why that was nice

Should i start using crystal meth?

  • Sure...its not that bad...

    Votes: 93 62.0%
  • Just say no!

    Votes: 57 38.0%

  • Total voters
    150
anyone remember when New Zealand banned Postal 2 from being sold because it was too violent of a video game? of course, that was a year after the actual release date of the game //content.invisioncic.com/y282845/emoticons/rolleyes.gif.c1fef805e9d1464d377451cd5bc18bfb.gif

 
The FBI has quietly built a sophisticated, point-and-click surveillance system that performs instant wiretaps on almost any communications device, according to nearly a thousand pages of restricted documents newly released under the Freedom of Information Act.

The surveillance system, called DCSNet, for Digital Collection System Network, connects FBI wiretapping rooms to switches controlled by traditional land-line operators, internet-telephony providers and cellular companies. It is far more intricately woven into the nation's telecom infrastructure than observers suspected.

It's a "comprehensive wiretap system that intercepts wire-line phones, cellular phones, SMS and push-to-talk systems," says Steven Bellovin, a Columbia University computer science professor and longtime surveillance expert.

DCSNet is a suite of software that collects, sifts and stores phone numbers, phone calls and text messages. The system directly connects FBI wiretapping outposts around the country to a far-reaching private communications network.

Many of the details of the system and its full capabilities were redacted from the documents acquired by the Electronic Frontier Foundation, but they show that DCSNet includes at least three collection components, each running on Windows-based computers.

The $10 million DCS-3000 client, also known as Red Hook, handles pen-registers and trap-and-traces, a type of surveillance that collects signaling information -- primarily the numbers dialed from a telephone -- but no communications content. (Pen registers record outgoing calls; trap-and-traces record incoming calls.)

DCS-6000, known as Digital Storm, captures and collects the content of phone calls and text messages for full wiretap orders.

A third, classified system, called DCS-5000, is used for wiretaps targeting spies or terrorists.

What DCSNet Can Do

Together, the surveillance systems let FBI agents play back recordings even as they are being captured (like TiVo), create master wiretap files, send digital recordings to translators, track the rough location of targets in real time using cell-tower information, and even stream intercepts outward to mobile surveillance vans.

FBI wiretapping rooms in field offices and undercover locations around the country are connected through a private, encrypted backbone that is separated from the internet. Sprint runs it on the government's behalf.

The network allows an FBI agent in New York, for example, to remotely set up a wiretap on a cell phone based in Sacramento, California, and immediately learn the phone's location, then begin receiving conversations, text messages and voicemail pass codes in New York. With a few keystrokes, the agent can route the recordings to language specialists for translation.

The numbers dialed are automatically sent to FBI analysts trained to interpret phone-call patterns, and are transferred nightly, by external storage devices, to the bureau's Telephone Application Database, where they're subjected to a type of data mining called link analysis.

FBI endpoints on DCSNet have swelled over the years, from 20 "central monitoring plants" at the program's inception, to 57 in 2005, according to undated pages in the released documents. By 2002, those endpoints connected to more than 350 switches.

Today, most carriers maintain their own central hub, called a "mediation switch," that's networked to all the individual switches owned by that carrier, according to the FBI. The FBI's DCS software links to those mediation switches over the internet, likely using an encrypted VPN. Some carriers run the mediation switch themselves, while others pay companies like VeriSign to handle the whole wiretapping process for them.

The numerical scope of DCSNet surveillance is still guarded. But we do know that as telecoms have become more wiretap-friendly, the number of criminal wiretaps alone has climbed from 1,150 in 1996 to 1,839 in 2006. That's a 60 percent jump. And in 2005, 92 percent of those criminal wiretaps targeted cell phones, according to a report published last year.

These figures include both state and federal wiretaps, and do not include antiterrorism wiretaps, which dramatically expanded after 9/11. They also don't count the DCS-3000's collection of incoming and outgoing phone numbers dialed. Far more common than full-blown wiretaps, this level of surveillance requires only that investigators certify that the phone numbers are relevant to an investigation.

The Justice Department reports the number of pen registers to Congress annually, but those numbers aren't public. According to the last figures leaked to the Electronic Privacy Information Center, judges signed 4,886 pen register orders in 1998, along with 4,621 time extensions.
Rest of article found here:

http://www.wired.com/politics/security/news/2007/08/wiretap

 
Its seriously gotten out of hand.

You'd really have to go out of your way to not get 'tapped'. Hell if you have a car that has GPS navigation built in, that (obviously) can track you around, not only that but can shut your car off at will as well.

Your cell phone, even if it doesnt have GPS can be pinged to determine your location. Hell even your phones mic can be turned on at random, ect. Personally im not worried about anything, it can just be nervewrecking knowing shit like this is taking place, and for what reason?

Google tracks everything that has ever been typed into its search engine, since day 1 it has and same goes for most search engines. Gmail keeps all email you've ever sent or received, ect. Printers, printers print a code thats about invisible to the ***** eye on every page they print. That way if some moron trys to counterfeit $$, or print threats, ransom, ect. notes those too can be tracked to a specific printer and by crossing that code over to its OEM they can tell which store it wad purchased from, and if you bought it via credit card, they'll be knocking on your door not too long from that point //content.invisioncic.com/y282845/emoticons/laugh.gif.48439b2acf2cfca21620f01e7f77d1e4.gif

Then theres credit cards...

 
jihad.png


//content.invisioncic.com/y282845/emoticons/sneaky.gif.7189749b3a3f769e8815b47e8ae87f88.gif

 
Activity
No one is currently typing a reply...

About this thread

faulkton

5,000+ posts
CarAudio.com Veteran
Thread starter
faulkton
Joined
Location
neverland
Start date
Participants
Who Replied
Replies
31,921
Views
597,624
Last reply date
Last reply from
natisfynest
1778578257023.png

Glen Rodgers

    May 12, 2026
  • 0
  • 0
Screenshot_20260511_212804_Amazon Shopping.jpg

Blackout67

    May 11, 2026
  • 0
  • 0

New threads

Top