Posted on 07/02/2013 12:40:47 PM PDT by drewh
I’m more of a ‘whose ox got gored’ school of forensic thought.
So far, RATS and Statists are shrieking the most.
Could be, but I'm pretty well-informed and had no idea the extent to which the government is watching us till Snowden made his revelations.
I have no idea how those two clauses are related.
Really? Your informed?
Well, you didn’t know about this and I did. I cataloged a good much of it in my head over the years as I am in telecom and enjoy the history of it as well, am impacted by the various laws our Congress passes.
BTW, my comment was only slightly sarcastic and in no one way should you take it as a slight.
More tongue in cheek.
Have fun:
http://www.freerepublic.com/focus/news/3032526/posts
I have no idea how those two clauses are related.
Good! You're getting closer to the point. You see, 1% of the the beliefs and/or actions of one group may be consistent with our own but the other 99% may put us all in harm's way.
We should never be willing to throw national security out because it happens to be sharing the same bath water as Obama because as you said, neither are related.
Could be, but I'm pretty well-informed and had no idea the extent to which the government is watching us till Snowden made his revelations
A lot has been written about space aliens being held at area 51 but no government official ever confirmed it.
Snowden confirmed it. There's a difference between hearing it on Alex Jones or Coast To Coast and having someone in a position of such as Snowden confirm it.
post 66 was also meant for Vendome
Uhn huh. Yeah the whole Alex Jones this g doesn’t fly with me.
We already knew they were doing this.
The last program was Carnivore. I hadn’t recalled until Snowjob that it was cancelled but, assumed it wasn’t or its evil offspring had cloned out of its petri dish and the intent of the government just kept. Apace, as it has for some 80 years.
Therebhave court case after court case addressing their over reach but, FISA made more powerful due to PA and PA II we understood they were doing and I k ow they have issued warrants for “Whole Pipe”access for years now.
Why would they change?
Why would they suddenly decide their CALEA “Partnership” with equipment manufacturers and service providers was now all of a sudden afoot? When did I miss that announcement?
Well, I didn’t and would have heard about it and thought “M K. So they didn’t jettison PA&PA II nor FISA so immuh gonna call BS”
So lacking information they had decided not Whole Pipe their search warrants they would have to be doing it still.
I don’t give rip if he revealed a name and the needGv. Toy is called PRISM. The fact is people in my industry know they do this and that Carnivore would one day be replaced with a more powerful system and as storage continues to plummet in price while becoming ever more dense the government was going to find a way to store ever more information in its citizens.
That’s what goverments do.
What should scare you is the unholy and in my view, unconstitutional relationship your private data has as regards service providers. And governments acess to it.
It’s one thing for CVS to have my information which I willingly give them. It’s quite another for my government to have access to my private conversation, written or oral, and witness the power the IRS has wielded in the last few years.
All you got to be is on the wring side of like minded psychophants and your private life can be passed around like a bottle Thunderbird to a bunch of alcoholics.
Eventually there’s gonna be a bad accident.
There, fixed it for you.
To safeguard the privacy of innocent persons, the interception of wire or oral communications where none of the parties to the communication has consented to the interception should be allowed only when authorized by a court of competent jurisdiction and should remain under the control and supervision of the authorizing court.
Nothing contained in this chapter or Section 605 of the Communications Act of 1934 shall limit the constitutional power of the President to take such measures as he deems necessary to protect the Nation against actual or potential attack or other hostile acts of a foreign power, to obtain foreign intelligence information deemed essential to the security of the United States, or to protect national security information against foreign intelligence activities. Nor shall anything contained in this chapter be deemed to limit the constitutional power of the President to take such measures as he deems necessary to protect the United States against the overthrow of the Government by force or other unlawful means, or against any other clear and present danger to the structure or existence of the Government.
Upon an application made under section 3122 of this title, the court shall enter an ex parte order authorizing the installation and use of a pen register or a trap and trace device within the jurisdiction of the court if the court finds that the attorney for the Government or the State law enforcement or investigative officer has certified to the court that the information likely to be obtained by such installation and use is relevant to an ongoing criminal investigation.
A telecommunications carrier shall ensure that its equipment, facilities, or services are capable of expeditiously isolating and enabling the government, pursuant to a court order or other lawful authorization, to intercept, to the exclusion of other communications, all wire and electronic communications carried by the carrier within a service area to or from equipment [and] to access call-identifying information.
Currently, all Internet wiretaps using the Carnivore system begin with an FBI investigation. As with any wiretap, the FBI requires its investigators to ask for permission. According to the Illinois report, the process the FBI follows to obtain a wiretap is as follows:
--For a full mode wiretap only
· A case agent in an investigation determines a wiretap may be needed.
· The agent contacts the FBIs Chief Division Counsel (CDC), familiar with statutory requirements.
· The agent contacts a Technically Trained Agent (TTA); an experienced Special Agent with advanced training.
· After consulting with the CDC, the TTA, and with field office supervisors, the case agent will determine if the wiretap is required.
--For a pen register wiretap only
· The case agent requests pen-register surveillance in writing, with a justification for necessity.
--Then, for either full mode or pen mode
· FBI shows a judge the relevance of the information sought to the investigation.
· FBI shows a judge why traditional enforcement methods are insufficient.
· FBI must submit request with information such as target internet service provider (ISP), e-mail address, etc.
· This process may take up to 4-6 months.
At this point, two court orders are issued; one that authorizes the intercept, and a second, which directs the ISP to cooperate with the investigation. After receiving a court order, the FBI begins conversations with the target ISP. Carnivore is deployed when:
· The ISP cannot narrow sufficiently the information retrieved to comply with the court order.
· The ISP cannot receive sufficient information.
· The FBI does not want to disclose information to the ISP, as in a sensitive national security investigation.
Let's get on a big boat with a huge net and go fishing!
If it is deemed necessary, a Carnivore computer is taken from FBI headquarters and brought to the ISP. The TTA takes responsibility for the installation of the system, for configuration of the system based on the court order, and for securing the work area at the ISP. After this, the TTAs work is done; the TTA does not receive or complete minimization on any of the information collected by Carnivore.
At this point, the case agent can retrieve the intercepted information remotely as it is received by Carnivore, or he can await the information on the Jaz disk from the computer.
The hardware components of the Carnivore system are:
1) a one-way tap into an Ethernet data stream;
2) a general purpose computer to filter and collect data;
3) one or more additional general purpose computers to control the collection and examine the data;
4) a telephone link to connect the additional computer(s) to the collection computer.
Figure 2: Carnivore Hardware Architecture
One Way Tap
The connection from the filtering/collection computer to the ISP's network is a third-party one-way tap. The device, called the Century Tap, is produced by Shomiti Systems. The one-way tap is placed between a link from a switch to a subnet, as illustrated in the figure above.
The configuration reported in the Illinois report only works for standard Ethernet. Although the tap is capable of being used with full-duplex Ethernet, the researchers at the IITRI have determined that the presence of collisions could cause packet loss, or even the capture of wrong packets. In full duplex mode, this problem is exacerbated by increased throughput.
Filtering/Collection Computer
The computer which resides at the ISP is a Pentium-class PC installed with a 2 GB Jaz Drive, a standard 10/100 Mbps Ethernet adapter, a modem, Windows NT, and the software package pcAnywhere, produced by Symantec. It connects to the one-way tap through its Ethernet adapter. It connects to an outside control/examination computer through a modem using a special telephone link. According to the Illinois report, the computer is installed without a monitor or keyboard.
Control/Examination Computer
Any computer may act as a control/examination computer, so long as it has installed on it: pcAnywhere, the DragonWare package including CoolMiner and Packeteer, a modem, and the proper keys and passwords to access the Windows NT administrator account, pcAnywhere, and the telephone link.
Telephone link
The filtering/collection computer communicates with the control/examination computer through a telephone line, which is installed especially for its use. The telephone line is protected by third-party devices from Computer Peripheral Systems, Inc; (CPSI) from their line of Challenger Security Products (CSP). The protection devices come in pairs; a Lock is a device attached to the phone line on the end of the filtering/collection computer, and a Key is another device attached to the phone line on the end of the many control/examination computer being used.
Figure 3: Carnivore Advanced Menu
"Carnivore software is a component of a software suite called DragonWare written by the FBI. The other components of DragonWare are Packeteer and CoolMiner, two additional programs that reconstruct e-mail and other Internet traffic from the collected packets." The software will be examined in two ways, first its functionality, and second its architecture.
Functionality
Carnivore's functionality can be broken up into 3 areas: Filtering, Output, and Analysis.
Filtering
The filtering system provided with the software is intended to take the large amounts of data passing through the tapped network stream and prevent the unwanted data from being stored. The software provides the user many different options for filtering and the combination of filters:
Fixed IP |
Can choose a range of IP addresses. |
Dynamic IP |
If not in fixed IP mode, one can choose to include packets from in either Radius or DHCP mode. |
Protocol Filtering |
One can choose to include packets from TCP, UDP, and/or ICMP in either Full mode, Pen mode, or none. |
Text Filtering |
One can include packets that contain arbitrary text. |
Port Filtering |
One can select particular ports to include (i.e. 25 (SMTP), 80 (HTTP), 110 (POP3)). |
E-mail address Filtering |
One can select to include packets that contain a particular e-mail address in the to or from fields of an e-mail. |
Output
The software produces three types of files when storing packets, files with extensions '.vor', '.output', and '.error'. The actual data collected from the network is saved in a .vor file. The '.output' file contains a human readable version of the settings used to collect the data in the corresponding '.vor' file. Finally, the '.error' file keeps track of any system messages that may have been generated during collection. The software does not prevent files from being stored on the local hard drive, but they are typically stored on the 2GB Jaz Drive attached to the system.
