Keyword: computersecurityin
-
WASHINGTON -- Packed in a slim laptop computer, the Federal Bureau of Investigation's Internet surveillance system, Carnivore, looks downright docile. One of its creators calls it merely a "tool in a tool box" for tracking hackers and terrorists. Its name, the FBI admits, is unfortunate. It is too late to change the name -- but not too late, the FBI figures, to try to change the opinions of privacy advocates and lawmakers who have spoken harshly of the high-tech sniffer. So the agency has launched an intense, behind-the-scenes campaign to deflect congressional skepticism and convince wary Internet companies that Carnivore ...
-
No sooner had the Federal Bureau of Investigation snoops revealed that they were gnawing away at our privacy with a wiretapping system called "Carnivore" than feds began scurrying to escape the fallout. Among the first to respond, on Friday, the American Civil Liberties Union filed a Freedom of Information Act request for the technical information behind Carnivore, including the source code from its software. In particular, the ACLU's request seeks: 1.The computer system, software or device known as "Carnivore", which has been or is currently used by the FBI in connection with trap and trace and pen register orders served ...
-
Papers Contradict FBI on Carnivore By D. IAN HOPPER .c The Associated Press WASHINGTON (AP) - The FBI says its e-mail surveillance tool known as Carnivore is used only for narrow purposes, but recent tests show it could capture all communications that go through an Internet service, according to bureau documents. The documents also reveal the price of Carnivore's precursor, called Omnivore. A 1997 FBI memo states that the bureau requested more than $2.3 million to develop Omnivore. Privacy experts worried Friday about the breadth of Carnivore's capability and questioned why the FBI conducted such a test five months ago ...
-
WASHINGTON -- An eminent group of security experts has offered to undertake an independent review of the FBI's controversial Carnivore surveillance system. Attorney General Janet Reno said in early August that the Justice Department would commission a study of Carnivore from a major university, but she has not yet come to a final decision as to which institution she will recruit for this purpose. The ad-hoc association of 13 security experts, who have dubbed themselves the Open Carnivore group, includes individuals such as AT&T Research's Matt Blaze and Tom Perrine of the San Diego Supercomputer Center, both of whom testified ...
-
There is this moment toward the otherwise forgettable end of "Star Trek V: The Final Frontier" when this alien creature patterned after the Wizard of Oz has even Spock convinced that it is God with a capital "G." They are just about to fire-up the Enterprise and take "God" back to Earth when Kirk -- probably hoping to avoid the military protocol involved with having a deity on the bridge -- asks a pivotal question: Why would God need a starship? Couldn't God just blink and instantly be in Times Square looking up at the NASDAQ sign, wondering why they ...
-
When the FBI launched its latest crime-fighting project, known by the name Carnivore, a lot of people worried that this new system could be dangerous - not for crooks, but for innocent people. Carnivore is a computer-like box that captures email communications, and forces an Internet Service Provider to sift through its users emails. Critics say carnivore is a threat to privacy. One of those critics, Congressman Bob Barr of Georgia, is leading efforts on Capitol Hill to raise awareness about Carnivore. In an interview Bob Barr has said that Carnivore should be a concern to the American people because ...
-
"This PC could reliably capture and archive all unfiltered traffic to the internal hard drive…" FBI report on computer using Carnivore system Documents Show Surveillance System Has Wide Capacity But FBI Insists It Can’t Be Used For Unauthorized Snooping Justice Dept. Review Of The System Due Out Next Week FBI officials say Carnivore has been used in about 25 cases, most involving national security. (AP) The FBI's controversial e-mail surveillance tool, known as Carnivore, can retrieve all communications that go through an Internet service — far more than FBI officials have said it does — a recent test of ...
-
How powerful is Carnivore? New documents raise questions about FBI surveillance tool WASHINGTON, Nov. 17 — The FBI’s controversial e-mail surveillance tool, known as Carnivore, can retrieve all communications that go through an Internet service — far more than FBI officials have said it does — a recent test of its potential sweep found, according to bureau documents. An FBI official involved with the test stressed Friday that although Carnivore has the ability to grab a large quantity of e-mails and Web communications, current law and specific court orders restrict its use. Nevertheless, privacy experts said they are worried about ...
-
Chewing on Carnivore New anti-terrorism laws may give FBI unprecedented power to use its controversial email surveillance system. So exactly how does it work? By Jack Karp October 16, 2001 Just hours after the towers of the World Trade Center collapsed in lower Manhattan, FBI agents were already visiting the offices of ISPs, network providers, and email vendors around the country in a search for those who perpetrated the attacks. Convinced that at least some of the hijackers may have used the Internet and email to arrange the hijackings, agents began combing these companies' networks looking for clues. The ...
-
From THIS SITE ----http://www.howstuffworks.com/carnivore.htm How Carnivore Works by Jeff Tyson ››tell a friend about this article! › Introduction to How Carnivore Works › Carnivorous evolution › Packet Sniffing › How it works › Prey of the carnivore › Links You may have heard about Carnivore recently in the news. It is a controversial program developed by the U.S. Federal Bureau of Investigation (FBI) to give the agency access to the online/e-mail activities of suspected criminals. For many, it is eerily reminiscent of George Orwell's book "1984." What exactly is Carnivore? Where did it come from? How does it ...
-
Administrative Contact, Technical Contact, Billing Contact: MediaOne Abuse Department (MA868-ORG) abuse@MEDIAONE.NET MediaOne High Speed Data 9785 Maroon Circle Suite 420 Englewood, CO 80138 USA 800-871-6298 Fax- 303-792-4774Had some problems with my internet connection today. Couldn't finish loading simple web pages or sending e-mail. No big deal but I just got a fancy scanner and wanted to send very old photos (circa. 1910-1950) to relatives. Was a little impatient so I called my ISP (RoadRunner, now ATT Broadband) to see what was going on. The people I spoke to were friendly but not very knowleadgeable (to say the least). Told me ...
-
US secret agents work at Microsoft: French intelligence Source: AFP | Published: Saturday February 19, 7:44 AM PARIS, Feb 18 - A French intelligence report today accused US secret agents of working with computer giant Microsoft to develop software allowing Washington to spy on communications around the world. The report, drawn up by the Strategic Affairs Delegation (DAS), the intelligence arm of the French Defence Ministry, was quoted in today's edition of the news-letter Le Monde du Renseignement (Intelligence World). Written by a senior officer at the DAS, the report claims agents from the National Security Agency (NSA) helped install ...
-
<p>WASHINGTON -- The Department of Justice already is using its new anti-terrorism powers to monitor cable modem users without obtaining a judge's permission first.</p>
<p>A top Bush administration official lauded the controversial USA Patriot Act at a Senate hearing on Wednesday, saying that the new abilities have let police obtain information in investigations that was previously unavailable.</p>
-
A core objection to paranoid rants regarding the US National Security Agency (NSA) electronic eavesdropping apparatus called ECHELON is the simple observation that spooks trying to use it are literally buried in an avalanche of white noise from which it's quite difficult to extract anything pertinent. But now the US Central Intelligence Agency (CIA), no doubt with some assistance and guidance from NSA, is making strides towards cracking that little inconvenience. The CIA's Office of Advanced Information Technology is developing a number of data-mining enhancements to make life easy for those who would eavesdrop on electronic communications, Reuters reports. First ...
-
December 17, 2001 CIA expands its watchful eye to the US It will gather intelligence at home to curb terrorism. Critics see era of Big Trenchcoat. By Abraham McLaughlin | Staff writer of The Christian Science Monitor WASHINGTON - The Central Intelligence Agency is poised to get involved in domestic surveillance and investigations in ways that are unprecedented in its history. The CIA's intelligence gathering has long been kept as separate as possible from domestic law enforcement, which is bound by strict evidence-gathering rules and legal safeguards protecting the rights of those investigated. But as the nation girds itself ...
-
Friday November 09 08:13 PM EST Firewalls--as safe as you think?By Robert Lemos, ZDNet News Trojan horses and worms can easily dodge some popular PC firewalls, warns a security researcher. Your personal data could end up being sent to the Net. More resources from ZDNet: • Tech News on Your PDA • Land a Hot Tech Job • ZDNet Tech Update • Free Downloads • Online Classes • Most Popular Products • Web Surfer Power Tools • Free MP3 Music Resources • Software Quick Start Guides for Beginners Sign up for the free ZDNet News Dispatch: (CNet/ZDNet Privacy Policy) Consumers ...
-
Authorities release unclassified report on system used to crack mob computer By Associated Press, 10/11/2001 09:00 NEWARK, N.J. (AP) Federal authorities have released an unclassified summary of how they used a secret computer system to crack the computer code of a New Jersey mobster. The ''key-logger system,'' designed for sensitive national security investigations, allowed FBI agents to break an encryption code that Nicodemo Scarfo Jr., the son of imprisoned New Jersey mob boss Nicodemo ''Little Nicky'' Scarfo Sr., had allegedly used to protect gambling records. Federal authorities resisted revealing details of the system, saying it would ''jeopardize both ongoing and ...
-
Don't be fooled: DCS1000 still a 'Carnivore' at heart By Erich Luening Special to ZDNet February 9, 2001 11:08 AM PT The FBI has dressed its online wolf in sheep's clothing, changing the name of its controversial e-mail surveillance system, known to this point as Carnivore. Carnivore now goes by the less beastly moniker of DCS1000, drawn from the work it does as a "digital collection system." The investigative agency built the tool to monitor the Internet communications of suspects under its surveillance, but the system, housed on computers at Internet service providers, also can collect e-mail messages from people ...
-
Anti-virus software vendors said on Monday they don't want to create a loophole in their security products to let the FBI or other government agencies use a virus to eavesdrop on the computer communications of suspected criminals. Under a project code named "Magic Lantern," the U.S. Federal Bureau of Investigation is creating an e-mail-borne virus or Trojan horse that hides itself on the computer and captures all keystrokes made, including passwords that could be used to read encrypted mail, according to a report on MSNBC.com in November. Despite subsequent reports to the contrary, officials at Symantec Corp. (SYMC.O) and Network ...
-
SAN FRANCISCO (Reuters) - An FBI spokesman confirmed on Wednesday that the U.S. government is working on a controversial Internet spying technology, code-named "Magic Lantern", which could be used to eavesdrop on computer communications by suspected criminals. "It is a workbench project" that has not yet been deployed, said FBI spokesman Paul Bresson. "We can't discuss it because it's under development." The FBI has already acknowledged that it uses software that records keystrokes typed into a computer to obtain passwords that can be used to read encrypted e-mail and other documents as part of criminal investigations. Magic Lantern reportedly would ...
|
|
|