Wednesday, March 11, 2009

Caller ID: Maintaining Investigative Security

From the FBI Law Enforcement Bulletin, written by David P. Williams:

Investigators should take precautions in response to the growth of caller identification services.

Mr. Williams serves with the Electronic Surveillance Unit, Office of Investigations, at the U.S. Customs Service headquarters in Woodbridge, Virginia.

The telephone has become such a staple of modern life that few people give it a second thought. When callers pick up the receiver, it is doubtful they consider the millions of signals being routed through switching stations that their call is about to join. They just know that when they want to check in with a family member across town or a business associate across an ocean, they only need to pick up the telephone. Even when power goes out in a community, the telephones generally continue to work. So, it might be easy to take this workhorse of the information age for granted.

However, advances in telephone service options--most notably caller identification services--require that law enforcement agencies take a close look at how they use the telephone. The growing prevalence of caller identification services (generally referred to as caller ID) dictates that investigators take special precautions, especially during undercover operations.

Caller ID: Help or Hindrance

As its name implies, the caller ID device displays the originating telephone number of an incoming call, allowing the recipient to know, before answering the call, the number of the party calling.

For law enforcement, caller ID has proven to be a valuable intelligence tool. When investigators install a court-authorized wiretap or dialed number recorder on a telephone line, for instance, they also generally request caller ID. With caller ID on the line, investigators not only know whom the targeted subject calls but also who calls the subject.

Investigators also can include a suspect's caller ID device on a search warrant request. A properly worded search warrant allows investigators to seize the caller ID box and thus obtain an accurate record of the last 25 to 100 calls received by the subject.

Nevertheless, despite its benefits, caller ID poses some potentially serious problems for the police. Critics claim that it invades citizens' privacy. There are also concerns that caller ID may reduce the number of calls to police crime tip lines, crisis centers, and suicide and abuse hotlines. For law enforcement agencies, concerns primarily revolve around the effects caller ID and related services have on undercover operations. By understanding the functions of these services, however, investigators can develop strategies to maintain telephone security during investigations.

THE MECHANICS OF CALLER ID

Caller ID comes in two forms. Basic caller ID (sometimes referred to as single message) represents the first generation of caller identification services, widely available since the early 1980s. During the last several years, telephone companies have been converting to enhanced caller ID (also known as deluxe or multimessage).

The primary difference between the two systems is the amount of information provided about the originating telephone call. While basic service provides only the caller's telephone number and the date and time of the call, enhanced service supplies this information, as well as the name and in some cases, the address of the caller.

Regardless of which form of caller ID serves a particular locality, the mechanics of its operation remain the same. The local telephone company attaches caller ID at its central office after the originating call has been placed. This makes it nearly impossible for the caller to trick or defeat the system.

Once the caller ID codes have been attached, the caller's identifying information is routed on the line with the call itself to the destination telephone. Caller ID information reaches the receiving telephone between the first and second rings. If a call is answered before or during caller ID delivery, the answering party will not receive the data.

CALL BLOCKING

If a caller has installed call blocking--an optional service to prevent transmission of the originating telephone number and other identifying information--this request is attached at the central telephone office after the commands for caller ID have been attached. When the call reaches the central office for the area serving the destination telephone, the office handles caller ID according to local programming. If the party at the destination telephone has paid for caller ID services, identifying information from the originating call will be sent.

If a call blocking command has been attached by the party making the call, the call will go through but the identifying information will not be relayed. Instead, a message indicating that all identifying information has been blocked will accompany the call. Generally, the word "private" or some variation appears on the caller ID screen, notifying the recipient that the caller has concealed the originating telephone number.

AVAILABILITY

Newly relaxed regulations and advances in technology soon will make caller ID and related services available on a much larger scale. Until recently, regional telephone companies dictated local service availability. Often, parties with caller ID would receive an "out of area" message, indicating that an incoming call was being placed from a locality that did not relay caller identification information.

In December 1995, the Federal Communications Commission allowed caller ID services to be relayed nationwide. As telephone companies gradually expand service availability, caller ID will become a truly national system. Already, there are indications that caller ID will be offered on a worldwide basis in the not-too-distant future.

Rapidly advancing technology also has enabled carriers to offer caller ID services on calls originating from sources that were once immune, including cellular and pay telephones. As with calls from localities that do not pass caller ID, calls from these types of telephones previously would relay an "out of area" message. Now, calls placed from cellular or pay telephones, as well as long-distance calls paid for via credit or phone cards, may provide identifying information to the party being called.

In fact, some firms that specialize in emerging technologies heavily promote their caller identification capabilities. The newest competition to cellular service, personal communications systems (PCS), pass identifying information in both directions. A screen on the handset lets users know the originating telephone number of the party calling them. Likewise, callers using PCS will pass on their identifying information to anyone with a PCS unit or caller ID. PCS users do not need to activate caller ID service separately; the caller identification features are included in the basic service contract.

With expanding caller identification services, law enforcement agencies should study the various methods available to respond to the threats posed to undercover investigations. Because no single antidote exists for every situation, investigators should be aware of the broad range of possible countermeasures to caller ID.

CONCLUSION

While it might be easy to take the telephone for granted, law enforcement agencies cannot afford to become complacent about telephone security. Evolving caller ID services represent a potentially serious threat to undercover operations for law enforcement agencies in an increasing number of communities around the country.

By developing a flexible array of countermeasures, agencies can minimize the dangers posed by caller ID. Investigators must remember that no countermeasure can be guaranteed effective for every situation. Instead, they should take precautions and be prepared for any problem that might arise from breaches of security due to caller ID. After all, the security of law enforcement operations is on the line.

Full article can be found here.

No comments: