-Caveat Lector-

http://dailynews.yahoo.com/h/ct/20011001/cr/every_link_you_take
_every_click_you_make_the_fbi_could_be_watching_you_1.html





Every link you take, every click you make:
The FBI could be watching you


Monday October 01 04:27 PM EDT
By Matt Bean
Court TV


Warning: The government could be watching your computer-right now.
Depending on your Internet service provider, a special piece of
technology called Carnivore could, in fact, be recording the URL of
each Web site you visit (including this one) and even the terms you
enter into popular search engines.

  The laws governing when the FBI can use their controversial Internet
monitoring system are designed to make sure that criminals, not
law-abiding citizens, are targeted. But with the fight against
terrorism moving into the digital realm, proposed legislation called
for by President Bush could make the technology even easier to use and,
say rights groups, even easier to abuse.

  Though the anti-terrorism proposals may be aimed at suspected
saboteurs now, they could act like a Trojan horse for rights abuses in
the future, says Jay Stanley, the ACLU's privacy public education
coordinator.

  "Americans have to be careful here," said Stanley. "That's the way
rights are lost. We have to be sure that it's not just a foot in the
door to a much broader expansion of powers."

  New laws passed the week of the attack and sponsored by Orrin
Hatch (R-Utah) and Dianne Feinstein (D-Calif.) have already expanded
Carnivore's reach, giving U.S. and state attorneys the power to order
installation of Carnivore on a temporary, limited basis.

  The current proposed legislation Congress is now considering would
give the FBI even more power to install and use the system.


How It Works

  The Carnivore system is part of a class of electronic surveillance
devices called "packet sniffers." Packet sniffers, which are also used
by companies to monitor employee Internet use, filter all of the
internet traffic that passes through a network, looking for key phrases
in e-mails, for the visitation of earmarked URLs, and more.

  To monitor a user's traffic, agents must connect a box containing the
system to the network, or internet service provider, that individual
uses.  Say, for example, that a mob boss was suspected of making drug
deals through his Earthlink internet account. If the FBI did not
already have a Carnivore system installed there, the agency would
obtain a court order to install one, and then an agent would head out
to the Earthlink offices to install a box. The box would filter the
communications passing through Earthlink's network, paying special
attention to those coming from, and heading to, the mob boss's account.
Later, an agent would return to Earthlink to retrieve a hard drive from
the box, which could be scanned back at the FBI offices.

  The FBI has been careful not to explain everything about how
Carnivore works, but FOIA documents indicate that the system is capable
of doing a lot more than just sifting for highlighted key words and web
addresses -- it is capable of capturing and archiving not only the
specific communications it's targeted at, but "all unfiltered traffic"
on the network as well.

  This voracious appetite for data may be one reason the system, which
the FBI renamed last year as DCS1000, has never been able to shake its
prehistoric moniker.


Trap and Trace Gets an Update

  The loosening of restriction on Carnivore are only part of the
Anti-Terrorism Act (ATA), a set of proposals which would grant law
enforcement new powers in everything from immigration law to collecting
the DNA of suspected terrorists.

  And though a current version of the proposal does not specifically
mention the system (neither did the law passed the week of the attacks)
computer experts agree that it would grant the FBI more leeway to
perform surveillance activities that would require the use of
Carnivore.

  The crucial part of the current anti-terrorism laws that has
electronic privacy groups worried is a clause that would allow FBI
agents to use Carnivore to expand something called the "trap and trace"
authority of the government.

  "Trap and trace" is a term that once referred to obtaining phone
records from an individual under surveillance, detailing who called
whom and when.  That information was considered less serious than
recording the content of a phone call, and therefore two levels of
warrants were established.

  To do a "trap and trace," agents merely needed to assert to a judge
that the warrant would be "relevant to an ongoing criminal
investigation." To do a wiretap, however, agents would have to get a
Title III wiretap warrant by convincing a judge that the surveillance
would be likely to turn up dirt from, say a suspected terrorist.

  The crucial difference, says Stanley, is that a "trap and trace"
warrant is much easier to obtain. "You don't even need to be suspected
of a crime for that," he says.

  Fast forward to the digital age: The proposed anti-terrorism laws
would extend the definition of trap and trace to include the tracking
of web sites a user visits. This is where Carnivore comes in. Under the
proposal, agents could use Carnivore to track the web surfing of anyone
they wanted to, Stanley says, without even having to convince a judge
of the need to do so.

  This ignores the fundamental difference between phone conversations
and web surfing, Stanley says. "A list of the URLs that you are
visiting is more than that-it's really a list of the URLs you're
reading. That tells them what you're thinking about, what you're
interested in, and who you are as a person."


Caution in Washington, D.C.

  Though anti-terrorist sentiment still runs high in Washington, D.C.,
some politicians have proceeded with caution into debates over the
proposed legislation.

  In committee hearings over the bill that was passed the week of the
attacks, Senator Patrick Leahy (D-Vermont), chairman of the Senate
judiciary committee, urged lawmakers not to lose sight of civil
liberties in their zeal to catch terrorists.

  That bill passed anyway, but offering the civil liberties perspective
is still one of his primary goals with the current proposal.

  Said a spokesperson with Leahy's office, the Senator still "wants to
do what the administration has called for in ways that will protect
Americans' civil liberties."

  Leahy has even drafted an alternative proposal to Attorney General
John Ashcroft's that he hopes will demonstrate how terrorism in the
digital age can be fought without hampering individual rights.

  With President Bush and Ashcroft backing more wide-ranging forms of
the proposal than his, however, Leahy is facing an uphill battle.

  Ashcroft told Leahy's committee this Tuesday "we are today sending
our troops into the modern field of battle with antique weapons. Technology
has dramatically outpaced our statutes. Law enforcement tools created
decades ago were crafted for rotary telephones-not email, the internet,
mobile communications and voice mail."


Carnivore: All Bark and No Bite?

  In the end, Carnivore might not even be capable of snaring its
intended targets, says Shari Steele, executive director of the
Electronic Frontier Foundation. The problem, Steele says, is that "if
someone is encrypting a message, it would be very difficult for
[agents] to break it."

  Encryption allows internet users to encode their messages so that
only the recipient, who has a special electronic key, can unlock them.
Terrorists have long been thought to harness privacy programs to
conceal their electronic communications, and some are thought to have
found even more complicated methods of concealment.

  The safeguard might not work for long, as Steele says she expects
legislation soon that could give the government special access to the
keys unlocking encryption schemes. This would be a victory for the FBI,
which since the late 1990s, has made concerted efforts to force privacy
companies to install special back-door access systems.

  Rights groups and the manufacturers of encryption tools, however,
have successfully fought this effort, noting that hackers could
possibly break in through back doors as well.

  Encryption, however, is the next frontier. Until any such legislation
is proposed, groups such as Steele's will be focused on the current
anti-terrorism act.

  Said Steele, "overall, the entire act could shift the balance of
power between law enforcement and the other branches of government. Law
enforcement is going to be able to get a whole lot more information
about Americans without anyone looking over their shoulder."

_____________________
Copyright 2001 Yahoo!
and http://rd.yahoo.com/DailyNews/*http://www.courttv.com/
Courtroom Television Network LLC.
All Rights Reserved.


================================================================
             Kadosh, Kadosh, Kadosh, YHVH, TZEVAOT

   FROM THE DESK OF:

           *Michael Spitzer* <[EMAIL PROTECTED]>

  The Best Way To Destroy Enemies Is To Change Them To Friends
================================================================

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to