Risk
10/3/2013
11:07 AM
50%
50%

NSA Discloses Cellphone Location Tracking Tests

National Security Agency director tells Congress that the 2010 mass surveillance pilot program has been discontinued -- at least for the moment.

9 Android Apps To Improve Security, Privacy
9 Android Apps To Improve Security, Privacy
(click image for larger view)
The head of the National Security Agency told Congress Wednesday that the intelligence agency launched a test program in 2010 to see if it could track Americans' location en masse, using the signals put out by people's cellphones.

According to NSA director General Keith Alexander, the pilot program, which concluded in 2011, was designed to test whether the captured tracking information could be reconciled with databases of information already gathered by the agency's digital dragnet.

"In 2010 and 2011, NSA received samples in order to test the ability of its systems to handle the data format, but that data was not used for any other purposes and was never available for intelligence analysis purposes," Alexander told the Senate Judiciary Committee Wednesday, during a hearing titled, "Continued Oversight of the Foreign Intelligence Surveillance Act."

But in response to a question from Sen. Ted Cruz (R-Texas) about whether the agency might track Americans' locations as part of future terrorism investigations, Alexander suggested that the agency wouldn't mind revisiting its ability to monitor the location of every cellphone in the United States. "This may be something that may be a future requirement for the country, but it is not right now," he said.

[ Is John McAfee's new Wi-Fi box really NSA-proof? Read John McAfee Wants To Shield You From NSA. ]

But Alexander also noted -- as has been disclosed before -- that the agency does share information on suspects' cellphone numbers with law enforcement agencies. "When we identify a number, we get that to the FBI and they can get probable cause to get location data that they need," Alexander said. "And that's the reason that we stopped [the pilot program] in 2011."

The revelations over the test program triggered related questions from privacy experts. "Who were the guinea pigs for this 'pilot program?' And did they consent to being tracked this way?" asked "Dissent," which is the handle of the privacy advocate and data breach information blogger who maintains privacy site PogoWasRight.com. "If not, where was the legal justification or warrant that permitted this?"

The fact that legislators were learning about the test two years after it happened also lead to questions about whether Congress has adequate oversight of the intelligence agency. "The NSA's attempt to collect this data shows the need for stronger legislative oversight of the agency's activities, but the fact is that federal, state and local law enforcement are already regularly collecting cellphone location information without a warrant," ACLU legislative counsel Christopher Calabrese told The Guardian.

Calabrese also suggested that the revelations should drive Congress to finally make clear what types of privacy rights Americans should expect, especially when it comes to having their location tracked. "Last year a majority of the Supreme Court recognized that location information is sensitive, and we need legislation that respects privacy rights when it comes to Americans' movements," he said.

The revelations over the cellphone tracking pilot program came after a July report revealed that the NSA can track cellphones even when they appear to be switched off. According to information published by The Washington Post, the capability was developed to allow CIA and paramilitary units, as well as clandestine Joint Special Operations Command (JSOC) teams, to use al-Qaeda leaders' cellphones to track them in real time, for the purpose of then killing or capturing them.

Technically speaking, tracking "off" cellphones hinged on the fact that even when apparently deactivated, a phone's baseband processor may remain active, pinging a cell tower every 10 minutes to retrieve SMS messages. As a result, should the NSA or Congress choose to pursue mass cellphone location tracking in the future, nothing short of removing a battery from a phone -- when that's even possible -- would prevent people's cellphones from being tracked.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Ninja
10/3/2013 | 11:36:10 PM
re: NSA Discloses Cellphone Location Tracking Tests
If the protections promised in the U.S. Constitution matter, I'd say this is more than a non-starter kind of piece. Being a government official doesn't exempt you from the law.
msbpodcast
50%
50%
msbpodcast,
User Rank: Apprentice
10/3/2013 | 5:36:56 PM
re: NSA Discloses Cellphone Location Tracking Tests
The problem is not that towers ping phones and vice-versa but that the NSA is trying to ping EVERYBODY'S PHONE ALL THE TIME. (We'd already rejected Pointdexter's TIA, why is it back again?)

If you've done nothing wrong, why is YOUR phone appearing on their innumerable lists?

If you've done nothing wrong, why are YOU being tracked?
TomM765
50%
50%
TomM765,
User Rank: Apprentice
10/3/2013 | 4:40:51 PM
re: NSA Discloses Cellphone Location Tracking Tests
This is a over sensational non-starter kind of piece. Virtually every police force in this country has the same kind of cell tower ping position "tracking" set up for non GPS (or if GPS disabled) phones for reverse emergency positioning. Old tech method that's been in widespread use for well over a decade that has plenty of legal backing. You should tone down the shilling a bit.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-5084
Published: 2015-08-02
The Siemens SIMATIC WinCC Sm@rtClient and Sm@rtClient Lite applications before 01.00.01.00 for Android do not properly store passwords, which allows physically approximate attackers to obtain sensitive information via unspecified vectors.

CVE-2015-5352
Published: 2015-08-02
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time ...

CVE-2015-5537
Published: 2015-08-02
The SSL layer of the HTTPS service in Siemens RuggedCom ROS before 4.2.0 and ROX II does not properly implement CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a different vulnerability than CVE-2014-3566.

CVE-2015-5600
Published: 2015-08-02
The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumptio...

CVE-2015-1009
Published: 2015-07-31
Schneider Electric InduSoft Web Studio before 7.1.3.5 Patch 5 and Wonderware InTouch Machine Edition through 7.1 SP3 Patch 4 use cleartext for project-window password storage, which allows local users to obtain sensitive information by reading a file.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!