Neha Patil (Editor)

SORM

Updated on
Edit
Like
Comment
Share on FacebookTweet on TwitterShare on LinkedInShare on Reddit

SORM (Russian: Система Оперативно-Розыскных Мероприятий, literally "System for Operative Investigative Activities") is the technical specification for lawful interception interfaces of telecommunications and telephone networks operating in Russia. The current form of the specification enables the targeted surveillance of both telephone and Internet communications. In broad sense the term "SORM" means any system for electronic surveillance. A Russian law passed in 1995 allowed FSB to access the surveillance data. Later access has been widened to other law enforcement agencies.

Contents

SORM-1

SORM-1 system has been established in 1996 to monitor telephone communications.

SORM-2

In July 1998 the system was replaced by SORM‑2 to allow monitoring of the internet, in addition to telephone communications. Under SORM‑2, Russian Internet service providers (ISPs) must install a special device on their servers to allow the FSB to track all credit card transactions, e-mail messages and web use. The device must be installed at the ISP's expense. It has been estimated to cost $10,000-$30,000. Other reports note that some ISPs have had to install direct communications lines to the FSB and that costs for implementing the required changes were in excess of $100,000.

On July 25, 2000, Russia's Minister of Information Technology and Communications Leonid Reiman issued the order No 130 "Concerning the introduction of technical means ensuring investigative activity (SORM) in phone, mobile and wireless communication and radio paging networks" stating that the FSB was no longer required to provide telecommunications and Internet companies documentation on targets of interest prior to accessing information.

In 2014 SORM-2 usage was extended to monitoring of social networks, chats and forums, requiring their operators to install SORM probes in their networks.

SORM-3

A ministerial order from the Russian Ministry of Communications from 16 April 2014 introduced requirements for the new wiretapping system SORM-3. Telecommunications operators were required to install compliant equipment by 31 March 2015.

According to regulations of Russian Ministry of Communications SORM-3 equipment supports the following selectors for targeted surveillance:

  1. Single IPv4 or IPv6 address
  2. IPv4 or IPv6 networks identified with address mask
  3. User ID within telecom operator's system, supporting "*" and "?" as globbing symbols (wildcards)
  4. e-mail address, if targeted user connects via POP3, SMTP or IMAP4; connections protected with cryptography are specifically excluded
  5. e-mail address, if targeted user connects to a webmail system from a predefined list of services: mail.ru; yandex.ru; rambler.ru; gmail.com; yahoo.com; apport.ru; rupochta.ru; hotbox.ru; again, connections protected with cryptography are specifically excluded
  6. User's phone number
  7. IMSI
  8. IMEI
  9. MAC address of user's equipment
  10. ICQ UIN

SORM architecture and deployment

In most cases SORM is deployed using port mirroring. Some mobile networks use deep packet inspection to filter traffic. A device named Omega has been recommended by the FSB.

Due to the higher bandwidth usage within providers' networks (compared to external connectivity) many providers deploy SORM only at uplinks. In some cases trying to reduce their costs smaller providers would not implement SORM in their networks but instead would buy SORM-as-a-service from their upstream provider, which then deploys SORM installation on a specific downlink. Such deployment limits the amount of traffic seen by SORM, i.e. the internal traffic may not be captured by the equipment.

SORM also enables the use of mobile control points, a laptop that can be plugged directly into communication hubs and immediately intercept and record the operator's traffic.

Roskomnadzor, a federal executive body responsible for media control, reported that several local ISPs were fined by the government after they failed to install FSB-recommended SORM devices.

Access by government agencies

On January 5, 2000, during his first week in office, president Vladimir Putin amended the law to allow seven other federal security agencies (next to the FSB) access to evidence gathered via SORM. The newly endowed agencies included:

  • Russia's tax police
  • Russian Police
  • Federal Protective Service
  • Border patrol and customs
  • Ministry of Internal Affairs
  • Kremlin Regiment
  • Presidential Security Service
  • Parliamentary security services
  • Warrant and notification regulations

    The acquisition of communications by entitled security services in general requires a court warrant, but at the same time they are allowed to start wiretapping before obtaining such warrant. The warrant is also only required for communications content, but not metadata (communicating parties, time, location etc.), which may be obtained without the warrant.

    In cases where an FSB operative is required to get an eavesdropping warrant, he is under no obligation to show it to anyone. Telecom providers have no right to demand that the FSB provide a warrant, and are denied access to the surveillance boxes. The security service calls on the special controller at the FSB headquarters that is connected by a protected cable directly to the SORM device installed on the ISP network.

    Zakharov v. Russia

    In December 2015, The European Court of Human Rights ruled on a case on the legality of Russian SORM legislation. In a unanimous Grand Chamber decision, the Court ruled that Russian legal provisions "do not provide for adequate and effective guarantees against arbitrariness and the risk of abuse which is inherent in any system of secret surveillance, and which is particularly high in a system where the secret services and the police have direct access, by technical means, to all mobile telephone communications." It ruled that therefore, the legislation violated Article 8 of the European Convention on Human Rights.

    References

    SORM Wikipedia