PDA

View Full Version : Wiretapping Firm Says Telecom Providers Could Be Handing Over More Data Than Authorized




sailingaway
03-14-2013, 04:26 PM
Wiretapping emails and phone calls has always been a contentious law enforcement tactic. But now surveillance is becoming more of a legal minefield than ever in the United States, thanks to a clash between European and American eavesdropping regulations—and some telecom firms could be handing over data on suspects without court authorization.

That’s according to a company that plays a significant but little-known role monitoring communications for agencies like the FBI, the DEA, and the Department of Homeland Security. Subsentio, based out of Centennial, Colo., provides telecommunication companies with an outsourced wiretap service—fitting surveillance “probe” equipment into their network infrastructure and then handling spy requests on their behalf. Subsentio won’t say who its customers are, but it claims it deals with major national and international communication firms in the United States and is responsible for “millions of subscribers” across mobile and broadband networks.

When a law enforcement agency like the FBI wants to monitor a person’s communications, it has to get authorization. To obtain metadata showing IP addresses and basic information like “to” and “from” fields in an email, the bureau fills out a form certifying that the requested information is relevant to an ongoing investigation and asks a court to sign off a “pen register” and/or “trap and trace” order. (In 2011, 37,616 of these were approved.) But obtaining communications content—like the body of an email or audio of a call—requires a much higher legal standard, because the authorities in most cases have to show probable cause and obtain a search warrant from a judge.

Subsentio’s surveillance equipment was tailored for U.S. laws, so it provides only the data requested by the applicable court order. But Subsentio President Steve Bock told me in a phone interview last week that some of the surveillance technology used by carriers in the United States to pass communications data to the authorities was built instead to European standards. This means it can’t properly differentiate between pen register metadata requests and so-called “Title III” content surveillance orders. Consequently, “service providers could be delivering content that has not been authorized by the court,” Bock says.

It’s not clear how widespread a problem this is, mainly because the surveillance is shrouded in secrecy. According to Bock, carriers will tend to “deliver too little information instead of too much,” and if the authorities do receive too much data, then they have “minimization procedures” to delete content they were not authorized to receive. But the prospect of telecommunications companies passing on more data than authorized even in a small number of cases will no doubt unsettle privacy and civil liberties groups, who are already up in arms about various government surveillance issues.

Subsentio is trying to cash in on the legal landmines by offering to handle carriers’ surveillance requests and ensure compliance with U.S. law. I contacted 11 of the major wireless and broadband providers to ask whether they had a relationship with Subsentio. Comcast, T-Mobile, and U.S. Cellular said they weren’t customers, Verizon and AT&T wouldn’t comment on the record as a matter of policy, and the others hadn’t responded at the time of publication. Bock declined to comment on his company’s revenue or reveal the number of staff he employs, though he hinted that business is good. “We are busy,” he said, adding that Subsentio has “personnel in virtually every time zone” and runs a “24/7” operation. He also claimed that the company handles “top secret” Foreign Intelligence Surveillance Act requests and, perhaps more notably, told me that wiretaps are on the rise.

“Because of national security issues there is a certain increase in the need for surveillance for terrorist activities,” Bock said.

The question is: How much of that surveillance is being conducted using European-standard equipment—and how often, as a result, are law enforcement agencies receiving more data than a court has authorized?

http://www.slate.com/blogs/future_tense/2013/03/14/subsentio_raises_concerns_about_telecom_companies_ handing_over_too_much.html

CPUd
03-14-2013, 05:07 PM
http://techcrunch.com/2011/12/01/carrier-iq-how-to-find-it-and-how-to-deal-with-it/

HOLLYWOOD
03-14-2013, 06:19 PM
http://www.koolspan.com/wp-content/uploads/2011/11/blanklogo.png

http://www.koolspan.com/
Mobile Security for Your Smartphone


http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401val2010.htm
Validated FIPS 140-1 and FIPS 140-2 Cryptographic Modules

Anti Federalist
03-14-2013, 09:53 PM
Of course they are handing over more than is required.

What makes you think these mega global corps give a fuck about you or your privacy or rights?

Tyrannized by the "private".

amy31416
03-14-2013, 10:00 PM
Of course they are handing over more than is required.

What makes you think these mega global corps give a fuck about you or your privacy or rights?

Tyrannized by the "private".

Any idiot who has a couple brain cells to rub together knows this. The totally effed up crap is that someone who knows what they're doing would NEVER use electronic communications of any sort. Jesus, I'm just some numbskull and I know that--which is probably why the only "terrorists" they "trap" are mentally defective young men with mental disorders who they bait.

How is nobody really reporting on this aspect of it? This pisses me off to no end.

Anti Federalist
03-14-2013, 10:04 PM
Off Topic but, I'm smashing this new phone that everybody gave me shit about not getting for so long.

I'm putting my old i700 back online if they allow it, if not, I'm going phoneless, fuck it.

When Domino's FFS can peg me to three feet, with all the tracking and big brother shit supposedly turned off, it ain't worth it.

Ya'll can have this future you are making for yourself, I want no part of it.

