[Infowarrior] - Secret Data in FBI Wiretapping Audit Revealed with Ctrl-C

Richard Forno rforno at infowarrior.org
Sat May 17 04:18:29 UTC 2008


Secret Data in FBI Wiretapping Audit Revealed with Ctrl-C
By Ryan Singel EmailMay 16, 2008 | 7:51:59 PMCategories: Glitches and  
Bugs, Surveillance
http://blog.wired.com/27bstroke6/2008/05/secret-data-in.html

Once again, supposedly sensitive information blacked out from a  
government report turns out to be visible by computer experts armed  
with the Ctrl-C keys -- and that information turns out to be not very  
sensitive after all.

This time around, Princeton professor Matt Blaze discovered that the  
Justice Department's Inspector General's office had failed to  
adequately obfuscate data in a March report (.pdf) about FBI payments  
to telecoms to make their legacy phone switches comply with 1995  
wiretapping rules. That report detailed how the FBI had finished  
spending its allotted $500 million to help telephone companies  
retrofit their old switches to make them compliant with the  
Communications Assistance to LAw Enforcement Act or CALEA-- even as  
federal wiretaps target cell phones more than 90 percent of the time.

< - >

Some of the tidbits considered to sensitive to be aired publicly?

The FBI paid Verizon $2500 a piece to upgrade 1,140 old telephone  
switches. Oddly the report didn't redact the total amount paid to the  
telecom -- slightly more than $2.9 million dollars -- but somehow the  
bad guys will win if they knew the number of switches and the cost paid.

FBI survey results  about wiretaps could also be found hidden under  
the redaction layer.

For the record, in 2005 and 2005, from talking to federal, state and  
local law enforcement agencies believed that the top emerging  
technologies causing surveillance concerns were VOIP, broadband and  
prepaid cell phones. While cops have long fretted about encryption and  
one might expect it to be in this list, it seems to have never been a  
problem for wiretapping.

In 2005, only 8% had tried tapping internet phone calls, but that  
number rose to 34% in 2006. In 2006, 35 percent of agencies had tried  
some sort of surveillance on broadband, but the question wasn't asked  
in 2005.

The price of wiretaps and pen traps still limits surveillance,  
according to 68% of agencies in 2005 and 65% in '06. Meanwhile,  
telecoms seem to be getting better at providing data in standard  
formats to cops, whose complaints about data format fell dramatically  
from 60% in 2005 to 12% in in 2006.

But, oddly, 41% of agencies in 2006 say investigations have been  
hampered by companies not complying with CALEA's mandates, while in  
2005, that number was only 22%,

Other nuggets? Hidden info in a blacked out screenshot of the FBI's  
wiretapping help line complaint management software reveals that even  
wiretappers have IT problems.

Cops in Montgomery County, Maryland had trouble right after Christmas  
in 2007 getting wiretap info delivered. Not far away in Baltimore (the  
honorary wiretap capital of the U.S.), cops had problems just before  
Christmas using the FBI's database of cell towers, which help cops  
figure out target's location and movements. Kenner, Louisiana cops  
just wanted a user name and password to chat in the Law Enforcement  
forum on ASKCalea.

Now that the cat is out of the bag, one is sure to see a crime wave  
across the country.

Professor Matt Blaze suggests following NSA's technical  
recommendations (.pdf) on how to redact documents. THREAT LEVEL merely  
suggests that report writers start telling the classifiers to stop  
acting like censors from WWII carrier groups.


More information about the Infowarrior mailing list