Keyword: computersecurityin
-
AEP on ECHELON"GCHQ faces inquiry over US 'spying' on Europe" [theirs] THE European Parliament voted yesterday to open an inquiry into alleged electronic espionage against the European Union by Britain and the United States - warning British intelligence officials that they could be called to submit evidence. A 25-strong committee will start an eight-month investigation in September into claims that the Anglo-Saxon powers were eavesdropping on European targets through a secret network known as Echelon. A European Parliament report said the US was systematically intercepting the telephone calls, faxes, telexes and e-mails of European firms - with the help of ...
-
Summary of Interception Capibilities 2000 Eschelon-Comint 1. Communications intelligence (Comint) involving the covert interception of foreign communications has been practised by almost every advanced nation since international telecommunications became available. Comint is a large-scale industrial activity providing consumers with intelligence on diplomatic, economic and scientific developments. The capabilities of and constraints on Comint activity may usefully be considered in the framework of the "intelligence cycle" (section 1). 2. Globally, about 15-20 billion Euro is expended annually on Comint and related activities. The largest component of this expenditure is incurred by the major English-speaking nations of the UKUSA alliance.(1) This report ...
-
Some fear snoops target e-mail, calls Is the government listening in on your phone calls? Reading your e-mail for words like "plutonium," "Clinton" or "terrorism"? Rep. Bob Barr, R.-Ga., a former CIA analyst, worries it might be. The European Parliament is concerned, too. So is a small group of computer users who call themselves "hacktivists." They're so convinced we're all being spied on that Thursday they're planning what may be the first mass protest using electronic mail as a weapon. Their target? A top-secret global surveillance system that sounds more like something out of "The X-Files" than a real computer ...
-
US Rep threatens FBI budget over Carnivore By Thomas C Greene in WashingtonThe Register (London) Posted: 15/06/2001 at 20:16 GMT US Representative and House Majority Leader Richard Armey (Republican, Texas) has steadily denounced the FBI's packet-sniffing apparatus known as Carnivore since it was first unveiled by a proud Reno DoJ a year ago. But now, bolstered by a recent US Supreme Court decision which affirms in no uncertain terms the right of privacy in the home, Armey is playing hardball, making it clear that he's prepared to use the Congressional grip on funds allocated to the Federal Bureaucracy against the ...
-
Ever since the FBI confirmed the existence of their Internet wiretapping device -- a device which they named Carnivore -- cyberprivacy activists have been up in arms. Carnivore promised to be their worst nightmare: a technology that could track and record every email sent, every Web page browsed, every chat room visited. Today, those fears are more likely to come true than ever before. The passage of anti-terrorism laws in the wake of Sept. 11, and the extended powers of the FBI, CIA and police agencies everywhere, make it likely that Carnivore will see more use in the near future. ...
-
Draft Report: Independent Technical Review of the Carnivore System
-
WASHINGTON (Reuters) - The U.S. House of Representatives passed a measure on Monday that would require the FBI (news - web sites) to report how it uses the controversial e-mail wiretap system formerly known as Carnivore.Although the bill places no restrictions on how the FBI could use its monitoring system, now known as DCS 1000, it would require the federal law-enforcement agency to provide a detailed report every year on how it was used.In addition to basic information such as who, what, when, where and why the system was used, the FBI would have to reveal which officials authorized its ...
-
Last summer we reported on a new surveillance system operated by the Federal Bureau of Investigation. The aptly named system called "Carnivore" is placed at the Internet Service Provider level and monitors online communications looking for criminal activity. While the FBI claims to be looking solely for criminals, "Carnivore" allows law enforcement to view much more than what criminals are up to.. Instead of operating according to traditional wiretap standards where the law enforcement officials obtain a warrant to tap a suspect´s telephone line, Carnivore only requires a court order, to in effect, tap an Internet user´s account for suspected ...
-
UNTAPPED SOURCE? FBI officials were shocked Thursday to hear Attorney General Reno didn't learn about their e-mail wiretapping system Carnivore until this week. The FBI's cyber-technology section briefed several Reno aides and top Justice Department officials more than a year ago, before the program began.
-
FBI's E-Mail Surveillance Getting Boost Policy: Justice officials likely to call for continuing 'Carnivore,' with privacy protections added. By ERIC LICHTBLAU, Times Staff Writer WASHINGTON--Senior Justice Department officials are recommending that the FBI be allowed to continue using a controversial e-mail snooping tool against suspected criminals-with some new safeguards aimed at answering privacy concerns, law enforcement sources said Wednesday. Atty. Gen. John Ashcroft met privately with FBI Director Louis J. Freeh on Wednesday for a briefing on the "Carnivore" surveillance program, and he is expected to announce a decision within the next few weeks on a thorny issue that pits ...
-
Has Ray Ozzie's latest offering rendered Carnivore obsolete? From today's NYT: One of the first consumer-oriented software programs to take full advantage of the Clinton administration's decision to drop national security restrictions on encryption technology, Mr. Ozzie's program will permit any group of users to create a secure and private channel beyond the reach of government monitoring like the F.B.I.'s Carnivore system. Check out the full story by clicking here. Check out Groove by clicking here.
-
Carnivore review now online, finds 'risks' Thursday, 14 December 2000 15:47 (ET) Carnivore review now online, finds 'risks' By MICHAEL KIRKLAND, UPI Legal Affairs Correspondent WASHINGTON, Dec. 14 (UPI) -- The final report on the Federal Bureau of Investigation (FBI) Carnivore e-mail intercept system, conducted by an independent technical reviewer, finds both significant "risks" and strengths in the controversial program, but appears to do little to stem criticism of the system from civil liberties advocates. The Dec. 8 report by the IIT Research Institute and the Illinois Institute of Technology, and the Chicago-Kent College of Law, became available online ...
-
The move comes as an effort to soften the image of the FBI's online spy tool. The controversial Internet surveillance tool known as Carnivore has been renamed DCS1000, a name devoid of any negative associations, the Federal Bureau of Investigation said on Tuesday. "With upgrades come new names," said Paul Bresson, an FBI spokesman. The old name of a flesh-eating predator had conjured up "unfortunate" images for many people, he added. The system in question is specialized software installed on an Internet service provider's network under federal wiretap authority. Used in criminal and national security cases, it is capable of ...
-
<p>Expect the FBI to expand its Internet wiretapping program, says a source familiar with the plan.</p>
<p>Stewart Baker, a partner with law firm Steptoe & Johnson, is a former general counsel to the National Security Agency. He says the FBI has spent the last two years developing a new surveillance architecture that would concentrate Internet traffic in several key locations where all packets, not just e-mail, could be wiretapped. It is now planning to begin implementing this architecture using the powers it has under existing wiretapping laws.</p>
-
I offer this as Information only, without any personal assurance of it's accuracy, however, the source is a reliable and knowledgeable insider, that resides within the Box. My advice is to accept it cautiously, but seriously! Carnivore FOIA Documents FBI's "Carnivore Splash Screen" First release of Carnivore FOIA Documents (10/02/00). See the press release for more details. Evolution of Carnivore Dragon Net - Voice Over IP Omnivore Capabilities Omnivore Project Closeout Omnivore Design Omnivore Logon Window Omnivore Review Omnivore Source Code Phiple Troenix (transition from Omnivore to Carnivore) Carnivore Purpose Carnivore Review Carnivore Testing These documents have been released ...
-
Preserve Free Speech on the Internet, and Everywhere Else! **Defeat H. R. 380, the Shays-Meehan Campaign Reform Act of 2001** Congress shall make no law … abridging the freedom of speech. — First Amendment, the Constitution The times, places and manner of holding elections, for Senators and Representatives, shall be prescribed in each State by the legislature thereof, but the Congress may at any time by law make or alter such regulations.... The Congress may determine the time of choosing the electors [for President], and the day on which they shall give their votes.... — Art. I, Sect. 4 & ...
-
If a new software research project proves successful, Web surfers will be able to send secure e-mail and instant messages that are not only automatically encrypted, but are further hidden from prying eyes by a stream of fake data. A research team led by Nikola Bobic, a part-time professor at Ottawa University, aims to create a virtual network on the Internet called "Cryptobox", which would be similar to peer-to-peer systems like Gnutella. Cryptobox members would be able to communicate anonymously with one another, if they chose, without bothering with the complicated and time-consuming steps today's encryption technology entails. Bobic said ...
-
Call it the Curse of Carnivore. It was bad enough when word leaked out this summer that the FBI's electronic eavesdropping system went by the unfortunate, if eerily accurate, name of Carnivore. The Feds took another blow when researchers at MIT and other prestigious institutions refused to undertake a review, likening the probe to a public relations whitewash. Now it turns out that an embarrassing oversight by the Justice Department has revealed confidential information about the team of researchers hired to conduct the review. On Tuesday, the Justice Department placed the 51-page PDF file online, with project information such ...
-
Mr. Chairman and Members of the Subcommittee, thank you for allowing me this opportunity to testify about the law enforcement tool "Carnivore" and the Fourth Amendment. On April 6, 2000, I had the privilege of testifying before you during a hearing on Internet privacy and the Fourth Amendment; I am pleased to continue to participate in the discussion today about "Carnivore" and its role in protecting individual privacy on the Internet from unwarranted governmental intrusion, and about the critical role the Department plays to ensure that the Internet is a safe and secure place. Privacy and Public Safety It ...
-
The FBI has released a batch of documents about its Carnivore e-mail surveillance system, but the privacy organization that sued for the information said vital details were left out.The Electronic Privacy Information Center (EPIC), which filed a Freedom of Information Act lawsuit in July, said it received 565 pages Monday, but 400 of them were censored — some so heavily that only page numbers were left.EPIC also said the FBI explained that nearly 200 more pages had been processed but withheld from release because they contain the source code to the Carnivore system. Privacy advocates consider the source code, the ...
|
|
|