Digital Collection System Network

From Infogalactic: the planetary knowledge core
(Redirected from DCSNet)
Jump to: navigation, search
Official logo of DCS3000 system.

The Digital Collection System Network (DCSNet) is the Federal Bureau of Investigation (FBI)'s point-and-click surveillance system that can perform instant wiretaps on almost any telecommunications device in the US.[1]

It allows access to cellphone, landline, SMS communications anywhere in the US from a point-and-click interface. It runs on a fiber-optic backbone separate from the internet.[2] It is intended to increase agent productivity through workflow modeling allowing for the routing of intercepts for translation or analysis with only a few clicks. DCSNet real-time intelligence data intercept has the capability to record, review and playback intercepted material in real-time.[1]

The DCSNET systems operates on a virtual private network parallel to the public internet, with services provided at least for some time by the Sprint peerless IP network.[3]

Much of the information available on this system has come from the results of Freedom of Information Act (FOIA) requests made by the Electronic Frontier Foundation (EFF).[4]

Components

It is composed of at least three classified software components that run on the Windows operating system—DCS3000, DCS5000, DCS6000.

DCS-1000

<templatestyles src="Module:Hatnote/styles.css"></templatestyles>

DCS-3000

DCS-3000 and "Red Hook" were first mentioned publicly in a March 2006 report from the United States Department of Justice Office of the Inspector General on the implementation of the Communications Assistance for Law Enforcement Act (CALEA).[5] The report described Red Hook as "a system to collect voice and data calls and then process and display the intercepted information in the absence of a CALEA solution."[5] and it described DCS-3000 "as an interim solution to intercept personal communications services delivered via emerging digital technologies used by wireless carriers in advance of any CALEA solutions being deployed."[5]

Citing the OIG report, the Electronic Frontier Foundation (EFF) filed an FOIA request later that year in order to obtain more information about the two programs. When the FBI did not respond with more information, the EFF sued, and in May 2007 obtained a court order to release documents concerning the programs.[6][7]

On August 29, 2007, Wired magazine published an article on these systems, citing the EFF documents.[1] The DCS-3000 collects information associated with dialed and incoming numbers like traditional trap-and-trace and pen registers. The article named "Red Hook" as the client for DCS-3000.[1]

DCS-5000

The DCS-5000 is a system used by the FBI unit responsible for counter-intelligence to target suspected spies, alleged terrorists, and others with wiretaps.

DCS-6000

The DCS-6000 captures the content of phone calls and text messages for analysis.

See also

References

  1. 1.0 1.1 1.2 1.3 Lua error in package.lua at line 80: module 'strict' not found.
  2. Army Guard and FBI sign up for Peerless IP net
  3. Lua error in package.lua at line 80: module 'strict' not found.
  4. Lua error in package.lua at line 80: module 'strict' not found.
  5. 5.0 5.1 5.2 The Implementation of the Communications Assistance for Law Enforcement Act, Audit Report 06-13 (redacted FBI files)
  6. Lua error in package.lua at line 80: module 'strict' not found.
  7. DCS-3000 and Red Hook


<templatestyles src="Asbox/styles.css"></templatestyles>