Jump to content

Dirtbox (cell phone)

From Wikipedia, the free encyclopedia
(Redirected from Dirt box (cell phone))

A dirtbox (or DRT box) is a cell site simulator, a phone device mimicking a cell phone tower, that creates a signal strong enough to cause nearby dormant mobile phones to switch to it. Mounted on aircraft, it has been used by the United States Marshals Service since at least 2007 to locate and collect information from cell phones believed to be connected with criminal activity. It can also be used to jam phones. The device's name comes from the company that developed it, Digital Receiver Technology, Inc. (DRT), owned by the Boeing Company. Boeing describes the device as a hybrid of "jamming, managed access and detection".[1]: 1  A similar device with a smaller range, the controversial StingRay phone tracker, has been widely used by U.S. federal entities, including the Federal Bureau of Investigation (FBI).

History

[edit]

It is not known when Digital Receiver Technology, Inc. (DRT) first manufactured the dirtbox. As of 2014, the company did not publicly advertise it, stating on its web site: "Due to the sensitive nature of our work, we are unable to publicly advertise many of our products."[2] The Wall Street Journal wrote that the U.S. Marshals Service program utilizing the device had "fully matured by 2007".[3] Boeing bought DRT in 2008.[4]

Similar devices from the Harris Corporation, like the Stingray phone tracker, have been sold around the same time. Since 2008, their airborne mounting kit for cell phone surveillance has been said to cost $9,000.[5]

On June 11, 2010, the Boeing Company asked the National Telecommunications and Information Administration to advise the United States Congress that the "... Communications Act of 1934 be modified to allow prison officials and state and local law enforcement to use appropriate cell phone management",[1] and suggested that special weapons and tactics (SWAT) teams and other paramilitary tactical units could use their devices to control wireless communications during raids.[1]: 5 

Technology

[edit]

The device is described as 2-square-foot (0.19 m2) in size.[3] To mimic a cell phone tower,[4] it utilizes IMSI-catcher (International Mobile Subscriber Identity) technology, which phone services use to identify individual subscribers.[3] It emits a pilot signal made to appear stronger than that from the nearest cell tower, causing phones within its range to broadcast their IMSI numbers and electronic serial numbers (ESN). Encryption does not prevent this process;[3] the devices can retrieve a phone's encryption session keys in less than one second, with success rates of 50–75% under "real world conditions".[4]

An aircraft-mounted device can locate a phone within 10 feet,[3] Another source claims that by triangulating flights, a dirtbox can pinpoint a phone's location in as few as two feet.[6]

The dirtbox is a hybrid of detection, managed access and jamming technologies. According to The Wall Street Journal, "people with knowledge of the program" can determine which phones belong to suspects and which to non-suspects,[3] and that "cell phones not of interest, such as those belonging to prison personnel or commercial users in the area, are returned to their local network."[1]: 4  It can also selectively interrupt or prevent calls on certain phones, and has been used to block unauthorized phone use by prison inmates.[1]: 4  It can also retrieve data from phones. According to Boeing,[1]: 4  its technology is "unobtrusive to legitimate wireless communications", and bypasses phone companies in its operations.

Agency use

[edit]

Law enforcement

[edit]

As of November 2014, the U.S. Marshals Service Technical Operations Group has used the device, fixed on crewed airplanes, to track fugitives, and has said it can deploy it on "targets requested by other parts of the Justice Program".[3] The devices are operated out of at least five U.S. airports, "covering most of the U.S. population". It is unclear whether the U.S. Marshals Service requests court orders to use the devices.[3]

The Marshals Service has used dirtboxes in the Mexican Drug War, tracking fugitives in coordination with Mexico's Naval Infantry Force and flights in Guatemala.[7]

Dirtboxes are used by the United States Special Operations Command, the Drug Enforcement Administration, the FBI and U.S. Customs and Border Protection. According to procurement documents, the U.S. Navy bought dirtboxes to mount on drones at Naval Air Weapons Station China Lake, its research and development facility in Southern California. The Pentagon Washington Headquarters Services bought dirtboxes in 2011.[4]

The Chicago Police Department bought dirtboxes to eavesdrop on demonstrators during the 2012 NATO summit, and used them during the 2014 Black Lives Matter demonstrations. In 2015, it became known that the Los Angeles Police Department had purchased the devices.[4]

Signal intelligence

[edit]

Based on references to "DRTBox" in NSA's Boundless informant screenshots[8] leaked by Edward Snowden, dirtboxes are probably used by the NSA.[9] In 2013, the French newspaper LeMonde wrote, "Thanks to DRTBOX, 62.5 million phone data were collected in France".[10] The United States Naval Special Warfare Development Group's Group One bought a Digital Receiver Technology 1301B System on April 2, 2007 for over $25,000, according to the United States government procurement web site.[11]

U.S. regulation

[edit]

The National Telecommunications and Information Administration (NTIA) has known of dirtboxes since at least 2010.[1] In 2014, the United States Department of Justice refused to confirm or deny that government agencies used them, but an official said, "It would be utterly false to conflate the law-enforcement program with the collection of bulk telephone records by the National Security Agency".[12] The Federal Communications Commission, responsible for licensing and regulating cell-service providers, was not aware of dirtbox activity prior to The Wall Street Journal exposé.[12]

In January 2015, the US Senate Judiciary Committee asked the Department of Justice and Department of Homeland Security which law enforcement agencies used DRTboxes, and to specify the legal processes and policies that existed to protect the privacy of those whose information was collected.[13]

Criticism

[edit]

In 2014, privacy advocates, including U.S. Rep. Alan Grayson (D-Florida),[4] have criticized dirtbox use as a violation of the Fourth Amendment to the United States Constitution.[14] Brian Owsley, a law professor at Indiana Institute of Technology and former United States magistrate, said in 2014 that to use the devices legally, "I think the government would need to obtain a search warrant based on probable cause consistent with the Fourth Amendment".[15]

The Guardian quoted Michael German, a professor at New York University Law School and former FBI agent, as saying: "The overriding problem is the excessive secrecy that hides the government’s ever-expanding surveillance programs from public accountability."[16]

In November 2014, Senator Edward Markey (D-Massachusetts) and former Senator Al Franken (D-Minnesota) have warned that Americans' privacy rights must be assured.[12]

See also

[edit]

References

[edit]
  1. ^ a b c d e f g The Boeing Company (11 June 2010). "Technical Approaches to Preventing Contraband Cell Phone Use in Prisons;Docket No. 100504212-0212-01" (PDF). National Telecommunications and Information Administration. p. 7. Archived (PDF) from the original on 19 October 2011. Retrieved 16 November 2014.
  2. ^ "DRT Products". Digital Receiver Technology, Inc. n.d. Retrieved 16 November 2014.
  3. ^ a b c d e f g h Devlin Barrett (13 November 2014). "Americans' Cellphones Targeted in Secret U.S. Spy Program". The Wall Street Journal. Dow Jones & Company. Retrieved 14 November 2014.
  4. ^ a b c d e f Winston, Ali (2015-08-07). "Chicago and Los Angeles have used 'dirt box' surveillance for a decade". Revealnews, Center of Investigative Reporting. Retrieved 26 April 2016.
  5. ^ Kim Zetter (14 November 2014). "The Feds Are Now Using 'Stingrays' in Planes to Spy on Our Phone Calls". Wired. Condé Nast. Retrieved 16 November 2014.
  6. ^ Iain Thomson (14 November 2014). "US Marshals commit DIRTBOX INTRUSION on Americans, says report". The Register. Situation Publishing. Retrieved 16 November 2014.
  7. ^ Devlin Barrett (21 November 2014). "U.S. Marshals Service Personnel Dressed as Mexican Marines Pursue Cartel Bosses". The Wall Street Journal. Retrieved 21 November 2014.
  8. ^ P/K (27 November 2013). "DRTBOX and the DRT surveillance systems". Top Level Telecommunications. electrospaces.net. Retrieved 16 November 2014.
  9. ^ Stephanie K. Pell; Christopher Soghoian (May 15, 2014). "Your Secret Stingray's No Secret Anymore: The Vanishing Government Monopoly Over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy". Harvard Journal of Law & Technology. 28 (1). Social Science Electronic Publishing, Inc.: 67. SSRN 2437678.
  10. ^ Jacques Follorou, Glenn Greenwald (21 October 2013). "France in the NSA's crosshair : phone networks under surveillance". Le Monde.fr. Le Monde. Retrieved 27 May 2016.
  11. ^ FedBizOpps (2 April 2007). "59 -- Portable Receiving System". FedBizOpps.gov. Retrieved 17 November 2014.
  12. ^ a b c Devlin Barrett and Gautham Nagesh (14 November 2014). "U.S. Defends Marshals in Wake of Secret Cellphone Spying Report". The Wall Street Journal. Dow Jones Co. Retrieved 16 November 2014.
  13. ^ Staff (January 02, 2015) "Senate wants more answers from feds about fake cell towers, other devices that collect smartphone data" Fox News, retrieved 26 April 2016
  14. ^ Mark Weinstein (16 November 2014). "U.S. Marshals and Their "Dirtbox" Declare the 4th Amendment Dead". The Huffington Post. Retrieved 16 November 2014.
  15. ^ Megan Geuss (13 November 2014). "Feds gather phone data from the sky with aircraft mimicking cell towers". Ars Technica. Condé Nast. Retrieved 16 November 2014.
  16. ^ Spencer Ackerman; Dominic Rushe; Paul Lewis (14 November 2014). "US government planes mimic cellphone towers to collect user data – report". The Guardian. Retrieved 16 November 2014.
[edit]