Connect with us
FBIs internal instructions for obtaining data from telecom operators published FBIs internal instructions for obtaining data from telecom operators published

Security

FBI’s internal instructions for obtaining data from telecom operators published

Published

on

The 139-page presentation, dated 2019, was created by the FBI Cellular Analytics Team.

Motherboard journalists managed to get acquainted with documents The FBI, which describes in unusual detail how bureaus and other law enforcement agencies obtain information from telecommunications companies about the location of mobile devices.

Most of the information presented in the documents is already known to the general public, for example, about how law enforcement agencies can obtain data from telecom operators’ subscribers using special court orders. However, the docs also shed light on exactly what information each operator collects and how long certain types of data are retained. Moreover, they provide screenshots of the tools the FBI provides to law enforcement agencies throughout the United States for analyzing data from cellular base stations.

The documents were provided to the publication by Ryan Shapiro, executive director of the non-profit organization Property of the People, who received them upon request for information from open sources. The 139-page presentation, dated 2019, was created by the FBI’s Cellular Analysis Survey Team (CAST).

According to the presentation, CAST is helping the FBI, as well as federal and local law enforcement and judicial authorities, in forensic data on phone calls from base stations. In particular, the team is engaged in obtaining data from telecommunications companies, analyzing data from base stations showing which phones were in a specified location at a specified time, examining testimony of witnesses and verifying the actual coverage of base stations.

“When necessary, CAST uses industry standard equipment to determine the true geographic coverage of the cellular sector,” the presentation said.

CAST provides law enforcement with its own phone data visualization software tool called CASTViz for free.

“CASTViz can quickly and accurately record call data and base station data for lead generation and investigations,” the presentation said.

The presentation even contains screenshots of instructions for using CASTViz.

The document explains how requests for disposable phone location data from virtual carriers (carriers using the existing infrastructure of another carrier, but selling services under their own brand) are made. It also describes how to get information from the General Motors OnStar vehicle system, and presents the cost of some of the data.

In terms of the period during which telecom operators store phone call data, AT&T is 7 years, T-Mobile is 2 years, and Verizon is 1 year. AT&T stores web browsing data for 1 year.

Click to comment

Leave a Reply

Your email address will not be published.

Components

4 TB of security from Samsung. External SSD T7 Shield is now available in a new version for 420 euros

Published

on

4 TB of security from Samsung External SSD T7 Shield

Samsung has decided to release a new version of its secure external SSD T7 Shield.

4 TB of security from Samsung.  External SSD T7 Shield is now available in a new version for 420 euros

The device was introduced almost a year ago in 1 and 2 TB versions. Now, a 4 TB modification is entering the market.

In Europe, they ask for 420 euros for such an SSD. For comparison, the prices for the younger versions are 135 and 220 euros.

Recall, T7 Shield offers a good level of protection. There is also protection against water and moisture (IP65), and protection against falls from a height of up to 3 meters. Actually, since this is a solid state drive, it is likely that it will survive a much more serious fall.

The device is equipped with a USB-C 3.2 Gen 2 interface and offers read and write speeds of 1050 and 1000 MB/s, respectively. The device weighs only about 100 g.

Continue Reading

Security

ChatGPT can be used to write viruses and ransomware – this was confirmed by information security specialists

Published

on

ChatGPT can be used to write viruses and ransomware

Network resources reported that examples appeared on the network of how the popular chat bot ChatGPT writes code for viruses. Network security company Check Point Research discovered this and said that the use of AI increases the danger from hackers. On the thematic forums, the first information about the successful writing of viruses using ChatGPT has already appeared.

ChatGPT can be used to write viruses and ransomware - this was confirmed by information security specialists

One example was a program that, after refinement, can be turned into “extortionist”. It can encrypt data on the user’s PC and will require payment for decryption. In a more advanced version of the program, penetration into the target server is provided, from where hackers already gain access to all the data of the victim

In addition, the neural network can write phishing emails – this has already been checked by Check Point Research specialists themselves. The letter also contained an Excel file with an embedded macro that was launched when the file was opened.

However, this is not all. Experts were able to get AI to create scripts for scanning network ports and other tools.

At the same time, Check Point Research believes that it is too early to say that ChatGPT has become a new tool for hackers, but the attacker community has already become interested in it. Note that earlier the system was already able to pretend to be a Linux machine, as well as write a number of programs and websites.

Continue Reading

Security

“Germany has not taken seriously the security threat posed by China.” The country has increased dependence on Huawei

Published

on

Germany has not taken seriously the security threat posed by

Despite the huge number of sanctions imposed by the US and other countries against Huawei, Germany has only increased its dependence on this Chinese company.

Germany has not taken seriously the security threat posed by

According to a recent Strand Consult report cited by Reuters, Germany has become even more dependent on Huawei to build 5G infrastructure than it was when building 4G networks. More specifically, Huawei accounts for 59% of all 5G network equipment in Germany. We are talking about base stations and related equipment. For comparison, in the case of 4G networks, Huawei’s share in Germany is 57%. What’s interesting is the fact that Huawei’s share in this area is higher in Berlin than in Beijing, where the company faces serious competition from ZTE.

According to the report, there are signs that Germany has not taken seriously the security threat posed by China. At the same time, Huawei equipment is simply cheaper than analogues of European players in this market, which is why a number of countries, including Germany, continue to purchase Huawei products.

Continue Reading

Most Popular