed wiretapping standards. Before CALEA, the FBI would bring a wiretap warrant to a particular telecom, and that firm would itself create a tap. Now, the FBI logs in directly to the telecom networks and monitors a surveillance target itself through DCSNet. FBI special agent Anthony DiClemente, chief of the Data Acquisition and Intercept Section of the FBI’s Operational Technology Division, says the DCS was originally intended in 1997 to be a temporary solution, but has grown into a full-featured CALEA-collection software suite. “CALEA revolutionizes how law enforcement gets intercept information,” he says. “Before CALEA, it was a rudimentary system that mimicked Ma Bell.” Now, under CALEA, phone systems and Internet service providers have been forced to allow DCSNet to access almost all of its data (see 1997-August 2007 and After). Security Breaches - The system is vulnerable to hacking and security breaches (see 2003). [WIRED NEWS, 8/29/2007] Entity Tags: Steven Bellovin, Ryan Singel, Federal Bureau of Investigation, Anthony DiClemente, Operational Technology Division (FBI), Communications Assistance for Law Enforcement Act (CALEA), Digital Collection System, Data Acquisition and Intercept Section (FBI), Sprint/Nextel Category Tags: Government Acting in Secret, Government Classification, Database Programs, Other Surveillance After July 11, 1997: CIA Obtains Domestic Call and Financial Information to Support ‘Black Ops’Edit event Some time after he is appointed CIA Director (see July 11, 1997), but before 9/11, George Tenet negotiates a series of agreements with telecommunications and financial institutions “to get access to certain telephone, Internet, and financial records related to ‘black’ intelligence operations.” The arrangements are made personally by the companies’ CEOs and Tenet, who plays “the patriot card” to get the information. The arrangement involves the CIA’s National Resources Division, which has at least a dozen offices in the US. The Division’s main aim is to recruit people in the US to spy abroad. However, in this case the Division makes arrangements so that other intelligence agencies, such as the NSA, can access the information and records the CEOs agree to provide. [WOODWARD, 2006, PP. 323-5] There is a history of co-operation between the CIA’s National Resources Division and the NSA. For example, Monte Overacre, a CIA officer assigned to the Division’s San Diego office in the early 1990s, said that he worked with the NSA there, obtaining information about foreign telecommunications programs and passing it on to the Technology Management Office, a joint venture between the two agencies. [MOTHER JONES, 1/1998] One US official will say that the arrangements only give the CIA access to the companies’ passive databanks. However, reporter Bob Woodward will say that the programme raises “serious civil liberties questions and also demonstrate[d] that the laws had not kept pace with the technology.” [WOODWARD, 2006, PP. 324-5] There will be an interagency argument about the program after 9/11 (see (2003 and After)). Entity Tags: Monte Overacre, National Security Agency, Central Intelligence Agency, CIA Technology Management Office, Bob Woodward, George J. Tenet, CIA National Resources Division Timeline Tags: Complete 911 Timeline, 9/11 Timeline Category Tags: Other Legal Changes, Privacy, Government Acting in Secret, Government Classification, Database Programs Late 1999: NSA Begins ‘Trailblazer’ Data Mining ProgramEdit event will illustrate that by 2009 the mining of all emails, text messages, telephone calls and personal computers in North American will employ artificial intelligence on universities, medical professionals personal contacts and Christian & Jewish organizations using keyword and string-sentences that will use the Shoot First And Write Later (SFWL) fifth column hidden vigilante groups based upon the NKVD social models that Germanated in the Balkans with the Black Hand Turkish events of Sarajevo and were termed unconstitutional by Allen Dulles during the Third Reich era.
Posted on: Sun, 20 Jul 2014 06:36:56 +0000

Trending Topics



Recently Viewed Topics




© 2015