Northwest Indiana Discussion

Northwest Indiana's Leading Discussion Forum
It is currently Thu Mar 28, 2024 4:44 am

All times are UTC - 6 hours




Post new topic Reply to topic  [ 3 posts ] 
Author Message
 Post subject: Computer Privacy & Security
PostPosted: Sun Dec 03, 2006 5:44 pm 
Offline
Member
User avatar

Joined: Sat Feb 26, 2005 3:34 pm
Posts: 41
Location: NWI Board Moderator
There has been much discussion recently about computer security & privacy so I thought I would start a thread on the topic.


Top
 Profile  
 
 Post subject: Carnivore
PostPosted: Sun Dec 03, 2006 5:45 pm 
Offline
Member
User avatar

Joined: Sat Feb 26, 2005 3:34 pm
Posts: 41
Location: NWI Board Moderator
FBI's Carnivore System:

Carnivore is a name given to a system implemented by the Federal Bureau of Investigation that is analogous to wiretapping except in this case, e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that could monitor all of a target user's Internet traffic. It is a form of policeware. U.S. government officials will confirm or deny little about the physical or logical workings of Carnivore, but there are some basic facts that are generally agreed upon.

In order to be affected, a computer must be temporarily connected to a computer physically installed at an Internet service provider (ISP) or other location where it can "sniff" traffic on a LAN segment to look for email messages in transit. The technology itself is not highly advanced — using a standard packet sniffer and some fairly straightforward filtering (such as a Perl script), one could easily duplicate this functionality. Getting the cooperation of the ISPs or the owner of the LAN onto which Carnivore is to be placed can either be voluntary, illegal, or by court order; however, once a system is in place it is allegedly not allowed to simply capture every email that passes through the system — by existing U.S. law, publicly acknowledged USG personnel are required to get a warrant or court order naming specific people or email addresses that may be monitored. When an email passes through that matches the filtering criteria mandated by the warrant, the message is logged along with information on the date, time, origin and destination. This logging is most likely relayed in real time to the FBI but the details are not currently known. All other traffic would presumably be dropped without logging or capture.

There is much speculation and concern regarding the implementation, usage, and possible abuses of Carnivore. Free speech advocates and others interested in civil rights are concerned over the potential for misuse and infringements on individual's right to privacy.

Assistant FBI Director Donald Kerr has been quoted as saying:

The Carnivore device works much like commercial "sniffers" and other network diagnostic tools used by ISPs every day, except that it provides the FBI with a unique ability to distinguish between communications which may be lawfully intercepted and those which may not. For example, if a court order provides for the lawful interception of one type of communication (e.g., e-mail), but excludes all other communications (e.g., online shopping) the Carnivore tool can be configured to intercept only those e-mails being transmitted either to or from the named subject. ... [it] is a very specialized network analyzer or "sniffer" which runs as an application program on a normal personal computer under the Microsoft Windows operating system. It works by "sniffing" the proper portions of network packets and copying and storing only those packets which match a finely defined filter set programmed in conformity with the court order. This filter set can be extremely complex, and this provides the FBI with an ability to collect transmissions which comply with pen register court orders, trap & trace court orders, Title III interception orders, etc.... ...It is important to distinguish now what is meant by "sniffing." The problem of discriminating between users' messages on the Internet is a complex one. However, this is exactly what Carnivore does. It does NOT search through the contents of every message and collect those that contain certain key words like "bomb" or "drugs." It selects messages based on criteria expressly set out in the court order, for example, messages transmitted to or from a particular account or to or from a particular user.cryptome.org

The software grew from an earlier FBI project called Omnivore. Omnivore began in February 1997, and was then rebranded. After prolonged negative coverage in the press, the FBI changed the name of its system from "Carnivore" to the more benign-sounding "DCS1000." DCS is reported to stand for "Digital Collection System"; the system has the same functions as before. The three separate packages Carnivore, Packeteer and CoolMiner, are referred to as the DragonWare Suite.

It has been reported, [1] as of the middle of January 2005, that the FBI has essentially abandoned the use of Carnivore in 2001, in favor of commercially available software.

Source: wikipedia.org


Top
 Profile  
 
 Post subject:
PostPosted: Sun Dec 03, 2006 5:48 pm 
Offline
Member
User avatar

Joined: Sat Feb 26, 2005 3:34 pm
Posts: 41
Location: NWI Board Moderator
The post entitled "Kevin Mitnick's Security Advice" in this discussion category is also excellent advice on protecting yourselfs from hackers. Kevin Mitnick was a very famous hacker that after spending time in jail is now a computer security consultant.


Top
 Profile  
 
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 3 posts ] 

All times are UTC - 6 hours


Who is online

Users browsing this forum: No registered users and 2 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
cron
Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group