C14. Red Hook (FBI)



_______________________________
Red Hook (FBI) (system to collect voice and data calls)
_______________________________
Red Hook (FBI)
FBI
Red Hook (FBI)
http://en.wikipedia.org/wiki/Red_Hook_(FBI)
Red Hook in a Department of Justice (DoJ) Audit Report from March 2006 is described as “a system to collect voice and data calls and then process and display the intercepted information in the absence of a CALEA solution.”[1]
The Electronic Frontier Foundation (EFF) has obtained documents regarding Red Hook and DCS-3000 through their FOIA Litigation on documents relating to electronic surveillance systems.[2]
Wired magazine published an article on these systems, citing the EFF documents, on August 29, 2007
_______________________________
DCSNet
Dcs3000_logo
DCSNet
http://en.wikipedia.org/wiki/Digital_Collection_System_Network
DCSNet, an abbreviation for Digital Collection System Network, is the Federal Bureau of Investigation (FBI)’s point-and-click surveillance system that can perform instant wiretaps on almost any telecommunications device in the US.[1]
It allows access to cellphone, landline, SMS communications anywhere in the US from a point-and-click interface. It runs on a fiber-optic backbone separate from the internet.[2] It is intended to increase agent productivity through workflow modeling allowing for the routing of intercepts for translation or analysis with only a few clicks.
It is composed of at least three classified software components that run on the Windows operating system — DCS3000, DCS5000, DCS6000. The DCS3000 collects information associated with dialed and incoming numbers like traditional trap-and-trace and pen registers. The DCS5000 is a system used by the FBI unit responsible for counter-intelligence to target suspected spies, alleged terrorists, and others with wiretaps. The DCS6000 captures the content of phone calls and text messages for analysis.
DCSNet real-time intelligence data intercept has the capability to record, review and playback intercepted material in real-time.[3]
Much of the information available on this system has come from the results of Freedom of Information Act (FOIA) requests made by the Electronic Frontier Foundation (EFF).[4]
DCSNet is related to the Red Hook system that the FBI also uses rather than requesting the information from companies via the Communications Assistance for Law Enforcement Act
*** See Also ***

_______________________________
Carnivore (software)
640px-IAO-logo (1)
Carnivore (software)
http://en.wikipedia.org/wiki/Carnivore_(FBI)
Carnivore, later renamed DCS1000, was a system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. It used a customizable packet sniffer that can monitor all of a target user’s Internet traffic. Carnivore was implemented in October 1997. By 2005 it had been replaced with improved commercial software such as NarusInsight.[1]
Carnivore grew out of an earlier FBI project called “Omnivore”, which itself replaced an older surveillance tool migrated from the US Navy by FBI Director of Integrity and Compliance,[2] Patrick W. Kelley, which had a still undisclosed name. In September 1998, the FBI’s Data Intercept Technology Unit (DITU) in Quantico, Virginia, launched a project to migrate Omnivore from Sun’s Solaris operating system to a Windows NT platform. This was done to facilitate the miniaturization of the system and support a wider range of personal computer (PC) equipment. The migration project was called “Phiple Troenix” and the resulting system was named “Carnivore.”[3]
The Carnivore system was a Microsoft Windows-based workstation with packet-sniffing software and a removable Jaz disk drive.[4] This computer must be physically installed at an Internet service provider (ISP) or other location where it can “sniff” traffic on a LAN segment to look for email messages in transit. The technology itself was not highly advanced — it used a standard packet sniffer and straightforward filtering. The critical components of the operation were the filtering criteria. To accurately match the appropriate subject, an elaborate content model was developed.[5] An independent technical review of Carnivore for the Justice Department was prepared in 2000

Advertisements
This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s