-Caveat Lector-

http://www.stopcarnivore.org/threeproblems.htm

The Backdoor, the Rogue Agent, and the Mishap: the
Hidden Dangers of Carnivore

Introduction
Most of the discussion about the F.B.I. spy tool
Carnivore has focused on the 4th Amendment. By its
nature, Carnivore violates the 4th Amendment, but many
people have seemed willing to overlook that,
especially in recent weeks, as long as it will make
them safer.

This paper is written for the people who believe the
"4th Amendment argument" is not sufficient to justify
prohibiting Carnivore. Make no mistake, we at
StopCarnivore.org still firmly hold that Carnivore is
in clear and disturbing violation of the 4th
Amendment, but there are clearly those who believe
that is not a good enough reason to prevent its use.
This paper is intended to provide convincing reasons,
beyond the 4th Amendment argument, why Carnivore is a
law enforcement tool that we all should reject.

This paper is also designed to provide a response to
those who say, "If you're not doing anything wrong,
you don't have anything to worry about." The following
are things that affect everyone, innocent people
included.

The three primary dangers of Carnivore to innocent
people can be called the Backdoor problem, the Rogue
Agent problem, and the Mishap problem.

The Backdoor problem
The Backdoor problem is probably the most serious of
the three problems. When installed, Carnivore provides
a very high level of access to the data pipeline which
it monitors. F.B.I. documents and the IIRTI
"independent" study of Carnivore show that the system
can be accessed by a username/password combo. In
IIRTI's own words, "any action taken by the Carnivore
system could have been directed by anyone knowing the
Administrator password. It is impossible to trace the
actions to specific individuals."

There is no question that there are hackers and
computer experts who can break into "secure" computer
networks. The Air Force, the Pentagon, and many other
high-profile government and corporate web servers have
been hacked into in the past. Carnivore provides
hackers, and those that fund them, with a new and very
fruitful target.

Currently, Internet Service Provider (ISPs) take
efforts to maintain the security of their networks
from outside invasion or manipulation. Unfortunately,
Carnivore obviates those security measures, and takes
the data out of the ISP's control. In order to have
the access that it has, Carnivore must, by design,
bypass all of the ISP's security measures, which would
otherwise block such efforts by and outside entity to
spy on the ISP's users. In order to function,
Carnivore must be allowed full access to the data
pipeline. Unfortunately, this opens up a backdoor into
the network, and ISP's are powerless to protect it. If
someone with untoward motives were to gain control of
a Carnivore installation, they would have full,
unrestricted access to all of the data coming through
that particular pipeline.

This means they could do anything from spying on
people, to accessing their computers, to shutting down
websites, company servers, and so on. They could pass
on a computer virus to thousands of people at once, or
just stop e-mail access for thousands of people at
once. They could access identity information, bank
information, credit card information, etc. And all of
this presumably without being detected by the ISP's
security systems.

Very little has been said about how Carnivore could
weaken the security of the Internet, but it is a very
real threat. How long will it be before hackers and
others figure out how to find Carnivore and then hack
into it? It's only a matter of time. Then, all of the
access that we have granted to the F.B.I. will be in
the wrong hands, and it won't be limited to just
accessing one or two accounts, because that's not how
Carnivore is designed. Carnivore is designed to have
total access to the whole data pipeline, and
unfortunately, it isn't designed to be very secure.

We won't belabor the various nightmare scenarios that
could come about due to this flaw in Carnivore, but we
shouldn't need to. The F.B.I. would very much like it
if Carnivore was installed everywhere, giving them
immediate access to all U.S. Internet traffic. But
they have failed to mention how easily that access
could be taken over by people with ill intent, or the
obvious security problems that such a takeover would
raise.

The Rogue Agent problem
One bad apple can spoil the bunch, as they say. As
easy as it would seem to be for hackers and terrorists
to gain access to Carnivore, it is many degrees easier
for a federal agent to do so. The story of Robert
Hannsen, the F.B.I. agent who was spying for the
U.S.S.R. and Russia for so many years, is widely
known. Of course, he operated in the days before
Carnivore existed, and he was stealing secrets the
"old fashioned way": by taking papers and selling
them.

What could a rogue agent do with access to Carnivore?
Basically, anything he or she wanted to. If Carnivore
is scanning a server that hosts a bank, the rogue
agent can access bank files. The rogue agent could
intercept and even alter e-mails or websites, could
commit damaging acts, could commit corporate
espionage, and so on. Instead of having to steal
papers, the rogue agent powered by Carnivore can
simply load the info onto a disk, or even e-mail it to
his or her cohorts, and then cover up his or her
tracks, using Carnivore to do so.

A recent investigation in Michigan uncovered a long
history of abuse by State Troopers of the state Law
Enforcement Investigation Network, a police database.
Officers used the database as a tool to meet women,
settle scores, and torment motorists. It would be
naive to believe that other states don't suffer from
similar misuses of such information—and it would be
equally naive to believe there are no agents in the
federal police forces who would commit similar acts.

One bad apple indeed can spoil the whole barrel, and
if one rogue F.B.I. agent misuses Carnivore to harm or
threaten an innocent person, or as a tool for
industrial or governmental espionage, then it will
spoil the whole benefit of using it in the first
place. With the current design of Carnivore, and the
aims to make its use widespread, it is sensible to
believe that misuse and abuse of the system by
unsavory elements on the "inside" will occur. To what
degree, we don't know- and we may never know, given
the IIRTI's assessment that it is impossible to
discover who has done what with Carnivore.

The Mishap problem
The F.B.I. is well-known for its mishaps, mis-steps,
and questionable tactics, and these are worth noting
as we look at Carnivore as well. As noted above,
Carnivore is placed at a very central part of whatever
network it is installed at, and all the data at that
location flows through it. If something goes wrong in
a carnivore installation, it could interfere with a
substantial portion of the Internet.

Indeed, Carnivore has been at the root of at least one
network mishap already. Back in 1999, the F.B.I.
forced Earthlink to install Carnivore on one of their
network nodes, even after Earthlink went to court to
protest the order. In order to install Carnivore, the
tech people at Earthlink had to install a different
operating system. At a point late in the Carnivore
installation, that portion of their network had
serious problems, and their customer's access was
adversely affected. As a result, Earthlink removed
Carnivore from their system, and negotiated an
arrangement with the F.B.I. that would prohibit future
use of Carnivore on Earthlink's network.

There may be other instances of Carnivore disrupting
service in other installations, but no information has
been released about any of the other cases in which
Carnivore has been used.

This issue becomes particularly relevant in light of
the news that the F.B.I. is seeking to install
Carnivore on the bigger network hubs—introducing the
potential for Carnivore to be scanning hundreds of
thousands of people's data. Or, to disrupt those
people's data, if something in Carnivore interferes
with the network.

Carnivore unfortunately takes ultimate control out of
the hands of Internet Providers, and puts it in the
hands of less technically savvy people, whose primary
motivation is not providing secure Internet
connectivity, but instead is surveillance and
investigation. We at StopCarnivore.org wouldn't be at
all surprised if we come to find out about a number of
instances where Carnivore has caused a disruption in
service or security for the customers of various ISPs.
With a more widespread deployment of Carnivore, such
as the Department of Justice seeks, the likelihood of
such interruptions and problems will increase
substantially.

Conclusion
Carnivore goes too far, and that fact has implications
well beyond the 4th Amendment argument. We say again:
Make no mistake, we at StopCarnivore.org still firmly
hold that Carnivore is in clear and disturbing
violation of the 4th Amendment. For those who don't
feel that the 4th Amendment argument is convincing
enough, then we offer three other significant reasons
why Carnivore is a dangerous and unworthy law
enforcement tool. It goes too far, and in going too
far it weakens the Internet itself, increasing our
vulnerability to cyber-attack, espionage, identity
theft, and accidental disruption of service.

If the F.B.I. insists on tapping the Internet, they
simply need to find a better tool to do it with. They
developed Carnivore with little or no oversight, and
they did a poor job at it, designing a system which
puts the needs of law enforcement ahead of security
concerns, privacy issues, and civil liberties. The
system is simply not workable within the American way
of life, and even those who are willing to discard
their constitutional rights should be able to see its
frightening flaws.



=====
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://serendipity.magnet.ch/wtc.html

__________________________________________________
Do You Yahoo!?
Find the one for you at Yahoo! Personals
http://personals.yahoo.com

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to