Open main menu

Wikipedia β

SORM (Russian: Система Оперативно-Розыскных Мероприятий, literally "System for Operative Investigative Activities") is the technical specification for lawful interception interfaces of telecommunications and telephone networks operating in Russia. The current form of the specification enables the targeted surveillance of both telephone and Internet communications. In broad sense the term "SORM" means any system for electronic surveillance. A Russian law passed in 1995 allowed FSB to access the surveillance data. Later access has been widened to other law enforcement agencies.

Contents

SORM-1Edit

SORM-1 system has been established in 1996 to monitor telephone communications.

SORM-2Edit

In July 1998 the system was replaced by SORM‑2 to allow monitoring of the internet, in addition to telephone communications. Under SORM‑2, Russian Internet service providers (ISPs) must install a special device on their servers to allow the FSB to track all credit card transactions,[citation needed] e-mail messages and web use.[1] The device must be installed at the ISP's expense.[2] It has been estimated to cost $10,000-$30,000.[citation needed] Other reports note that some ISPs have had to install direct communications lines to the FSB and that costs for implementing the required changes were in excess of $100,000.

On July 25, 2000, Russia's Minister of Information Technology and Communications Leonid Reiman issued the order No 130 "Concerning the introduction of technical means ensuring investigative activity (SORM) in phone, mobile and wireless communication and radio paging networks" stating that the FSB was no longer required to provide telecommunications and Internet companies documentation on targets of interest prior to accessing information.[3]

In 2014 SORM-2 usage was extended to monitoring of social networks, chats and forums, requiring their operators to install SORM probes in their networks.[4]

SORM-3Edit

A ministerial order from the Russian Ministry of Communications from 16 April 2014 introduced requirements for the new wiretapping system SORM-3. Telecommunications operators were required to install compliant equipment by 31 March 2015.[5]

According to regulations of Russian Ministry of Communications[6] SORM-3 equipment supports the following selectors for targeted surveillance:

  1. Single IPv4 or IPv6 address
  2. IPv4 or IPv6 networks identified with address mask
  3. User ID within telecom operator's system, supporting "*" and "?" as globbing symbols (wildcards)
  4. e-mail address, if targeted user connects via POP3, SMTP or IMAP4; connections protected with cryptography are specifically excluded
  5. e-mail address, if targeted user connects to a webmail system from a predefined list of services: mail.ru; yandex.ru; rambler.ru; gmail.com; yahoo.com; apport.ru; rupochta.ru; hotbox.ru; again, connections protected with cryptography are specifically excluded
  6. User's phone number
  7. IMSI
  8. IMEI
  9. MAC address of user's equipment
  10. ICQ UIN

SORM architecture and deploymentEdit

In most cases SORM is deployed using port mirroring.[citation needed] Some mobile networks use deep packet inspection to filter traffic.[7] A device named Omega has been recommended by the FSB.[7]

Due to the higher bandwidth usage within providers' networks (compared to external connectivity) many providers deploy SORM only at uplinks. In some cases trying to reduce their costs smaller providers would not implement SORM in their networks but instead would buy SORM-as-a-service from their upstream provider, which then deploys SORM installation on a specific downlink.[citation needed] Such deployment limits the amount of traffic seen by SORM, i.e. the internal traffic may not be captured by the equipment.[citation needed]

SORM also enables the use of mobile control points, a laptop that can be plugged directly into communication hubs and immediately intercept and record the operator's traffic.[2]

Roskomnadzor, a federal executive body responsible for media control, reported that several local ISPs were fined by the government after they failed to install FSB-recommended SORM devices.[7]

Access by government agenciesEdit

On January 5, 2000, during his first week in office, president Vladimir Putin amended the law to allow seven other federal security agencies (next to the FSB) access to evidence gathered via SORM. The newly endowed agencies included:[8][9]

Warrant and notification regulationsEdit

The acquisition of communications by entitled security services in general requires a court warrant, but at the same time they are allowed to start wiretapping before obtaining such warrant. The warrant is also only required for communications content, but not metadata (communicating parties, time, location etc.), which may be obtained without the warrant.[10]

In cases where an FSB operative is required to get an eavesdropping warrant, he is under no obligation to show it to anyone. Telecom providers have no right to demand that the FSB provide a warrant, and are denied access to the surveillance boxes. The security service calls on the special controller at the FSB headquarters that is connected by a protected cable directly to the SORM device installed on the ISP network.[2]

Zakharov v. RussiaEdit

Main article: Zakharov v. Russia

In December 2015, The European Court of Human Rights ruled on a case on the legality of Russian SORM legislation.[11][12] In a unanimous Grand Chamber decision, the Court ruled that Russian legal provisions "do not provide for adequate and effective guarantees against arbitrariness and the risk of abuse which is inherent in any system of secret surveillance, and which is particularly high in a system where the secret services and the police have direct access, by technical means, to all mobile telephone communications." It ruled that therefore, the legislation violated Article 8 of the European Convention on Human Rights.[11][12]

See alsoEdit

ReferencesEdit

  1. ^ "Приказ Минкомсвязи об утверждении Правил применения оборудования систем коммутации, включая программное обеспечение, обеспечивающего выполнение установленных действий при проведении оперативно-розыскных мероприятий". Российская газета. Retrieved 2016-03-16. 
  2. ^ a b c "In Ex-Soviet States, Russian Spy Tech Still Watches You". WIRED. Retrieved 2016-03-16. 
  3. ^ SORM, Lenta.ru, 21 August 2000; full text of the order in Russian: Russian full text, Libertarium.ru
  4. ^ Pierluigi Paganini (2014-08-18). "New powers for the Russian surveillance system SORM-2". Security Affairs. Retrieved 2014-08-24. 
  5. ^ "СОРМ-3 будет внедрен до 31 марта 2015 года". 2014-10-11. Retrieved 2014-10-12. 
  6. ^ "ПРАВИЛА применения оборудования систем коммутации, включая программное обеспечение, обеспечивающего выполнение установленных действий при проведении оперативно-разыскных мероприятий." (PDF). 
  7. ^ a b c "As Sochi Olympic venues are built, so are Kremlin's surveillance networks". The Guardian. 6 October 2013. 
  8. ^ Tracy, Jen (13 January 2000). "Police Get Window Of Access To E-mail". Moscow Times. Retrieved 6 June 2014. 
  9. ^ Russia: Surveillance Policy (Report). Privacy International. 12 December 2006. 
  10. ^ "Слушать подано". Kommersant. 2008. 
  11. ^ a b "ECHR, Russian Federation: Breaches of Human Rights in Surveillance Legislation – Global Legal Monitor". www.loc.gov. 2016-03-02. Retrieved 2016-04-14. 
  12. ^ a b "CASE OF ROMAN ZAKHAROV v. RUSSIA (Application no. 47143/06)". HUDOC – European Court of Human Rights. Paragraph 175. Retrieved 2016-04-14. 

External linksEdit