<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=Digital_Collection_System_Network</id>
	<title>Digital Collection System Network - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=Digital_Collection_System_Network"/>
	<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=Digital_Collection_System_Network&amp;action=history"/>
	<updated>2026-05-05T21:56:37Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>http://debianws.lexgopc.com/wiki143/index.php?title=Digital_Collection_System_Network&amp;diff=5353152&amp;oldid=prev</id>
		<title>imported&gt;Voxadam: /* DCS-5000 */</title>
		<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=Digital_Collection_System_Network&amp;diff=5353152&amp;oldid=prev"/>
		<updated>2023-08-05T10:23:02Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;DCS-5000&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;[[File:Dcs3000 logo.jpg|thumb|Official logo of DCS3000 system.]]&lt;br /&gt;
&lt;br /&gt;
The &amp;#039;&amp;#039;&amp;#039;Digital Collection System Network&amp;#039;&amp;#039;&amp;#039; (&amp;#039;&amp;#039;&amp;#039;DCSNet&amp;#039;&amp;#039;&amp;#039;) is the [[Federal Bureau of Investigation]] (FBI)&amp;#039;s [[point-and-click]] [[surveillance]] system that can perform instant wiretaps on almost any telecommunications device in the [[United States]].&amp;lt;ref name=&amp;quot;wired.com&amp;quot;&amp;gt;{{cite magazine|url=https://www.wired.com/politics/security/news/2007/08/wiretap|title=Point, Click ... Eavesdrop: How the FBI Wiretap Net Operates|magazine=Wired|author=Ryan Singel|date=29 Aug 2007|accessdate=12 Aug 2015}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
It allows access to [[Mobile phone|cellphone]], [[landline]], [[Short message service|SMS]] communications anywhere in the [[United States|US]] from a point-and-click interface. It runs on a [[fiber-optic]] [[Backbone network|backbone]] that is separate from the [[Internet]].&amp;lt;ref&amp;gt;[http://www.gcn.com/print/22_31/23967-1.html Army Guard and FBI sign up for Peerless IP net] {{webarchive|url=https://web.archive.org/web/20070927194538/http://www.gcn.com/print/22_31/23967-1.html |date=2007-09-27 }}&amp;lt;/ref&amp;gt; It is intended to increase agent productivity through workflow modeling, allowing for the routing of intercepts for translation or analysis with only a few clicks. The DCSNet real-time [[Military intelligence|intelligence]] data intercept has the capability to record, review and playback intercepted material in real-time.&amp;lt;ref name=&amp;quot;wired.com&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The DCSNet systems operate on a [[virtual private network]] parallel to the public Internet, with services provided at least for some time by the [[Sprint Corporation|Sprint]] Peerless IP network.&amp;lt;ref&amp;gt;{{cite press release |url=http://www.prnewswire.com/news-releases/fbi-will-use-unique-new-network-sprint-peerless-ip-72640567.html|title=FBI Will Use Unique New Network, Sprint Peerless IP |publisher=PR Newswire|author=Sprint|accessdate=12 Aug 2015}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Much of the information available on this system has come from the results of [[Freedom of Information Act (United States)|Freedom of Information Act]] (FOIA) requests made by the [[Electronic Frontier Foundation]] (EFF).&amp;lt;ref&amp;gt;{{cite web|url=https://www.eff.org/deeplinks/2007/08/eff-documents-shed-light-fbi-electronic-surveillance-technology|title=EFF Documents Shed Light on FBI Electronic Surveillance Technology|publisher=Electronic Frontier Foundation|author=Marcia Hofmann|date=29 Aug 2007|access-date=12 Aug 2015}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Components==&lt;br /&gt;
It is composed of at least three [[Classified information|classified]] software components that run on the [[Microsoft Windows|Windows]] [[operating system]]—DCS3000, DCS5000, DCS6000.&lt;br /&gt;
&lt;br /&gt;
===DCS-1000===&lt;br /&gt;
{{main|Carnivore (software)}}&lt;br /&gt;
&lt;br /&gt;
===DCS-3000===&lt;br /&gt;
