Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The New FBI
CBS News ^

Posted on 03/14/2002 3:43:16 PM PST by RCW2001

The New FBI
WASHINGTON, March 14, 2002


Fifteen minutes after British Airways Flight 229 left London's Heathrow Airport Wednesday and eight hours before it arrived in Baltimore, the FBI already knew the name, passport number, place of birth and 20 other tidbits of information about every man, woman and child aboard.

Even how long many planned to stay in the United States and where.

Before Sept. 11, that was rarely the case, reports CBS News Correspondent Jim Stewart. Before Sept. 11, the FBI focused almost exclusively on investigating crimes and terrorist incidents that had already occurred. Now the bureau's focus is on preventing terrorist incidents before they happen, and that means a change in the way it does business.

Take wiretaps, for example. A little-known court on the sixth floor of the Justice Department secretly hears all FBI terrorism wiretap requests. Bob Blitzer, former head of the bureau's anti-terrorism effort, thinks last year the bureau filed well over 1,000 requests - a new record.

"I think information is more important than evidence because information can lead to prevention," said Blitzer.

And the FBI has some new tools to get that information, as Mafia bookie Nicky Scarfo found out the hard way.

The FBI had fitted Scarfo's computer with a top-secret device that monitored what he typed as he typed it, exposing his entire bookmaking operation.

Privacy experts were stunned to learn the bureau even had such bugs.

"We've moved away from the era of alligator clips on the telephone wires to very sophisticated, high-end surveillance techniques that are classified and the details are kept from public view," said David Sobel, a privacy expert.

To understand what foreign suspects are saying on wiretaps, the bureau is hiring hundreds of translators.

And the same undercover teams of disguised FBI experts who took film of a Russian spy are now being used to watch and follow people tied to terrorist investigations.

The hardest part, lawmen acknowledge, is knowing who to follow in the first place. In January alone, 740,000 foreign nationals arrived in this country every single day.


TOPICS: Crime/Corruption; Extended News; Government
KEYWORDS: airseclist; computersecurityin; espionagelist; privacylist; techindex

1 posted on 03/14/2002 3:43:16 PM PST by RCW2001
[ Post Reply | Private Reply | View Replies]

To: RCW2001
From my experience those bubbleheaded law enforcement wanna-bees couldn't solve a case if the perps bit them on their arses.......
2 posted on 03/14/2002 3:47:35 PM PST by Fighting Irish
[ Post Reply | Private Reply | To 1 | View Replies]

To: RCW2001
oh, they forgot to mention another of "The New FBI's" favorite passtime, target practice on innocent teens in Maryland

The New FBI can kiss my #ss

3 posted on 03/14/2002 3:51:09 PM PST by Lloyd227
[ Post Reply | Private Reply | To 1 | View Replies]

To: RCW2001
OK, RCW2001, let's get one thing straight. I DO THE DAN RATHER UPDATES here in Freepland! Everyone knows it. I have alreay fully briefed my fellow Freepers on the FBI's hurry-up effort to get their crap together on the new war on terrorism. I don't know how to post an entire transcript on this site yet (and I think it usually turns readers off), but I still think that you are infringing on my informal copyright on my evening Dan Rather CBS News updates. See the "misc." section if you doubt me sir!
4 posted on 03/14/2002 3:51:22 PM PST by buzzcat
[ Post Reply | Private Reply | To 1 | View Replies]

To: RCW2001
"I think information is more important than evidence

Well, isn't that comforting?

5 posted on 03/14/2002 3:52:40 PM PST by riley1992
[ Post Reply | Private Reply | To 1 | View Replies]

To: *AirSec_list;*Espionage_list;*Privacy_list
Check the Bump List folders for articles related to and descriptions of the above topic(s) or for other topics of interest.
6 posted on 03/14/2002 3:53:39 PM PST by Free the USA
[ Post Reply | Private Reply | To 4 | View Replies]

To: RCW2001
"The FBI had fitted Scarfo's computer with a top-secret device"

Top secret as in:

Q. What is the KeyGhost?
KeyGhost™ installs even when computer is logged out, password protected, locked or switched off.

A. The KeyGhost is used to log all keystrokes on a computer. It is a tiny device that clips onto the keyboard cable. It installs in less than 12 seconds. Take a slideshow tour of how it all works.

Q. How do I install the KeyGhost?
A. Here are pictures of how to install a KeyGhost device.

Q. Can I record the keystrokes on one computer and retrieve them on another computer?
A. Yes, the KeyGhost device can be unplugged and moved around without any trouble. Record the keystrokes on one machine, and retrieve them on another.

Q. Can I unplug the device without losing the keystrokes?
A. Yes, the KeyGhost device uses a permanent form of memory which doesn't need batteries.

Q. What happens if the keystroke log fills up?
A. The most recent keystrokes are preserved, and the oldest ones are lost. For example, the KeyGhost Pro stores 500,000 keystrokes. When the log is full, it will overwrite the oldest ones gradually with the newest ones. In this manner, it stores the most recent 500,000 keystrokes.

Q. No software to install at all? Just plug it in? But how do I retrieve the keystrokes?
A. Its very simple and quick to retrieve keystrokes.

Q. Why do I want a KeyGhost device when I can use a key logger program available off the internet?
A. There are several reasons why a software program may not always be the best option. If the target computer is password protected, it will be almost impossible to install a software keylogger. The KeyGhost device installs in a few seconds, onto any desktop PC with any operating system. The KeyGhost device can be installed when the computer is switched off. It will also pick up passwords used to access the BIOS before boot up, unlike software programs.

Q. Can the KeyGhost device be detected by special software?
A. No, installation of a KeyGhost device does not affect the computers operation in any way. A software program could not detect the recording of keystrokes.

Q. What if someone else types in the backdoor password by mistake?
A. Good question. The password can be between 8-12 characters. It is suggested that common words like 'the' are not used for the password, for obvious reasons. Choose a password with no meaning such as 'kghostlogger' and everything should be fine.

Q. How do I change the password?
A. After bringing up the configuration menu, there is an option to change the password. The retrieve keystroke example shows how this is possible.

Q. There are unusual characters in the log
A. This can occur if you are using another language. Unless the local is set to 'english' the angle brackets and other formatting characters in the log may come out incorrectly.

Q. How long can the backdoor password be?
A. Up to 12 characters, made up of letters only

Q. That figure of 2,000,000 keystrokes looks like a typo. Explain.
A. Yes, it can store this many characters in its memory. (See KeyGhost II Pro SE).

Q. Does the KeyGhost work on Laptops?
A. Because of the many different brands, and power specifications of laptop keyboard and docking ports, it is quite hard to predict if the KeyGhost will work favourably with your laptop. In order for it to function you will need to use an external keyboard in the back of the laptop's PS/2 port. Any keys typed on the laptop keyboard will not be recorded, only those typed on the external keyboard will be recorded. Some laptops do not accept keys typed at high speed on an external keyboard, so the Turbo Download Adapter is recommended for use with the laptop, otherwise the 'Keystroke Ghosting' may have to be set at a slower speed to retrieve the log.

Q. How to fix Microsoft Word 2000 and "double numbering" in the menu
A. Go into Tools .. Autocorrect .. Autoformat as you type .. and switch off 'automatic numbered lists'.

7 posted on 03/14/2002 4:22:39 PM PST by boris
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #8 Removed by Moderator

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson