Risk
10/3/2013
11:07 AM
50%
50%

NSA Discloses Cellphone Location Tracking Tests

National Security Agency director tells Congress that the 2010 mass surveillance pilot program has been discontinued -- at least for the moment.

9 Android Apps To Improve Security, Privacy
9 Android Apps To Improve Security, Privacy
(click image for larger view)
The head of the National Security Agency told Congress Wednesday that the intelligence agency launched a test program in 2010 to see if it could track Americans' location en masse, using the signals put out by people's cellphones.

According to NSA director General Keith Alexander, the pilot program, which concluded in 2011, was designed to test whether the captured tracking information could be reconciled with databases of information already gathered by the agency's digital dragnet.

"In 2010 and 2011, NSA received samples in order to test the ability of its systems to handle the data format, but that data was not used for any other purposes and was never available for intelligence analysis purposes," Alexander told the Senate Judiciary Committee Wednesday, during a hearing titled, "Continued Oversight of the Foreign Intelligence Surveillance Act."

But in response to a question from Sen. Ted Cruz (R-Texas) about whether the agency might track Americans' locations as part of future terrorism investigations, Alexander suggested that the agency wouldn't mind revisiting its ability to monitor the location of every cellphone in the United States. "This may be something that may be a future requirement for the country, but it is not right now," he said.

[ Is John McAfee's new Wi-Fi box really NSA-proof? Read John McAfee Wants To Shield You From NSA. ]

But Alexander also noted -- as has been disclosed before -- that the agency does share information on suspects' cellphone numbers with law enforcement agencies. "When we identify a number, we get that to the FBI and they can get probable cause to get location data that they need," Alexander said. "And that's the reason that we stopped [the pilot program] in 2011."

The revelations over the test program triggered related questions from privacy experts. "Who were the guinea pigs for this 'pilot program?' And did they consent to being tracked this way?" asked "Dissent," which is the handle of the privacy advocate and data breach information blogger who maintains privacy site PogoWasRight.com. "If not, where was the legal justification or warrant that permitted this?"

The fact that legislators were learning about the test two years after it happened also lead to questions about whether Congress has adequate oversight of the intelligence agency. "The NSA's attempt to collect this data shows the need for stronger legislative oversight of the agency's activities, but the fact is that federal, state and local law enforcement are already regularly collecting cellphone location information without a warrant," ACLU legislative counsel Christopher Calabrese told The Guardian.

Calabrese also suggested that the revelations should drive Congress to finally make clear what types of privacy rights Americans should expect, especially when it comes to having their location tracked. "Last year a majority of the Supreme Court recognized that location information is sensitive, and we need legislation that respects privacy rights when it comes to Americans' movements," he said.

The revelations over the cellphone tracking pilot program came after a July report revealed that the NSA can track cellphones even when they appear to be switched off. According to information published by The Washington Post, the capability was developed to allow CIA and paramilitary units, as well as clandestine Joint Special Operations Command (JSOC) teams, to use al-Qaeda leaders' cellphones to track them in real time, for the purpose of then killing or capturing them.

Technically speaking, tracking "off" cellphones hinged on the fact that even when apparently deactivated, a phone's baseband processor may remain active, pinging a cell tower every 10 minutes to retrieve SMS messages. As a result, should the NSA or Congress choose to pursue mass cellphone location tracking in the future, nothing short of removing a battery from a phone -- when that's even possible -- would prevent people's cellphones from being tracked.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Ninja
10/3/2013 | 11:36:10 PM
re: NSA Discloses Cellphone Location Tracking Tests
If the protections promised in the U.S. Constitution matter, I'd say this is more than a non-starter kind of piece. Being a government official doesn't exempt you from the law.
msbpodcast
50%
50%
msbpodcast,
User Rank: Apprentice
10/3/2013 | 5:36:56 PM
re: NSA Discloses Cellphone Location Tracking Tests
The problem is not that towers ping phones and vice-versa but that the NSA is trying to ping EVERYBODY'S PHONE ALL THE TIME. (We'd already rejected Pointdexter's TIA, why is it back again?)

If you've done nothing wrong, why is YOUR phone appearing on their innumerable lists?

If you've done nothing wrong, why are YOU being tracked?
TomM765
50%
50%
TomM765,
User Rank: Apprentice
10/3/2013 | 4:40:51 PM
re: NSA Discloses Cellphone Location Tracking Tests
This is a over sensational non-starter kind of piece. Virtually every police force in this country has the same kind of cell tower ping position "tracking" set up for non GPS (or if GPS disabled) phones for reverse emergency positioning. Old tech method that's been in widespread use for well over a decade that has plenty of legal backing. You should tone down the shilling a bit.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

CVE-2014-9709
Published: 2015-03-30
The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.