[Infowarrior] - FISA Court Repeatedly Questions FBI Wiretap Network

Richard Forno rforno at infowarrior.org
Thu Jun 12 02:18:28 UTC 2008


Secret Spy Court Repeatedly Questions FBI Wiretap Network
By Ryan Singel EmailJune 11, 2008 | 3:13:54 PMCategories: Surveillance

http://blog.wired.com/27bstroke6/2008/06/secret-spy-cour.html

Does the FBI track cellphone users' physical movements without a  
warrant? Does the Bureau store recordings of innocent Americans caught  
up in wiretaps in a searchable database?  Does the FBI's wiretap  
equipment store information like voicemail passwords and bank account  
numbers without legal authorization to do so?

That's what the nation's Foreign Intelligence Surveillance Court  
wanted to know, in a series of secret inquiries in 2005 and 2006 into  
the bureau's counterterrorism electronic surveillance efforts,  
revealed for the first time in newly declassified documents.

The inquires are the first publicly known questioning of the FBI's  
post-9/11 surveillance activities by the secret court, which has  
historically approved nearly every wiretap application submitted to  
it.  The court handles surveillance requests in counterterrorism and  
foreign espionage investigations. The inquiries add to questions  
surrounding how the FBI has used the broad powers handed to it by  
Congress in the 2001 USA Patriot Act, including the FBI's admitted  
abuse of so-called National Security Letters to get stored telephone  
and financial records.

Among other things, the declassified documents reveal that lawyers in  
the FBI's Office of General Counsel and the Justice Department's  
Office of Intelligence Policy Review queried FBI technology officials  
in late July 2006 about cellphone tracking. The attorneys asked  
whether the FBI was obtaining and storing real-time cellphone-location  
data from carriers under a "pen register" court order that's normally  
limited to records of who a person called or was called by.

The internal inquiry seems to have preceded, and was likely prompted  
by, a secret court hearing on the matter days later. Kevin Bankston, a  
lawyer with Electronic Frontier Foundation, says the documents suggest  
that the nation's spy court shares the reluctance of federal criminal  
courts to turn everyday cellphones into tracking devices, in the  
absence of evidence that the target has done something wrong.

"I hope that this signals that the FISC, like many magistrate judges  
that handle law enforcement surveillance requests, is growing  
skeptical of the government's authority to conduct real-time cellphone  
tracking without probable cause," says Bankston.

In criminal cases, the government's attempts to get cellphone-tracking  
data without probable cause to believe the target has committed a  
crime were denied several times in 2005 by federal judges in New York  
and Texas.

According to the documents, which the EFF obtained in a Freedom of  
Information Act lawsuit, an FBI general counsel lawyer asked on July  
21, 2006: "Can we at the collection end tell the equipment NOT to  
receive the cell site location information?"

The lawyer added a note of concern that phone companies might be  
sending along cell-site data even when they aren't asked for it. "Do  
we get it all or can we, when required, tell the equipment to not  
collect the cell-site location data?," the lawyer asked.

Separately, the secret court questioned if the FBI was using pen  
register orders to collect digits dialed after a call is made,  
potentially including voicemail passwords and account numbers entered  
into bank-by-phone applications.

Using a pen register order, the FBI can force a phone company to turn  
over records of who a person calls, or is called by, simply by  
asserting the information would be relevant to an investigation. But  
existing case law holds that those so-called "post-cut-through dialed  
digits" count as the content of a communication, and thus to collect  
that information, the FBI would need to get a full-blown wiretapping  
warrant based on probable cause.
Dcs_3000_network580_2_2
The FBI's encrypted wiretapping backbone network, DCSNet, connects 37  
FBI field offices, according to some documents. Other documents  
suggest the network now extends to 52 field offices, including  
locations in Alaska and Puerto Rico. This enhanced image is based on  
black-and-white FBI documents.
Colored photo-illustration: Frank Rodriguez

On August 7 2006, Foreign Intelligence Surveillance Court judge  
Colleen Kollar-Kotelly took the extraordinary step of ordering the FBI  
to report (.pdf) on how its sophisticated phone wiretapping system,  
known as Digital Collection System, handled those extra digits and  
whether it stored them in a centralized data-mining depository known  
as Telephone Application.

The documents (.pdf) show that the majority of FBI offices surveyed  
internally were collecting that information without full-blown wiretap  
orders, especially in classified investigations. The documents also  
indicate that the information was being uploaded to the FBI's central  
repository for wiretap recordings and phone records, where analysts  
can data-mine the records for decades.

EFF's Bankston says it's clear that FBI offices had configured their  
digit-recording software, DCS 3000, to collect more than the law allows.

"The FBI's configuration of DCS 3000 to collect post-cut-through  
dialed digits when conducting pen-register surveillance is flatly  
illegal under statute and raises serious Fourth Amendment questions,  
based on the unanimous decisions of two district court judges and  
three federal magistrate judges holding that such interceptions  
require a wiretap order based on probable cause," Bankston said.

The documents also reveal that the inquiry on dialed-digits collection  
wasn't the first time the secret court had queried the FBI regarding  
its use and storage of information from wiretaps. In October 2005, the  
court also asked the FBI to explain how it stored "raw" foreign- 
intelligence wiretap content and information about Americans collected  
during those wiretaps.

The government is supposed to "minimize" -- that is anonymize or  
destroy -- information gathered on Americans who aren't the targets of  
a wiretap, unless that information is crucial to an investigation.

The court wanted the FBI to explain what databases stored raw wiretaps  
(.pdf), how those recordings could be accessed, and by whom, as well  
as how minimization standards were implemented.

The documents don't reveal the answer to that question. The FBI did  
not respond to a request for comment by press time.

For more on the FBI's sophisticated wiretapping technology and how it  
links in with the nation's phone and internet infrastructure, see  
Point, Click, Eavesdrop.


More information about the Infowarrior mailing list