[Infowarrior] - Widespread cell phone location snooping by NSA?
Richard Forno
rforno at infowarrior.org
Wed Sep 10 12:48:17 UTC 2008
Exclusive: Widespread cell phone location snooping by NSA?
Posted by Chris Soghoian 5 comments
http://news.cnet.com/8301-13739_3-10030134-46.html
If you thought that the National Security Agency's warrantless
wiretapping was limited to AT&T, Verizon and Sprint, think again.
While these household names of the telecom industry almost certainly
helped the government to illegally snoop on their customers,
statements by a number of legal experts suggest that collaboration
with the NSA may run far deeper into the wireless phone industry. With
over 3,000 wireless companies operating in the United States, the
majority of industry-aided snooping likely occurs under the radar,
with the dirty-work being handled by companies that most consumers
have never heard of.
A recent article in the London Review of Books revealed that a number
of private companies now sell off-the-shelf data-mining solutions to
government spies interested in analyzing mobile-phone calling records
and real-time location information. These companies include
ThorpeGlen, VASTech, Kommlabs, and Aqsacom--all of which sell "passive
probing" data-mining services to governments around the world.
ThorpeGlen, a U.K.-based firm, offers intelligence analysts a
graphical interface to the company's mobile-phone location and call-
record data-mining software. Want to determine a suspect's "community
of interest"? Easy. Want to learn if a single person is swapping SIM
cards or throwing away phones (yet still hanging out in the same
physical location)? No problem.
In a Web demo (PDF) (mirrored here) to potential customers back in
May, ThorpeGlen's vice president of global sales showed off the
company's tools by mining a dataset of a single week's worth of call
data from 50 million users in Indonesia, which it has crunched in
order to try and discover small anti-social groups that only call each
other.
Clearly, this is creepy, yet highly lucrative, stuff. The fact that
human-rights abusing governments in the Middle East and Asia have
deployed these technologies is not particularly surprising. However,
what about our own human-rights-abusing government here in the U.S.?
Could it be using the same data-mining tools?
To get a few answers, I turned to Albert Gidari, a lawyer and partner
at Perkins Coie in Seattle who frequently represents the wireless
industry in issues related to location information and data privacy.
When asked if there is a market for these kinds of surveillance data-
mining tools in the U.S., Gidari told me: "Of course. It is a global
market and these companies have partners in the U.S. or competitors."
The question is not if the government would like to use these tools--
after all, what spy wouldn't want to have point-and-click real-time
access to the location information on millions of Americans? The real
mystery is how the heck the National Security Agency can legally get
access to such large datasets of real-time location information and
calling records. The answer to that, Gidari said, is the thousands of
other, lesser-known companies in the wireless phone and communications
industry.
The massive collection of customer data comes down to the interplay of
two specific issues: First, thousands of companies play small, niche
support roles in the wireless phone industry, and as such these firms
learn quite a bit about the calling habits of millions of U.S.
citizens. Second, the laws relating to information sharing and
wiretapping specifically regulate companies that provide services to
the general public (such as AT&T and Verizon), but they do not cover
the firms that provide services to the major carriers or connect
communications companies to one other.
Thus, while it may be impossible for the NSA to legally obtain large-
scale, real-time customer location information from Verizon, the
spooks at Fort Meade can simply go to the company that owns and
operates the wireless towers that Verizon uses for its network and get
accurate information on anyone using those towers--or go to other
entities connecting the wireless network to the landline network. The
wiretapping laws, at least in this situation, simply don't apply.
Giardi explained it as follows:
Networks are more and more disaggregated and outsourced, from
customer service call centers overseas with full viewing access to
data to key infrastructure components and processing. A single
communication is handled by many more parties than the named provider
today. Moreover, interoperability protocols include network
identifiers--send a message from company A to company B and the
acknowledgment of delivery may include location and other information.
That's just the way the system is designed--location was about billing
in the early years and no one bothered to undo the existing protocols
when business models changed and interoperability became common
practice or a myriad of new messaging companies came into being...So
my point is that there are many access points--albeit less convenient
than one-stop shopping at the big carriers--to get information
including real-time data.
ThorpeGlen's product appears to be a mashup of Google Earth + phone
location data (in this case, from 50 million people in Indonesia)
(Credit: ThorpeGlen)
For example, if a Sprint Wireless customer in Virginia calls a
relative in Montana--who is a customer of a small, regional landline
carrier--information on the callers will spread far beyond just those
two communications companies.
Sprint doesn't own any of its own cellular towers, and so TowerCo, the
company that owns and operates the towers, of course, learns some
information on every mobile phone that communicates with one of its
towers. This is just the tip of the iceberg, though. There are
companies that provide "backhaul" connections between towers and the
carriers, providers of sophisticated billing services, outsourced
customer-service centers, as well as Interexchange Carriers, which
help to route calls from one phone company to another. All of these
companies play a role in the wireless industry, have access to
significant amounts of sensitive customer information, which of
course, can be obtained (politely, or with a court order) by the
government.
With the passage of laws like the FISA Amendments Act and the USA
Patriot Act, in most cases, requests for customer information come
with a gag order, forbidding the companies from notifying the public,
or the end users whose calling information is being snooped upon.
Gidari summed it up this way:
So any entity--from tower provider, to a third-party spam filter,
to WAP gateway operator to billing to call center customer service--
can get legal process and be compelled to assist in silence. They
likely don't volunteer because of reputation and contractual
obligations, but they won't resist either.
Seeking clarification, I turned to Paul Ohm, a former federal
prosecutor turned cyberlaw professor at the University of Colorado Law
School and a noted expert on surveillance laws.
Before getting into the details of the issue, Ohm first outlined the
basic problem of the various wiretap and surveillance laws; they are
extremely confusing and few people fully understand them. The 9th
Circuit Court of Appeals seemed to share Ohm's view, stating a few
years ago that the Electronic Communications Privacy Act is a
"complex, often convoluted area of the law" (United States v. Smith,
155 F.3d 1051).
Ohm then said that the "one thing I can say with confidence is that
you are correct to note that the [Stored Communication Act's]
voluntary disclosure prohibitions (in 18 USC 2702(a)) apply only to
providers to the public."
After describing all the ways that the government could legally
collect real-time data on millions of U.S. citizens, Gidari said that
essentially, the existence of such a program would likely remain a
secret (barring a whistle-blower or leaks to the press by government
officials). Summing it up, he stated that:
Whether [a] vendor to a carrier to the public cooperates with
agencies (either for a fee or by acquiescence in an order), is
something you will not find out as FISA makes it so, regardless of
whether the person is in the U.S. or communicating with a person
abroad. Such means and methods largely are hidden.
However, if the existence of such a program were ever confirmed, Ohm
said that Congress would not be too happy:
If [the sharing of data by niche telecom providers] is seen as
allowing an end-around an otherwise clear prohibition in the SCA,
Congress is likely to throw a fit when it is revealed and try to amend
the law. DOJ is sensitive to this kind of thing (despite what the NSA
wiretapping program would lead you to believe) and would probably try
to avoid blatantly bypassing otherwise clear language in this way.
More information about the Infowarrior
mailing list