11:07 AM

NSA Discloses Cellphone Location Tracking Tests

National Security Agency director tells Congress that the 2010 mass surveillance pilot program has been discontinued -- at least for the moment.

9 Android Apps To Improve Security, Privacy
9 Android Apps To Improve Security, Privacy
(click image for larger view)
The head of the National Security Agency told Congress Wednesday that the intelligence agency launched a test program in 2010 to see if it could track Americans' location en masse, using the signals put out by people's cellphones.

According to NSA director General Keith Alexander, the pilot program, which concluded in 2011, was designed to test whether the captured tracking information could be reconciled with databases of information already gathered by the agency's digital dragnet.

"In 2010 and 2011, NSA received samples in order to test the ability of its systems to handle the data format, but that data was not used for any other purposes and was never available for intelligence analysis purposes," Alexander told the Senate Judiciary Committee Wednesday, during a hearing titled, "Continued Oversight of the Foreign Intelligence Surveillance Act."

But in response to a question from Sen. Ted Cruz (R-Texas) about whether the agency might track Americans' locations as part of future terrorism investigations, Alexander suggested that the agency wouldn't mind revisiting its ability to monitor the location of every cellphone in the United States. "This may be something that may be a future requirement for the country, but it is not right now," he said.

[ Is John McAfee's new Wi-Fi box really NSA-proof? Read John McAfee Wants To Shield You From NSA. ]

But Alexander also noted -- as has been disclosed before -- that the agency does share information on suspects' cellphone numbers with law enforcement agencies. "When we identify a number, we get that to the FBI and they can get probable cause to get location data that they need," Alexander said. "And that's the reason that we stopped [the pilot program] in 2011."

The revelations over the test program triggered related questions from privacy experts. "Who were the guinea pigs for this 'pilot program?' And did they consent to being tracked this way?" asked "Dissent," which is the handle of the privacy advocate and data breach information blogger who maintains privacy site PogoWasRight.com. "If not, where was the legal justification or warrant that permitted this?"

The fact that legislators were learning about the test two years after it happened also lead to questions about whether Congress has adequate oversight of the intelligence agency. "The NSA's attempt to collect this data shows the need for stronger legislative oversight of the agency's activities, but the fact is that federal, state and local law enforcement are already regularly collecting cellphone location information without a warrant," ACLU legislative counsel Christopher Calabrese told The Guardian.

Calabrese also suggested that the revelations should drive Congress to finally make clear what types of privacy rights Americans should expect, especially when it comes to having their location tracked. "Last year a majority of the Supreme Court recognized that location information is sensitive, and we need legislation that respects privacy rights when it comes to Americans' movements," he said.

The revelations over the cellphone tracking pilot program came after a July report revealed that the NSA can track cellphones even when they appear to be switched off. According to information published by The Washington Post, the capability was developed to allow CIA and paramilitary units, as well as clandestine Joint Special Operations Command (JSOC) teams, to use al-Qaeda leaders' cellphones to track them in real time, for the purpose of then killing or capturing them.

Technically speaking, tracking "off" cellphones hinged on the fact that even when apparently deactivated, a phone's baseband processor may remain active, pinging a cell tower every 10 minutes to retrieve SMS messages. As a result, should the NSA or Congress choose to pursue mass cellphone location tracking in the future, nothing short of removing a battery from a phone -- when that's even possible -- would prevent people's cellphones from being tracked.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Thomas Claburn
Thomas Claburn,
User Rank: Ninja
10/3/2013 | 11:36:10 PM
re: NSA Discloses Cellphone Location Tracking Tests
If the protections promised in the U.S. Constitution matter, I'd say this is more than a non-starter kind of piece. Being a government official doesn't exempt you from the law.
User Rank: Apprentice
10/3/2013 | 5:36:56 PM
re: NSA Discloses Cellphone Location Tracking Tests
The problem is not that towers ping phones and vice-versa but that the NSA is trying to ping EVERYBODY'S PHONE ALL THE TIME. (We'd already rejected Pointdexter's TIA, why is it back again?)

If you've done nothing wrong, why is YOUR phone appearing on their innumerable lists?

If you've done nothing wrong, why are YOU being tracked?
User Rank: Apprentice
10/3/2013 | 4:40:51 PM
re: NSA Discloses Cellphone Location Tracking Tests
This is a over sensational non-starter kind of piece. Virtually every police force in this country has the same kind of cell tower ping position "tracking" set up for non GPS (or if GPS disabled) phones for reverse emergency positioning. Old tech method that's been in widespread use for well over a decade that has plenty of legal backing. You should tone down the shilling a bit.
Register for Dark Reading Newsletters
White Papers
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio