[CTRL] Carnivore Echelon

2001-11-17 Thread William Shannon
http://cryptome.org/ece.htm



From: S
To: [EMAIL PROTECTED]
Subject: FBI's Carnivore
Date: Tue, 13 Nov 2001 11:14:32 -0400 

A (probably) very complicated question for forum members: How does the FBI's new carnivore program (rapidly pushed through Congress after 9/11)[sic] differ in function or purpose from Echelon and what are the potential implications for civil liberties issues? 

-- Intelligence Forum (http://www.intelforum.org) __ 

Cryptome: Carnivore as publicized intercepts only select Internet communications while Echelon is claimed to intercept all forms of communications. The US government has admitted to operating Carnivore while no official admission of Echelon has ever been made. 

The FBI Website has a section which describes Carnivore's operation with diagrams. There is no governmental site which describes Echelon, at least not in overt terms. 

The full capabilities of Carnivore have not been publicly disclosed, nor any similar program(s) for which Carnivore may be a diversion. Nor is it clear if Echelon is a disinformation campaign to cloak other programs, but that is likely given that Echelon has been reported in the media for some 14 years and few programs continue to use codenames after such exposure except for disinformative purposes. 

The pre-911 (actually pre-enactment of the USA PATRIOT Act) version of Carnivore was claimed by the government to be sharply limited to a relatively small number of targets and had to be specifically authorized by narrowly-tailored court orders. The post-911 Carnivore is claimed to be far more widely targeted and receives covert support from ISPs which are allegedly much more accommodating than previously. (Penalities for ISP refusal to cooperate were increased by USA PATRIOT). 

In either case, the dispute about Carnivore relates to its technological capacity to intercept and archive a vast amount of information that was not related to the target, data which was then to be sifted for targetted material as authorized by the court order. Critics were not assured of full compliance by the FBI to not make use of the full intercept. 

There is no restriction on claimed intercepts by the Echelon system except to exclude intercepts of "US persons" as more fully described by NSA directive USSID 18. Before enactment of the USA PATRIOT Act, intercepted data could not be shared with US law enforcement  agencies. Now it can. 

Similarly, before enactment of USA PATRIOT, US law enforcement could not share material from criminal investigations with US intelligence agencies. Now it can. And this combined investigative and intelligence material can also be shared with other nations. 

Critics of USA PATRIOT and subsequent directives issued by the Department of Justice claims that the law has potential to dramatically decrease civil liberties. A parallel is drawn between the alleged broad sweep of Echelon aimed at foreign targets now being aimed at the homeland through Carnivore and other surveillance and intercept programs not named but provided for in USA PATRIOT. 

The technologies and procedures for targetting, interception, storing, sorting, decryption and analysis allegedly used by Echelon are the most sophisticated in the world. Those can now be called upon for domestic law enforcement purposes. Carnivore constitutes only one of these technologies, and it is comparatively unsophisticated. 

There are many commercial versions of Carnivore readily available for which there are few legal prohibitions against usage. The FBI can now legally do what individuals and corporations have been doing for some time. And individuals, corporations and other nations have access to technologies allegedly used by Echelon if not its full capabilities. 

This is not to suggest that there are not classified technologies and programs in use by domestic law enforcement as well as intelligence agencies which are not publicly known, and likely in use by individuals, corporations and other nations. Indeed, it is safe to assume that there are, for that has been the history of surveillance and interception: the most effective programs are learned about years later, if ever, as we see hinted at on Intel Forum by comsec, comint and intelligence practitioners. 

To be sure, there is considerable denial and deception, disinformation and propaganda, about surveillance and intercept capabilities. We have seen that surrounding Echelon and Carnivore, and more recently about terrorism, anti-terrorism, counterterrorism and military and humanitarian campaigns in Central Asia and the US homeland. Not much can be done about that most sophisticated of technologies -- lying and deceiving of the enemy and collateral damage to the citizenry. 

As argued on Intel Forum, credible lying is too important an intelligence and counterintelligence tool to be ever be foregone by intelligence luminaries, historians, senior officials, unidentified spokespersons. 

Carnivore and Echelon are likely official 

[CTRL] Carnivore Substitute Keeps Feds Honest

2001-10-04 Thread William Shannon
http://www.theregister.co.uk/content/6/21992.html



Carnivore substitute keeps Feds honest
By Thomas C Greene in Washington
Posted: 02/10/2001 at 20:32 GMT

The Forensics Explorers division of CTX is ready to go to market with a Carnivore-like suite called NetWitness which, the company says, can enable ISPs to surrender to the Feds only those specific bits of information about a suspect which a court has authorized for collection.

The NetWitness package can separate data to ensure strict, minimal compliance with a pen register or trap and trace order, and later associate the original content if a search warrant or a wiretap warrant is issued, Forensics Explorers General Manager Mark Longworth told The Register.

Because Carnivore is capable of capturing far more data than a pen register or trap and trace order is meant to make available, an ISP may well prefer to install its own kit rather than trust Carnivore operators to stick to the letter of the law.

There are two chief problems with Carnivore in terms of over-collection, as we reported in a previous article. First is the fact that packet traffic belonging to perfectly innocent subscribers passes through it along with the suspect's data. Basically, we have to trust the FBI not to abuse this incidental access. The motive for them not to do so is the looming possibility of screwing up a prosecution; but now, in the wake of the 11 September atrocities, it's a fair bet that the Feds are going to get a good deal more latitude from the courts in borderline cases.

The second problem is that we have no assurance that, when used in 'pen mode', Carnivore doesn't capture more of the packet than its origin, destination and time of transmission. It's quite possible that the subject line of an e-mail memo would be captured, for instance. This certainly goes beyond what's understood as a pen register or trap and trace, where only the origins and destinations of phone calls are to be recorded.

The FBI is exuberantly installing Carnivore on public networks now in pursuit of the Bearded Chupacabra. But it's reasonable that an ISP, however eager to cooperate in this venture, might well object to having a mysterious 'black box' installed on its lines. But the fact is, it doesn't have to, so long as it can provide the FBI with the data it's authorized to collect.

Doing in-house surveillance can become a feature with which an ISP might differentiate itself from its competitors. For example, you the innocent subscriber can be assured that if a pen register is executed against someone else on the network, your e-mail isn't going to end up in the hands of the FBI. And if you're ever unfortunate enough to come under federal scrutiny, you can be assured that the FBI won't be getting any data beyond what's been legally authorized.

There is no logical reason for the FBI to insist that an ISP use its black box. Phone companies don't let them install mysterious devices on their lines, and neither should ISPs. These collections are covered under the CALEA (Communications Assistance to Law Enforcement Act), which obligates communications providers to comply, all right; but that isn't the same as saying that only equipment cobbled together by the Feds can be used.

The FBI's irrational devotion to Carnivore is most likely the result of needing to justify the development costs, which we're told were in the neighborhood of $3 million. Pushing it aggressively is essentially a way of denying that it's a sub-standard tool.

The NetWitness kit is well within the reach of most ISPs; the collector sells for approximately $2,500 and the analysis station for between $35,00 and $45,000, Longworth told us. Network Ice offers a free do-it-yourself Carnivore kit, but this requires development effort. It may or may not end up cheaper than NetWitness, according to the efficiency of one's in-house geeks.






[CTRL] CARNIVORE: Every link you take, every click you make: The FBI could be watching you

2001-10-04 Thread MICHAEL SPITZER

-Caveat Lector-

http://dailynews.yahoo.com/h/ct/20011001/cr/every_link_you_take
_every_click_you_make_the_fbi_could_be_watching_you_1.html





Every link you take, every click you make:
The FBI could be watching you


Monday October 01 04:27 PM EDT
By Matt Bean
Court TV


Warning: The government could be watching your computer-right now.
Depending on your Internet service provider, a special piece of
technology called Carnivore could, in fact, be recording the URL of
each Web site you visit (including this one) and even the terms you
enter into popular search engines.

  The laws governing when the FBI can use their controversial Internet
monitoring system are designed to make sure that criminals, not
law-abiding citizens, are targeted. But with the fight against
terrorism moving into the digital realm, proposed legislation called
for by President Bush could make the technology even easier to use and,
say rights groups, even easier to abuse.

  Though the anti-terrorism proposals may be aimed at suspected
saboteurs now, they could act like a Trojan horse for rights abuses in
the future, says Jay Stanley, the ACLU's privacy public education
coordinator.

  Americans have to be careful here, said Stanley. That's the way
rights are lost. We have to be sure that it's not just a foot in the
door to a much broader expansion of powers.

  New laws passed the week of the attack and sponsored by Orrin
Hatch (R-Utah) and Dianne Feinstein (D-Calif.) have already expanded
Carnivore's reach, giving U.S. and state attorneys the power to order
installation of Carnivore on a temporary, limited basis.

  The current proposed legislation Congress is now considering would
give the FBI even more power to install and use the system.


How It Works

  The Carnivore system is part of a class of electronic surveillance
devices called packet sniffers. Packet sniffers, which are also used
by companies to monitor employee Internet use, filter all of the
internet traffic that passes through a network, looking for key phrases
in e-mails, for the visitation of earmarked URLs, and more.

  To monitor a user's traffic, agents must connect a box containing the
system to the network, or internet service provider, that individual
uses.  Say, for example, that a mob boss was suspected of making drug
deals through his Earthlink internet account. If the FBI did not
already have a Carnivore system installed there, the agency would
obtain a court order to install one, and then an agent would head out
to the Earthlink offices to install a box. The box would filter the
communications passing through Earthlink's network, paying special
attention to those coming from, and heading to, the mob boss's account.
Later, an agent would return to Earthlink to retrieve a hard drive from
the box, which could be scanned back at the FBI offices.

  The FBI has been careful not to explain everything about how
Carnivore works, but FOIA documents indicate that the system is capable
of doing a lot more than just sifting for highlighted key words and web
addresses -- it is capable of capturing and archiving not only the
specific communications it's targeted at, but all unfiltered traffic
on the network as well.

  This voracious appetite for data may be one reason the system, which
the FBI renamed last year as DCS1000, has never been able to shake its
prehistoric moniker.


Trap and Trace Gets an Update

  The loosening of restriction on Carnivore are only part of the
Anti-Terrorism Act (ATA), a set of proposals which would grant law
enforcement new powers in everything from immigration law to collecting
the DNA of suspected terrorists.

  And though a current version of the proposal does not specifically
mention the system (neither did the law passed the week of the attacks)
computer experts agree that it would grant the FBI more leeway to
perform surveillance activities that would require the use of
Carnivore.

  The crucial part of the current anti-terrorism laws that has
electronic privacy groups worried is a clause that would allow FBI
agents to use Carnivore to expand something called the trap and trace
authority of the government.

  Trap and trace is a term that once referred to obtaining phone
records from an individual under surveillance, detailing who called
whom and when.  That information was considered less serious than
recording the content of a phone call, and therefore two levels of
warrants were established.

  To do a trap and trace, agents merely needed to assert to a judge
that the warrant would be relevant to an ongoing criminal
investigation. To do a wiretap, however, agents would have to get a
Title III wiretap warrant by convincing a judge that the surveillance
would be likely to turn up dirt from, say a suspected terrorist.

  The crucial difference, says Stanley, is that a trap and trace
warrant is much easier to obtain. You don't even need to be suspected
of a crime for that, he says.

  Fast forward to the digital age: The proposed 

Re: [CTRL] CARNIVORE: Every link you take, every click you make: The FBI could be watching you

2001-10-04 Thread [EMAIL PROTECTED]

-Caveat Lector-

Yeah, ever since i started looking into CIA mind control on the net, all my
browsing now goes via mae.west or mae.east, CIA net monitoring nodes.  not
to mention all my ctrl email being strangely delayed, but not others.
so theyre watching me - not much i can do about that.  i have no intention
of threatening anyones personal freedom, power or finances, so i dont
expect to ever get too high on their list of priorities.

A HREF=http://www.ctrl.org/;www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of
[EMAIL PROTECTED]/A

http:[EMAIL PROTECTED]/
 A HREF=http:[EMAIL PROTECTED]/;ctrl/A

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



[CTRL] Carnivore Goes Wireless

2001-08-24 Thread William Shannon
http://www.washtech.com/news/regulation/12051-1.html



FBI's 'Carnivore' Might Target Wireless Text

By Robert O'Harrow Jr.,
Washington Post Staff Writer
Friday, August 24, 2001; 7:32AM

Federal law enforcement authorities may soon expand the use of a 
controversial FBI monitoring system to capture e-mail and other text messages 
sent through wireless telephone carriers, as well as messages from their 
Internet service providers, according to a telecommunications industry group. 

