EFF recently received documents from the FBI that reveal details about the depth of the agency's electronic surveillance capabilities and call into question the FBI's controversial effort to push Congress to expand the Communications Assistance to Law Enforcement Act (CALEA) for greater access to communications data. The documents we received were sent to us in response to a Freedom of Information Act (FOIA) request we filed back in 2007 after Wired reported on evidence that the FBI was able to use “secret spyware” to track the source of e-mailed bomb threats against a Washington state high school. The documents discuss a tool called a "web bug" or a "Computer and Internet Protocol Address Verifier" (CIPAV),1 which seems to have been in use since at least 2001.2
![](https://www.eff.org/files/CIPAV_Timberline.png)
What is CIPAV and How Does It Work?
The documents discuss technology that, when installed on a target's computer, allows the FBI to collect the following information:
- IP Address
- Media Access Control (MAC) address
- "Browser environment variables"
- Open communication ports
- List of the programs running
- Operating system type, version, and serial number
- Browser type and version
- Language encoding
- The URL that the target computer was previously connected to
- Registered computer name
- Registered company name
- Currently logged in user name
- Other information that would assist with "identifying computer users, computer software installed, [and] computer hardware installed"3
Where Has CIPAV Been Used and What Legal Process Does the FBI Rely On to Use It?
![](https://www.eff.org/files/CIPAV_poisonkoolaid.png)
The FBI has been using the tool in domestic criminal investigations as well as in FISA cases,7 and the FISA Court appears to have questioned the propriety of the tool.8 Other agencies, and even other countries have shown interest in the tool, indicating its effectiveness. Emails from 2006 discuss interest from the Air Force,9 the Naval Criminal Investigative Service10 and the Joint Task Force-Global Network Operations,11 while another email from 2007 discusses interest from the German government.12
The FBI's Crypto Unit appears to have viewed the CIPAV as a proprietary tool. In one email, an agent grumbled, "we are seeing indications that [CIPAV] is being used needlessly by some agencies, unnecessarily raising difficult legal questions (and a risk of suppression without any countervailing benefit)."13 In another email, an agent stated, "[I] am weary [sic] to just hand over our tools to another Gov't agency without any oversight or protection for our tool/technique."14And a third email noted, "[w]e never discuss how we collect the [data CIPAV can collect] in the warrants/affidavits or with case agents. AUSAs, squad supervisors, outside agencies, etc."15
![](https://www.eff.org/files/CIPAV-Authority.png)
Eventually, the FBI seems to have sought a legal opinion on the proper use of the tool, both from the Office of General Counsel and from the National Security Law Branch,19 and ultimately, the agency seems to have settled on a "two-step request" process for CIPAV deployments -- a search warrant to authorize intrusion into the computer, and then a subsequent Pen/Trap order to authorize the surveillance done by the spyware.20
What Does This Mean for the FBI's Push for New Back Doors into Our Internet Communications?
Over the past few months, we've heard a lot from the FBI about its need to expand the Communications Assistance to Law Enforcement Act (CALEA), a law that that requires all telecommunications and broadband providers to be technically capable of complying with an intercept order. Federal law enforcement officials have argued that under current regulations they can't get the information they need and want to expand CALEA to apply to communications systems like Gmail, Skype, and Facebook. However, these documents show the FBI already has numerous tools available to surveil suspects directly, rather than through each of their communications service providers. One heavily redacted email notes that the FBI has other tools that "provide the functionality of the CIPAV [text redacted] as well as provide other useful info that could help further the case."21 Another email notes that CIPAVs are used in conjunction with email intercepts, perhaps using similar spyware-type tools.22 If the FBI already has endpoint surveillance-based tools for internet wiretapping, it casts serious doubt on law enforcement's claims of "going dark."
![](https://www.eff.org/files/CIPAV_search_warrant-10days.png)
Click here to access full pdf versions of the documents we received or see below for the pages referenced in this post.
- 1.FBI_CIPAV_01 p.26
- 2.FBI_CIPAV_09 p.3
- 3.FBI_CIPAV_07 pp.10-11
- 4.FBI_CIPAV_07 p.50
- 5.FBI_CIPAV_08 p.67
- 6.FBI_CIPAV_10
- 7.FBI_CIPAV_07 p. 45, FBI_CIPAV_08 p.132, 143
- 8.FBI_CIPAV_14 p.52
- 9.FBI_CIPAV_08 p.20
- 10.FBI_CIPAV_09 p.21-22
- 11.Id.
- 12.FBI_CIPAV_08 p.9
- 13.FBI_CIPAV_05 p.1
- 14.FBI_CIPAV 09 p.21
- 15.FBI_CIPAV_07 pp.11
- 16.FBI_CIPAV_08 p.29
- 17.FBI_CIPAV_08 p.149
- 18.FBI_CIPAV_14 p.36."KP" is likely a reference to "kiddie porn."
- 19.FBI_CIPAV_14 p.42, 62
- 20.FBI_CIPAV_08 p.169
- 21.FBI_CIPAV_08 p.168
- 22.FBI_CIPAV_08 p.143
No comments:
Post a Comment