HomeLatest ThreadsGreatest ThreadsForums & GroupsMy SubscriptionsMy Posts
DU Home » Latest Threads » Forums & Groups » Main » General Discussion (Forum) » You know how the NSA actu...
Introducing Discussionist: A new forum by the creators of DU

Mon Jun 17, 2013, 05:01 PM

You know how the NSA actually gets the "content" of a phone call when under warrant?

Today our new term to learn is "Safe Harbor"

Most all companies outsource the connectivity to LEA (law enforcement agencies) to a trusted third party. Usually an MPLS VPN is established using a couple 10M or 100M circuits to the company you contract with, the trusted third party.

You can either let them directly handle the warrants and implement the tap by giving them access to your switches, OR, you have your own personnel with the proper clearance to implement the "tap" and direct the traffic over that MPLS VPN back to the trusted third party, who then send the traffic to various LEA. These companies already have the data connectivity back to places like Quantico. Google Quantico if you haven't heard that term before.

Here are two companies who do this for a living-


West Central Support
http://www.wcsupport.com/calea.php

West Central Support Offers a Complete CALEA Solutions Package
West Central support provides Procera Networks PacketLogic platform, a cost effective, complete, and scalable solution that seamlessly integrates into the service provider's existing network, without the need to upgrade any network element in the network infrastructure fabric. Procera's unique value proposition is that in addition to being able to handle the Interception and Delivery of content as sanctioned by the FCC CALEA regulations, the solution also delivers the most accurate, policy-based traffic management capabilities for Broadband Service Providers (BSPs).

In addition to providing Procera Networks' PacketLogic platform as a viable CALEA solution, West Central Support provides Trusted Third Party (TTP) CALEA services. We will analyze your network to identify the optimal location for the Packet Logic platform and assist in the set up, installation, and testing of the equipment. As the TTP, West Central Support will receive the intercept request from the ISP and appropriately configure the rules in PacketLogic to meet the specifics of the intercept request as well as facilitate information delivery to the LEA and handle the appropriate paperwork and filings.






http://www.subsentio.com/
SUBSENTIO — THE MARKET LEADER IN ELECTRONIC SURVEILLANCE SERVICES
At Subsentio, Safe Harbor is not just a provision within the Communications Assistance for Law Enforcement Act of 1994 (CALEA), it is our business philosophy. Our mission is to provide a safe environment for service providers, their subscribers and law enforcement should a need for electronic surveillance arise. This level of trust to provide a Safe Harbor in an industry that is turbulent at best can only be delivered by personnel with decades of experience — expertise that is unmatched within this small, but vitally important, niche of telecommunications. For Subsentio, providing Safe Harbor is not a job, it is our passion.

Based in Centennial, Colorado, Subsentio’s surveillance technology connects telecommunication service providers with Federal, State and Local Law Enforcement monitoring centers to comply with lawfully authorized electronic surveillance (LAES) court orders. From national carriers to ultra-small rural providers, Subsentio is responsible for millions of subscribers with a wide range of communication services. These services are often complex, multi-vendor environments encompassing differing phases of technological approaches that require our expertise to properly perform a lawful intercept.



28 replies, 2342 views

Reply to this thread

Back to top Alert abuse

Always highlight: 10 newest replies | Replies posted after I mark a forum
Replies to this discussion thread
Arrow 28 replies Author Time Post
Reply You know how the NSA actually gets the "content" of a phone call when under warrant? (Original post)
snooper2 Jun 2013 OP
HappyMe Jun 2013 #1
snooper2 Jun 2013 #2
reusrename Jun 2013 #6
Monkie Jun 2013 #8
reusrename Jun 2013 #10
snooper2 Jun 2013 #13
wandy Jun 2013 #3
Catherina Jun 2013 #4
snooper2 Jun 2013 #5
Leopolds Ghost Jun 2013 #7
Puzzledtraveller Jun 2013 #12
SidDithers Jun 2013 #9
baldguy Jun 2013 #11
1-Old-Man Jun 2013 #14
baldguy Jun 2013 #15
bobduca Jun 2013 #16
Buzz Clik Jun 2013 #17
bobduca Jun 2013 #18
Buzz Clik Jun 2013 #19
bobduca Jun 2013 #20
Buzz Clik Jun 2013 #21
bobduca Jun 2013 #22
DCBob Jul 2013 #26
bobduca Jul 2013 #28
baldguy Jun 2013 #23
KittyWampus Jul 2013 #24
snooper2 Jul 2013 #25
Laelth Jul 2013 #27

Response to snooper2 (Original post)

Mon Jun 17, 2013, 05:10 PM

1. Oh no!

Not actual information!