Analysis
The DragonWare package provides two programs to analyze the information stored in the '.vor' file produced by Carnivore.
Packeteer
This program takes the collection of IP packets in .vor files, reconstructs the TCP session, and creates a series of files that can be viewed with CoolMiner.
CoolMiner
This program can be set up to show only certain types of packets.
Architecture
The Carnivore software consists of four components: TapNDIS driver, TapAPI.dll, Carnivore.dll, and Carnivore.exe
TapNDIS (written in C) is a kernel-mode driver, which captures Ethernet packets as they are received, and applies some filtering. The source is divided into 13 files, 9 of which are borrowed intact or with only minor changes, from WinDis 32 sample programs. 2 others were generated by Microsoft Developer Studio. The remaining two files contain all the logic for driver-level filters and for writing data to a file. The IITRI assumes this to be the core of the Carnivore implementation.
TapAPI.dll (written in C++) provides the API for accessing the TapNDIS driver functionality from other applications.
Carnivore.dll (written in C++) provides functionality for controlling the intercept of raw data. This is where pen mode truncation occurs.
Did you understand any of that? I do but, this is my job.
All you really need to know is this part: "At this point, the case agent can retrieve the intercepted information remotely as it is received by Carnivore"
The FBI perform's its own minimization. That is, "control of the information is removed from a third-party source". The FBI and other agencies such as DOJ and DEA have no clients to protect. That means they have no legal or lawful reason to actually perform minimization, the 1st and 4th amendments be damned! Remember Reagan's sarcastic joke "I'm from the government. I'm here to help"??? You just have to trust they are of the highest morals and operate with pure and nuetral ethics.
Has there been any news of late that would give you a reason to trust them?
Well, you shouldn't as the FBI IITRI review of Carnivore states the statutory suppression remedy available for illegal interception of other communications in Title III is not extended to electronic communications the data gathered would not automatically be thrown out as evidence.
Wow?! you mean you could just keep the information and use it later whenever it suited you? Courts said "Yeah, they can do that".
What a waste of bandwidth. I was not referring to domestic spying. I was referring to telling all and telling how and who we spy on internationally.
You’re a waste of bandwidth consumed with self absorbed righteousness backed by a certainty of knowledge that isn’t just short but, wrong and never in doubt.
More direclty you’re a goal poster with a large paint bucket so you can constantly change the colors of the goal, making it unknown to the rest of but, with as the referee of your peculiar and self serving vanity
Of all you've written in this thread I still have no clue whether you support Snowden or are against him. Me, I support the exposing of our government spying on us (American people) I do not support, however, exposing the process of our government's intelligence gathering when it comes to China, Russia and all the others out there and telling them exactly how we do it.
Sorry, I do not support that.
I support Snowjob, here’s why:
WTF did he actually do? Uhm, he gave us the name of the new flavor of government overreach and the updated model, which does basically the same thing as the last model.
He so with a bit of panache’(fk the French) and at about the right time.
So called out PRISM but it’s rightfull name? WTF does anyone care?
Should the government be granted “Whole Pipe” access to anyone’s records and contents? You’re not doing anything wrong, so you have nothing to hide, right?
Well, what if you are communicting with friends, in private but, in much the same manner of tone used in open mouth to ear conversation?
I’d kill so and so! /s Now, we know you don’t mean that but, you are expressing an emotion of outrage. Doesn’t mean you’ll act on it and besides the comment was made among friends who understand you and the context.
No problemo.
Well, what if a government grabbazz sees this and says “Hmmm, I could make a nice shinny star appear right next to my name if I investigate and bust this fool. My bosses might reward me with a slightly better salary and definitely a leg on the ladder I so desperately want to ascend and I don’t care who it costs. I don’t know this fool”
So, said jack wagon decides to start perusing your communications, social boards, phone calls, emails, credit cards, you know; start building a profile on you.
Should he be allowed access to information that no one is allowed access to simply because he is from the government?
Well, uhm, Fk NO!
If my neighbor has no lawful right to any of that then no drip head government employee or contractor ought to have the right to any of it.
Snowden is right on this. Our allies and vile neighbors already new we were doing this and expect it. Heck, they’re doing it to.
But, domestic survellience that involves a sweeping up of huge swaths of private communication when you are trying to surveil some particular person is wrong.
Wrong, freaking wrong, wrong, wrong.
How do we know the IRS doesn’t share our information with others?
How do we know the various agencies don’t share our information others?
Well, we know they do and sometimes publicly such as releasing the tax return of certain groups or individuals to news organizations who are only too happy to act as government apparatchiks.
Trump reiterated this weekend on Meet the Press that he thought Snowden was a traitor who did terrible damage to the country.
I’m sticking with Cruz.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.