FBI's DCSnet
I am going to have to redo this. This is more complicated than I thought. However the FBI has 350 switching stations or nodes or exchanges or “something” like that. The backdoor is in for the pseudo convergence of voice networks and data network. As long as the SigTrans are different there can never be full convergence of the two traffic protocols. The backdoor is old, relisble, and well established for the voice network and is in the SigTran layers.
I will redo this post and then maybe others can help color in the missing pieces. With the FBI owning some type of node (what do you need 350 of for nationwide coverage as a mobile virtual net operator (MVNO) “subcontracting” network services from national carriers for a hidden government internal private communication network that bypasses PSTN and a place to maintain your interception equipment?
“FBI Telecom” is an oddball MVNO, odd because it owns 350 wiretap offices spoofing a network node. In those wiretap offices that spoof some type of node ( at least I know that spoofed node or exchange or switching station of some type is outside of the pstn (lol) spoofing the location of the wiretapped cell phone nodes of some type (which also house interception and collection equipment.) There is enough information available to reverse engineer and diagram the network links and equipment of FBI Telecom and their DCSNet.
I will go back to the drawing board and redo the post in a more abstract way. Others can fill in the blank spots. It won't be hard with the right knowledge base. The FBI spoofs your phone's location to the interception “node” then manages the network traffic from other carriers sending traffic to the phone under wiretap. The FBI wiretap office “tells” traffic routed from other carriers to that (spoofed) phone “hey, the destination phone is this way.” After traffic passes through the wiretap office and was either intercepted and collected or identified as exempt from interception, the traffic then routes to the actual phone number, “the direct connection.”
I got that right and quite a bit else right. However the traffic could be standard network traffic such as 4G VoLTE for example and is not necessarily a unique “voice network and data network.”
The “not necessarily a unique traffic layer of a network” is correct. However I now lack a good explanation to explain why the NSA IMSI catcher appears to block the data network signal when it intercepts voice calls or does a location check.
I will provide the basic data and a broader more abstract hypothesis and maybe others over time could fill in the details. DCSNet wiretaps would be cinch to diagram out all the layers, including that FBI wiretap office spoofing an ordinary “node” in a wireless network and the collection software stack. I have enough data, and it would be a cinch to reverse engineer if the right people get interested in filling in the blanks or if I take a year to study it.