Thanks for posting.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to HappyMe (Reply #1)

Mon Jun 17, 2013, 05:13 PM

2. I've been trying to educate people for a week now

But there are those who think some flunky who happened to get a hold of a PDF and said "I can tap all ya' calls with the press of a button" is some kind of grand fucking wizard

Reply to this post

Back to top Alert abuse Link here Permalink


Response to snooper2 (Reply #2)

Tue Jun 18, 2013, 01:37 AM

6. I don't understand the pictures or the text.

 

If a call was made a year ago, how do you listen to it over this system?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to reusrename (Reply #6)

Tue Jun 18, 2013, 07:57 AM

8. if the law allows it these enablers will store it, i dont understand your question really?

 

this is capitalism at its finest, these companies just sit between the providers and the national security apparatus and do the providers dirty work for them.
if the providers feel uncomfortable with this, or none of their employees wish to be involved in these programs, or cant be trusted because they dont have the right clearances, then companies like this are the answer.
i wonder how much of a revolving door there is between the agencies doing the monitoring and these companies.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Monkie (Reply #8)

Tue Jun 18, 2013, 09:30 AM

10. Thanks, I understand a lot more about this now.

 

First of all, I forgot for a moment that database <> internet.

There are many aspects of this story that are still jumbled together but are slowly unraveling for me. This OP explains a method of data collection that occurs before the stuff gets stored in the yottabyte facility. Searches to the database would be a through a completely different method.

What this shows is that the telecoms have no plausible deniability regarding "direct access" if they just subcontract their cooperation out to a third party.

This fills in a lot of gaps for me. Thanks again.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Monkie (Reply #8)

Tue Jun 18, 2013, 10:00 AM

13. most companies control the taps themselves- rural mom-and-pa telecoms probably don't

So they don't "get" the data until I put it on the wire to them...

Reply to this post

Back to top Alert abuse Link here Permalink


Response to snooper2 (Original post)

Mon Jun 17, 2013, 05:24 PM

3. Thanks. A pictures worth a thousand words. nt

Reply to this post

Back to top Alert abuse Link here Permalink


Response to snooper2 (Original post)


Response to snooper2 (Original post)

Mon Jun 17, 2013, 09:26 PM

5. kick for evening session

Reply to this post

Back to top Alert abuse Link here Permalink


Response to snooper2 (Original post)

Tue Jun 18, 2013, 01:52 AM

7. So, snooper2, what I gather from your post is:

You're a techie -- whoda thunk it? But I guess your username is more significant;

You have no problem with blanket electronic surveillance under blanket warrants;

You think the NSA relies on Safe harbor provisions (which your post didn't define,
but correct me if I'm wrong) that require ISP's to cooperate with lawful eavesdropping
investigations in return for not being liable for any user content found in
the course of their investigations, be it criminal, libelious, or terrorist activity.

You disagree with Barton Gellman's continual drip drip drip of new information
from the preceding interviews with both Snowden and other intel experts who
all corroborate Snowden's information which he obtained as a low level leaker

...BECAUSE IT IS PUBLICALLY KNOWN TO EVERYONE WHO WORKS IN THE IT INDUSTRY, ESPECIALLY INTEL.

And the American people are being blamed for being kept deliberately misinformed,
knowing that the media have created a climate of ignorance, uncuriosity, conformism
(hatred of "hipsters" and "provocateurs") and anti-intellectualism that leaves even liberals
proudly proclaiming that they don't read newspapers, which if they did, they would have
read about all this sh*t years ago. But the politicians and rulers, knowing they could
rely on stupidity, deny what's in the paper unless it comes from an authoritative source.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Leopolds Ghost (Reply #7)

Tue Jun 18, 2013, 09:49 AM

12. Funny how this point is lost on so many

that reveals a deep ideaological divide.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to snooper2 (Original post)

Tue Jun 18, 2013, 08:05 AM

9. DU rec...

Thanks for posting.

Sid

Reply to this post

Back to top Alert abuse Link here Permalink


Response to snooper2 (Original post)

Tue Jun 18, 2013, 09:39 AM

11. So, Snowden is either lying, or just doesn't know what he's talking about.

Maybe a little of both?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to baldguy (Reply #11)

Tue Jun 18, 2013, 10:02 AM

14. or more likely neither

because the means by which the information was intercepted really doesn't matter a bit to the analyst who only cares about its source, intended audience, and information contained therein. He might or might not know how it was obtained and of course anyone can speculate on how. Maybe he was aware of how it was obtained or maybe not and he misspoke, but its really immaterial.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to 1-Old-Man (Reply #14)

Tue Jun 18, 2013, 10:48 AM

15. So, when Snowden said he could tap the President's phone,

Even though the program he was working on could not do that, and Obama said specifically that "Nobody Is Listening to Your Phone Calls", who do you believe? The guy sitting in China who has lied about pretty much everything, or the President?

