Secret Data in FBI Wiretapping Audit Revealed With Ctrl+C

Once again, supposedly sensitive information blacked out from a government report turns out to be visible by computer experts armed with the Ctrl+C keys — and that information turns out to be not very sensitive after all. Simply highlighting the redacted columns in this table from an Inspector General report reveals some very un-sensitive information. […]

All products featured on WIRED are independently selected by our editors. However, we may receive compensation from retailers and/or from purchases of products through these links.

Once again, supposedly sensitive information blacked out from a government report turns out to be visible by computer experts armed with the Ctrl+C keys -- and that information turns out to be not very sensitive after all.

redactedIGtableSimply highlighting the redacted columns in this table from an Inspector General report reveals some very un-sensitive information.
Image: Justice Department Inspector General ReportThis time around, University of Pennsylvania professor Matt Blaze discovered that the Justice Department's Inspector General's office had failed to adequately obfuscate data in a March report (.pdf) about FBI payments to telecoms to make their legacy phone switches comply with 1995 wiretapping rules. That report detailed how the FBI had finished spending its allotted $500 million to help telephone companies retrofit their old switches to make them compliant with the Communications Assistance to Law Enforcement Act or Calea-- even as federal wiretaps target cellphones more than 90 percent of the time.

This isn't the first time the Justice Department has made such an error. In 2007, a U.S. attorney referred to Threat Level's own David Kravets (then at the AP) as a hacker for discovering similar hidden information in a Balco steriod case filing. As far back as 2003, a report on minorities in the Justice Department was also vulnerable. The gaffes may seem humorous, but tell that to confidential informants, for whom such a slip-up could be fatal.

In fact, all one needs to do is open the Calea report with Adobe Reader or Foxit reader, and highlight the tables and cut and paste them into a text editor, something Blaze discovered accidentally when trying to copy a portion of the report into an e-mail to a student.

Some of the tidbits considered too sensitive to be aired publicly?

The FBI paid Verizon $2500 a piece to upgrade 1,140 old telephone switches. Oddly the report didn't redact the total amount paid to the telecom -- slightly more than $2.9 million dollars -- but somehow the bad guys will win if they knew the number of switches and the cost paid.

FBI survey results about wiretaps could also be found hidden under the redaction layer.

For the record, in 2005 and 2005, from talking to federal, state and local law enforcement agencies believed that the top emerging technologies causing surveillance concerns were VOIP, broadband and prepaid cellphones. While cops have long fretted about encryption and one might expect it to be in this list, it seems to have never been a problem for wiretapping.

In 2005, only 8 percent had tried tapping internet phone calls, but that number rose to 34 percent in 2006. In 2006, 35 percent of agencies had tried some sort of surveillance on broadband, but the question wasn't asked in 2005.

The price of wiretaps and pen traps still limits surveillance, according to 68 percent of agencies in 2005 and 65 percent in 2006. Meanwhile, telecoms seem to be getting better at providing data in standard formats to cops, whose complaints about data format fell dramatically from 60 percent in 2005 to 12 percent in in 2006.

But, oddly, 41 percent of agencies in 2006 say investigations have been hampered by companies not complying with Calea's mandates, while in 2005, that number was only 22 percent.

Other nuggets? Hidden info in a blacked-out screenshot of the FBI's wiretapping help-line complaint-management software reveals that even wiretappers have IT problems.

Cops in Montgomery County, Maryland had trouble right after Christmas in 2007 getting wiretap info delivered. Not far away in Baltimore (the honorary wiretap capital of the United States), cops had problems just before Christmas using the FBI's database of cell towers, which help cops figure out target's location and movements. Kenner, Louisiana, cops just wanted a user name and password to chat in the Law Enforcement forum on ASKCalea.

Now that the cat is out of the bag, one is sure to see a crime wave across the country.

Professor Matt Blaze suggests following NSA's technical recommendations (.pdf) on how to redact documents. Threat Level merely suggests that report writers start telling the classifiers to stop acting like censors from WWII carrier groups.

See Also:

Via Matt Blaze's Exhaustive Search: Wiretaps with bugs.