General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsYou know how the NSA actually gets the "content" of a phone call when under warrant?
Today our new term to learn is "Safe Harbor"
Most all companies outsource the connectivity to LEA (law enforcement agencies) to a trusted third party. Usually an MPLS VPN is established using a couple 10M or 100M circuits to the company you contract with, the trusted third party.
You can either let them directly handle the warrants and implement the tap by giving them access to your switches, OR, you have your own personnel with the proper clearance to implement the "tap" and direct the traffic over that MPLS VPN back to the trusted third party, who then send the traffic to various LEA. These companies already have the data connectivity back to places like Quantico. Google Quantico if you haven't heard that term before.
Here are two companies who do this for a living-
West Central Support
http://www.wcsupport.com/calea.php
West Central Support Offers a Complete CALEA Solutions Package
West Central support provides Procera Networks PacketLogic platform, a cost effective, complete, and scalable solution that seamlessly integrates into the service provider's existing network, without the need to upgrade any network element in the network infrastructure fabric. Procera's unique value proposition is that in addition to being able to handle the Interception and Delivery of content as sanctioned by the FCC CALEA regulations, the solution also delivers the most accurate, policy-based traffic management capabilities for Broadband Service Providers (BSPs).
In addition to providing Procera Networks' PacketLogic platform as a viable CALEA solution, West Central Support provides Trusted Third Party (TTP) CALEA services. We will analyze your network to identify the optimal location for the Packet Logic platform and assist in the set up, installation, and testing of the equipment. As the TTP, West Central Support will receive the intercept request from the ISP and appropriately configure the rules in PacketLogic to meet the specifics of the intercept request as well as facilitate information delivery to the LEA and handle the appropriate paperwork and filings.
http://www.subsentio.com/
SUBSENTIO THE MARKET LEADER IN ELECTRONIC SURVEILLANCE SERVICES
At Subsentio, Safe Harbor is not just a provision within the Communications Assistance for Law Enforcement Act of 1994 (CALEA), it is our business philosophy. Our mission is to provide a safe environment for service providers, their subscribers and law enforcement should a need for electronic surveillance arise. This level of trust to provide a Safe Harbor in an industry that is turbulent at best can only be delivered by personnel with decades of experience expertise that is unmatched within this small, but vitally important, niche of telecommunications. For Subsentio, providing Safe Harbor is not a job, it is our passion.
Based in Centennial, Colorado, Subsentios surveillance technology connects telecommunication service providers with Federal, State and Local Law Enforcement monitoring centers to comply with lawfully authorized electronic surveillance (LAES) court orders. From national carriers to ultra-small rural providers, Subsentio is responsible for millions of subscribers with a wide range of communication services. These services are often complex, multi-vendor environments encompassing differing phases of technological approaches that require our expertise to properly perform a lawful intercept.
HappyMe
(20,277 posts)Not actual information!
Thanks for posting.
snooper2
(30,151 posts)But there are those who think some flunky who happened to get a hold of a PDF and said "I can tap all ya' calls with the press of a button" is some kind of grand fucking wizard
reusrename
(1,716 posts)If a call was made a year ago, how do you listen to it over this system?
Monkie
(1,301 posts)this is capitalism at its finest, these companies just sit between the providers and the national security apparatus and do the providers dirty work for them.
if the providers feel uncomfortable with this, or none of their employees wish to be involved in these programs, or cant be trusted because they dont have the right clearances, then companies like this are the answer.
i wonder how much of a revolving door there is between the agencies doing the monitoring and these companies.
reusrename
(1,716 posts)First of all, I forgot for a moment that database <> internet.
There are many aspects of this story that are still jumbled together but are slowly unraveling for me. This OP explains a method of data collection that occurs before the stuff gets stored in the yottabyte facility. Searches to the database would be a through a completely different method.
What this shows is that the telecoms have no plausible deniability regarding "direct access" if they just subcontract their cooperation out to a third party.
This fills in a lot of gaps for me. Thanks again.
snooper2
(30,151 posts)So they don't "get" the data until I put it on the wire to them...
wandy
(3,539 posts)Response to snooper2 (Original post)
Catherina This message was self-deleted by its author.
snooper2
(30,151 posts)Leopolds Ghost
(12,875 posts)You're a techie -- whoda thunk it? But I guess your username is more significant;
You have no problem with blanket electronic surveillance under blanket warrants;
You think the NSA relies on Safe harbor provisions (which your post didn't define,
but correct me if I'm wrong) that require ISP's to cooperate with lawful eavesdropping
investigations in return for not being liable for any user content found in
the course of their investigations, be it criminal, libelious, or terrorist activity.