Snowden is an attention-seeking self-aggrandizing douchebag, being promoted by Glenn Greenwald, another attention-seeking self-aggrandizing douchebag, and supported by a whole host of other attention-seeking self-aggrandizing douchebags: the "Drs" Paul, Glenn Bekk, Alex Jones, etc, etc. None of them support the De3mocratic Party or the President. The only "revaluations" they've presented are either flat-out lies or about programs which have long been known and/or suspected, and which have been through the legislative & judicial process.

If you want a debate about whether we need FISA, PRISM and other types of limited domestic surveillance the govt is involved in, fine. Or about further protections of civil liberties, fine. Or to totally throw out the Patriot Act, the FISA courts, and make gathering even metadata without a specific warrant, fine. But Ed Snowden should not be the standard-bearer of that discussion.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to baldguy (Reply #15)

Tue Jun 18, 2013, 10:59 AM

16. snowden basher bingo!

scorecard:
B is 1-15
I is 16-30
N is 31-45
G is 46-60
O is 61-75

"douchebag" "douchebag" "douchebag" G-49

"oh and Alex Jones! Glenn Bekkk" B-15

"long known programs" I-23

"been through the legislative and judicial process" N-53

attempt to limit discussion, and bring it back to Snowden as some imagined anti-obama vanguard. O-62

BINGO!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to bobduca (Reply #16)

Tue Jun 18, 2013, 11:41 AM

17. What exactly is the agenda with all of this?

Rhetorical question.

Stalking is problematic, and tag-teaming with like-minded posters is a similar error.

I don't care about agendas, but I strongly recommend reassessing posting patterns. Unless starting over is not a problem.

This is not an opening to a conversation. Respond if you are so inclined, but I will not be revisiting this thread.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Buzz Clik (Reply #17)

Tue Jun 18, 2013, 11:42 AM

18. because you called out my low post count, buzzy

and I enjoy pointing out your steaming piles of hypocrisy.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to bobduca (Reply #18)

Tue Jun 18, 2013, 11:48 AM

19. Just keep something in mind:

I didn't alert the post of yours that was hidden. Someone else is onto you.

As I have said, I don't care what you do here; but, when you get in my face... well, your choice.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Buzz Clik (Reply #19)

Tue Jun 18, 2013, 11:56 AM

20. I see, so you have influence here that far outstrips the quality of your contributions


Reply to this post

Back to top Alert abuse Link here Permalink


Response to bobduca (Reply #20)

Tue Jun 18, 2013, 12:04 PM

21. Wow. You really missed the point.

You threw down the gauntlet, not me, and you already know that I don't back away. But that's just an aside -- your behavior here is way out on the edge. Others have noticed. If you don't give a shit, then carry on. Surely you have other incarnations.

I'm done here. No doubt, I'll see you around; next time, make it more interesting.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Buzz Clik (Reply #21)

Tue Jun 18, 2013, 12:05 PM

22. So I'm gone now?

you are sure of this? Can't I appeal to the secret council of pragmatic centrists?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to bobduca (Reply #22)

Wed Jul 10, 2013, 12:25 PM

26. Gawd, I hope so.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to DCBob (Reply #26)

Wed Jul 10, 2013, 11:53 PM

28. still here bippy

I too was hoping you had stormed off in a puff of greasy smoke already! re-plonk

Reply to this post

Back to top Alert abuse Link here Permalink


Response to bobduca (Reply #16)

Tue Jun 18, 2013, 02:01 PM

23. Show me where I'm wrong.

Otherwise we can assume that you have nothing significant to say.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to snooper2 (Original post)

Wed Jul 10, 2013, 11:45 AM

24. This is important if you want to understand what is going on

Reply to this post

Back to top Alert abuse Link here Permalink


Response to KittyWampus (Reply #24)

Wed Jul 10, 2013, 12:05 PM

25. I don't think some people really "want" to know

They have their pet issue of the month and will LA LA LA LA I CAN'T HEAR YOU so they can hold it tightly

Reply to this post

Back to top Alert abuse Link here Permalink


Response to snooper2 (Original post)

Reply to this thread