Table of Contents Main
C. Table of Contents (Psychological Operations/ Surveillance/ Warfare)
Red Hook (FBI) (system to collect voice and data calls)
Red Hook (FBI)
Red Hook (FBI)
Red Hook in a Department of Justice (DoJ) Audit Report from March 2006 is described as “a system to collect voice and data calls and then process and display the intercepted information in the absence of a CALEA solution.”
The Electronic Frontier Foundation (EFF) has obtained documents regarding Red Hook and DCS-3000 through their FOIA Litigation on documents relating to electronic surveillance systems.
Wired magazine published an article on these systems, citing the EFF documents, on August 29, 2007
DCSNet, an abbreviation for Digital Collection System Network, is the Federal Bureau of Investigation (FBI)’s point-and-click surveillance system that can perform instant wiretaps on almost any telecommunications device in the US.
It allows access to cellphone, landline, SMS communications anywhere in the US from a point-and-click interface. It runs on a fiber-optic backbone separate from the internet. It is intended to increase agent productivity through workflow modeling allowing for the routing of intercepts for translation or analysis with only a few clicks.
It is composed of at least three classified software components that run on the Windows operating system — DCS3000, DCS5000, DCS6000. The DCS3000 collects information associated with dialed and incoming numbers like traditional trap-and-trace and pen registers. The DCS5000 is a system used by the FBI unit responsible for counter-intelligence to target suspected spies, alleged terrorists, and others with wiretaps. The DCS6000 captures the content of phone calls and text messages for analysis.
DCSNet real-time intelligence data intercept has the capability to record, review and playback intercepted material in real-time.
Much of the information available on this system has come from the results of Freedom of Information Act (FOIA) requests made by the Electronic Frontier Foundation (EFF).
DCSNet is related to the Red Hook system that the FBI also uses rather than requesting the information from companies via the Communications Assistance for Law Enforcement Act
*** See Also ***
- Carnivore (FBI)
- Investigative Data Warehouse
- Mass surveillance
- Signals intelligence (SIGINT)
Carnivore, later renamed DCS1000, was a system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. It used a customizable packet sniffer that can monitor all of a target user’s Internet traffic. Carnivore was implemented in October 1997. By 2005 it had been replaced with improved commercial software such as NarusInsight.
Carnivore grew out of an earlier FBI project called “Omnivore”, which itself replaced an older surveillance tool migrated from the US Navy by FBI Director of Integrity and Compliance, Patrick W. Kelley, which had a still undisclosed name. In September 1998, the FBI’s Data Intercept Technology Unit (DITU) in Quantico, Virginia, launched a project to migrate Omnivore from Sun’s Solaris operating system to a Windows NT platform. This was done to facilitate the miniaturization of the system and support a wider range of personal computer (PC) equipment. The migration project was called “Phiple Troenix” and the resulting system was named “Carnivore.”
The Carnivore system was a Microsoft Windows-based workstation with packet-sniffing software and a removable Jaz disk drive. This computer must be physically installed at an Internet service provider (ISP) or other location where it can “sniff” traffic on a LAN segment to look for email messages in transit. The technology itself was not highly advanced — it used a standard packet sniffer and straightforward filtering. The critical components of the operation were the filtering criteria. To accurately match the appropriate subject, an elaborate content model was developed. An independent technical review of Carnivore for the Justice Department was prepared in 2000
- Communications Assistance For Law Enforcement Act
- Total Information Awareness
- Echelon NSA worldwide digital interception program
- Room 641A NSA interception program (started circa 2003, but first reported in 2006)