You disagree with Barton Gellman's continual drip drip drip of new information
from the preceding interviews with both Snowden and other intel experts who
all corroborate Snowden's information which he obtained as a low level leaker
[font size="4"]...BECAUSE IT IS PUBLICALLY KNOWN TO EVERYONE WHO WORKS IN THE IT INDUSTRY, ESPECIALLY INTEL.[/font]
And the American people are being blamed for being kept deliberately misinformed,
knowing that the media have created a climate of ignorance, uncuriosity, conformism
(hatred of "hipsters" and "provocateurs" and anti-intellectualism that leaves even liberals
proudly proclaiming that they don't read newspapers, which if they did, they would have
read about all this sh*t years ago. But the politicians and rulers, knowing they could
rely on stupidity, deny what's in the paper unless it comes from an authoritative source.
Puzzledtraveller
(5,937 posts)that reveals a deep ideaological divide.
SidDithers
(44,228 posts)Thanks for posting.
Sid
baldguy
(36,649 posts)Maybe a little of both?
1-Old-Man
(2,667 posts)because the means by which the information was intercepted really doesn't matter a bit to the analyst who only cares about its source, intended audience, and information contained therein. He might or might not know how it was obtained and of course anyone can speculate on how. Maybe he was aware of how it was obtained or maybe not and he misspoke, but its really immaterial.
baldguy
(36,649 posts)Even though the program he was working on could not do that, and Obama said specifically that "Nobody Is Listening to Your Phone Calls", who do you believe? The guy sitting in China who has lied about pretty much everything, or the President?
Snowden is an attention-seeking self-aggrandizing douchebag, being promoted by Glenn Greenwald, another attention-seeking self-aggrandizing douchebag, and supported by a whole host of other attention-seeking self-aggrandizing douchebags: the "Drs" Paul, Glenn Bekk, Alex Jones, etc, etc. None of them support the De3mocratic Party or the President. The only "revaluations" they've presented are either flat-out lies or about programs which have long been known and/or suspected, and which have been through the legislative & judicial process.
If you want a debate about whether we need FISA, PRISM and other types of limited domestic surveillance the govt is involved in, fine. Or about further protections of civil liberties, fine. Or to totally throw out the Patriot Act, the FISA courts, and make gathering even metadata without a specific warrant, fine. But Ed Snowden should not be the standard-bearer of that discussion.
bobduca
(1,763 posts)scorecard:
B is 1-15
I is 16-30
N is 31-45
G is 46-60
O is 61-75
"douchebag" "douchebag" "douchebag" G-49
"oh and Alex Jones! Glenn Bekkk" B-15
"long known programs" I-23
"been through the legislative and judicial process" N-53
attempt to limit discussion, and bring it back to Snowden as some imagined anti-obama vanguard. O-62
BINGO!
Buzz Clik
(38,437 posts)Rhetorical question.
Stalking is problematic, and tag-teaming with like-minded posters is a similar error.
I don't care about agendas, but I strongly recommend reassessing posting patterns. Unless starting over is not a problem.
This is not an opening to a conversation. Respond if you are so inclined, but I will not be revisiting this thread.
bobduca
(1,763 posts)and I enjoy pointing out your steaming piles of hypocrisy.
Buzz Clik
(38,437 posts)I didn't alert the post of yours that was hidden. Someone else is onto you.
As I have said, I don't care what you do here; but, when you get in my face... well, your choice.
bobduca
(1,763 posts)Buzz Clik
(38,437 posts)You threw down the gauntlet, not me, and you already know that I don't back away. But that's just an aside -- your behavior here is way out on the edge. Others have noticed. If you don't give a shit, then carry on. Surely you have other incarnations.
I'm done here. No doubt, I'll see you around; next time, make it more interesting.
bobduca
(1,763 posts)you are sure of this? Can't I appeal to the secret council of pragmatic centrists?
DCBob
(24,689 posts)bobduca
(1,763 posts)I too was hoping you had stormed off in a puff of greasy smoke already! re-plonk
baldguy
(36,649 posts)Otherwise we can assume that you have nothing significant to say.
KittyWampus
(55,894 posts)snooper2
(30,151 posts)They have their pet issue of the month and will LA LA LA LA I CAN'T HEAR YOU so they can hold it tightly
Response to snooper2 (Original post)
Laelth This message was self-deleted by its author.