DCS-3000 and &amp;quot;Red Hook&amp;quot; were first mentioned publicly in a March 2006 report from the [[United States Department of Justice Office of the Inspector General]] (OIG) on the implementation of the [[Communications Assistance for Law Enforcement Act]] (CALEA).&amp;lt;ref name=OIG /&amp;gt; The report described Red Hook as &amp;quot;a system to collect voice and data calls and then process and display the intercepted information in the absence of a [[Communications Assistance for Law Enforcement Act|CALEA]] solution.&amp;quot;&amp;lt;ref name=OIG&amp;gt;{{cite web|url=http://www.usdoj.gov/oig/reports/FBI/a0613/app8.htm|title=OIG Audit Report 06-13|website=www.usdoj.gov}}&amp;lt;/ref&amp;gt; and it described DCS-3000 &amp;quot;as an interim solution to intercept personal communications services delivered via emerging digital technologies used by wireless carriers in advance of any CALEA solutions being deployed.&amp;quot;&amp;lt;ref name=OIG/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Citing the OIG report, the [[Electronic Frontier Foundation]] (EFF) filed an [[Freedom of Information Act (United States)|FOIA]] request later that year in order to obtain more information about the two programs. When the FBI did not respond with more information, the EFF sued, and in May 2007 obtained a court order to release documents concerning the programs.&amp;lt;ref&amp;gt;{{cite news|url=http://www.smh.com.au/news/World/FBI-forced-to-divulge-spying-details/2007/08/31/1188067331398.html|title=FBI forced to divulge spying details|newspaper=The Sydney Morning Herald|date=31 Aug 2007|accessdate=12 Aug 2015}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{cite web|url=https://www.eff.org/issues/foia/061708CKK|title=DCS-3000 and Red Hook|date=10 July 2011|website=eff.org}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On August 29, 2007, &amp;#039;&amp;#039;[[Wired (magazine)|Wired]]&amp;#039;&amp;#039; magazine published an article on these systems, citing the EFF documents.&amp;lt;ref name=&amp;quot;wired.com&amp;quot; /&amp;gt; The DCS-3000 collects information associated with dialed and incoming numbers like traditional [[Trap and trace device|trap-and-trace]] and [[pen register]]s. The article named &amp;quot;Red Hook&amp;quot; as the client for DCS-3000.&amp;lt;ref name=&amp;quot;wired.com&amp;quot;/&amp;gt; &amp;#039;&amp;#039;Wired&amp;#039;&amp;#039; reported that the DCS-3000 cost $320 per number targeted, and that the software is maintained by [[Booz Allen Hamilton]].&amp;lt;ref&amp;gt;{{cite magazine |url=https://www.wired.com/2007/12/fbi-e-mail-shows-rift-over-warrantless-phone-record-grabs/?currentPage=1 |magazine=[[Wired (magazine)|Wired]] |title=FBI E-Mail Shows Rift Over Warrantless Phone Record Grabs |date=December 19, 2007 |archive-url=https://archive.today/20180627182253/https://www.wired.com/2007/12/fbi-e-mail-shows-rift-over-warrantless-phone-record-grabs/?currentPage=1 |archive-date=June 27, 2018 |first=Ryan |last=Singel |quote=DCS 3000 – the FBI&amp;#039;s tool for recording the phone numbers a target calls, or is called from – was set loose on 5,300 phones in 2005, at a cost of $320 per targeted number. Those costs did not include payments to telecoms for the intercepts. The software is maintained by Booz Allen Hamilton and contained more than 490,000 lines of code as of 2005.}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===DCS-5000===&lt;br /&gt;
The DCS-5000 is a system used by the FBI unit responsible for [[counter-intelligence]] to target suspected [[Espionage|spies]], alleged [[Terrorism|terrorists]], and others with wiretaps.&lt;br /&gt;
&lt;br /&gt;
===DCS-6000===&lt;br /&gt;
The DCS-6000 (a.k.a. &amp;quot;Digital Storm&amp;quot;) captures the content of phone calls and [[Text messaging|text messages]] for analysis.&amp;lt;ref name=&amp;quot;wired.com&amp;quot;/&amp;gt;&amp;lt;ref name=&amp;quot;Bamford2008&amp;quot;&amp;gt;{{cite book|author=James Bamford|title=The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America|url=https://archive.org/details/shadowfactory00bamf|url-access=registration|date=14 October 2008|publisher=Knopf Doubleday Publishing Group|isbn=978-0-385-52839-9|page=[https://archive.org/details/shadowfactory00bamf/page/185 185]}}&amp;lt;/ref&amp;gt; Once the data has been captured, it is indexed and prioritized using the Electronic Surveillance Data Management System (ELSUR).&amp;lt;ref name=&amp;quot;Bamford2008&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
{{Portal|United States|Politics}}&lt;br /&gt;
* [[Carnivore (FBI)]]&lt;br /&gt;
* [[ECHELON]]&lt;br /&gt;
* [[Investigative Data Warehouse]]&lt;br /&gt;
* [[Mass surveillance]]&lt;br /&gt;
* [[Signals intelligence]] (SIGINT)&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
{{reflist|2}}&lt;br /&gt;
[[Category:Surveillance]]&lt;br /&gt;
[[Category:Sprint Corporation]]&lt;br /&gt;
[[Category:Federal Bureau of Investigation]]&lt;br /&gt;
[[Category:Telephone tapping]]&lt;/div&gt;</summary>
		<author><name>imported&gt;Voxadam</name></author>
	</entry>
</feed>