Anti Federalist
03-14-2013, 10:06 PM
Any idiot who has a couple brain cells to rub together knows this. The totally effed up crap is that someone who knows what they're doing would NEVER use electronic communications of any sort. Jesus, I'm just some numbskull and I know that--which is probably why the only "terrorists" they "trap" are mentally defective young men with mental disorders who they bait.

How is nobody really reporting on this aspect of it? This pisses me off to no end.

What pisses me off even more is that so many people, who should damn well know better, give this shit a pass because there is some semblance of "private enterprise" happening here, as if that somehow makes it all better.

amy31416
03-14-2013, 10:30 PM
What pisses me off even more is that so many people, who should damn well know better, give this shit a pass because there is some semblance of "private enterprise" happening here, as if that somehow makes it all better.

Corporatism is completely changing the "game." We have a "smart" phone, but holy crap does it make me paranoid--I want it out of here. If I were to become a serious malcontent, would I use such a device? No freaking way--so what's the goddamned point? To catch idiots?

I guess that's good enough to convince the masses that they're doing their jobs. Woot.

HOLLYWOOD
03-14-2013, 10:40 PM
http://wrongfulconvictionsblog.org/2012/06/01/cell-tower-triangulation-how-it-works/

Cell Tower Triangulation – How it Works June 1, 2012 (http://wrongfulconvictionsblog.org/2012/06/01/cell-tower-triangulation-how-it-works/) by Phil Locke (http://wrongfulconvictionsblog.org/author/plocke7/)

http://globalwrong.files.wordpress.com/2012/05/cell-tower.jpg?w=154&h=300 (http://globalwrong.files.wordpress.com/2012/05/cell-tower.jpg)
First, I refer you to Martin Yant’s earlier post on this subject: http://wrongfulconvictionsblog.org/2012/05/10/cell-phone-evidence-doesnt-always-ring-true/

The post makes the point that data from a single cell tower is essentially worthless in trying to place someone in a particular location. The best you can expect is a band within a 120° “pie wedge” from the cell tower.
If two cell towers are used, it gets much better, and if three towers are used it gets even better yet. But to make sure this kind of evidence doesn’t get misused, and to know what it’s limitations are, it’s important to know how it works.
You may have noticed that the antennas on a cell tower are always arranged in a triangle. There are some sound technical and economic reasons for this, but we won’t go into that here. But it does mean that a cell tower can tell from which of the three antenna arrays it is receiving a signal. Each of the three antenna arrays covers a 120° sector with the tower at it’s focus, and these sectors, by convention, are referred to as alpha, beta, and gamma - α, β, γ.
Within each sector, the tower can make a measurement of how far away the transmitting cell phone is. This is done by measuring signal strength and the round-trip signal time. For a lot of technical reasons, this is not a very accurate measurement, and the determined distance will have a reasonably significant error band.
Here is a diagram of a single cell tower showing concentric bands of distance from the tower, and the three “sectors”. The distance bands don’t stop at “6″, but this is just to give you the idea. Note that at six miles out, the arc of a sector is 12.6 miles long.
http://globalwrong.files.wordpress.com/2012/06/tower-1.jpg?w=500 (http://globalwrong.files.wordpress.com/2012/06/tower-1.jpg)
Here is how a single-tower location would work. The cell tower has determined that the signal is coming from the γ sector, and that the origin of the signal is approximately 4 miles from the tower. This would place the caller within the yellow band, which you can see is 8.4 miles long and “about” ½ mile wide – an area of 4.2 sq. miles.
http://globalwrong.files.wordpress.com/2012/06/tower-2.jpg?w=500&h=414 (http://globalwrong.files.wordpress.com/2012/06/tower-2.jpg)
If the cell phone in question is also negotiating with a second cell tower at the same time (and this must be the case), the ability to locate the phone gets much better. Here is a diagram of the situation when the phone is 4 miles from the “orange” tower in the γsector, and 5 miles from the “blue” tower in the α sector. This will place the phone in an oval (shown in red) whose center is the intersection of the swept areas of the two towers’ approximate distance bands.
http://globalwrong.files.wordpress.com/2012/06/tower-3.jpg?w=500&h=514 (http://globalwrong.files.wordpress.com/2012/06/tower-3.jpg)
If a third tower is brought into play, and the phone in question is determined to be 5 miles from the (third) “green” tower, this diagram shows that the area of location can be estimated even more closely. Keep in mind that the phone must be negotiating with all three towers at the same time.
http://globalwrong.files.wordpress.com/2012/06/tower-4.jpg?w=500&h=462 (http://globalwrong.files.wordpress.com/2012/06/tower-4.jpg)
In densely populated urban areas, the cell towers are close together, and a much closer estimation of phone location can be made than in a rural area, where the towers are far apart.
Some of the newest cell phones can actually report a GPS location, and this is quite accurate, and doesn’t rely on the cell towers at all.
Using cell tower triangulation (3 towers), it is possible to determine a phone location to within an area of “about“ ¾ square mile.
Cell tower locating evidence often goes unchallenged by the defense. Now that you have the basics, you should be in a position to challenge that kind of evidence when it’s called for.