The FBI has been using the system, called Carnivore, for two years, subject 
to court authorization, to tap into Internet communications, identify e-mail 
writers online or record the contents of messages. It does so by capturing 
"packets" of information containing those details.

Civil liberties advocates and some lawmakers have expressed concerns because 
the system could scan private communication about legal activities of others 
besides those under investigation. The Justice Department is reviewing the 
system's impact on privacy. 

Now the the Cellular Telecommunications  Internet Association is warning 
that authorities could use Carnivore as soon as October to examine messages 
such as those sent by cellular telephones and other handheld devices. That's 
because the industry has been unable to come up with a way to give law 
enforcement agencies the ability to monitor digital communications as they 
can the more easily captured analog messages, as required by a 1994 law.

In an Aug. 15 letter to the Federal Communications Commission, Michael 
Altschul, the association's senior vice president and general counsel, said 
its members can't meet the Sept. 30 deadline for the technology.

"If the industry is not provided the guidance and time to develop solutions 
for packet surveillance that intercept only the target's communications, it 
seems probable that Carnivore, which intercepts all communications in the 
pathway without the affirmative intervention of the carrier, will be widely 
implemented," Altschul wrote.

Altschul said in an interview that the FBI has told industry officials it 
would use Carnivore in the absence of another system. "It could well be a 
huge expansion of the use of Carnivore," he said.

The FBI said in a prepared statement yesterday: "We have never proposed or 
planned to have Carnivore used as a solution for . . . compliance." A 
spokesman said Internet service providers are now so adept at meeting the 
technical demands of approved surveillance of suspects' Internet traffic that 
the FBI has used Carnivore only twice this year.

The spokesman declined to say whether the FBI would use Carnivore – now known 
in the agency as DCS1000 – to capture communications handled by telephone 
carriers.

Privacy advocates agreed with Altschul that the industry's technical problems 
could mean an expansion of Carnivore use. David Sobel, general counsel of the 
Electronic Privacy Information Center, said the FBI has not demonstrated that 
it can narrowly target the system. That raises the prospect that it will 
collect information from many people's communications while searching for a 
suspect's communications.

"It opens the door to the collection of communications of people who aren't 
even named in [court] orders," Sobel said.

Law enforcement agencies use two legal methods to collect information about 
suspects' communications. Under federal "pen register" procedures, 
authorities need only say that call information is relevant to an 
investigation to get court permission to obtain the origin or destination of 
electronic communication to and from a suspect. Those rules do not allow 
authorities to capture the content of communication.

But Sobel and Altschul said Carnivore cannot separate address information 
from the content of a message in a packet, and so authorities must be trusted 
to weed out data they are not allowed by law to have.

The standard is much higher to obtain the content of e-mail or telephone 
calls. It requires authorities to show probable cause that a crime has been 
committed and secure a court order signed by a judge.

In 1998, federal authorities used the pen register procedures more than 7,300 
times to obtain phone logs. That same year, federal and state authorities 
received 1,329 court orders to capture the content of communications.

An official at the Federal Communications Commission declined to discuss 
Altschul's letter but said the agency intends to decide soon whether it will 
extend the deadline for meeting the law's requirement.







[CTRL] Carnivore News

2000-11-18 Thread William Shannon
FBI's e-mail surveillance tool questioned  WASHINGTON (November 17, 2000 2:43 p.m. EST ) - The FBI's controversial e-mail surveillance tool can retrieve all communications that go through an Internet service - far more than FBI officials have said it does - a recent test of its potential sweep found, according to bureau documents. An FBI official involved with the test of the tool known as Carnivore stressed Friday that although Carnivore has the ability to grab a large quantity of e-mails and Web communications, current law and specific court orders restrict its use. Neverthe!
less, privacy experts said they are worried about the breadth of Carnivore's capability and questioned why the FBI even conducted such a test in June if it intends to use the tool only for narrow purposes. "That really contradicts the explanation that the FBI has provided as to the purpose of the system and how it works," said David Sobel, general counsel for the Washington-based Electronic Privacy Information Center. "We've been led to believe that the purpose of Carnivore is to filter and pinpoint the particular communications that the FBI is authorized to obtain. If that's true, then why are they testing the system's ability to store and archive everything?" Sobel's group recently obtained the FBI documents providing the test results as part of litigation it brought under the Freedom of Information Act. In the lab report, FBI officials said Carnivore "could reliably capture and archive all unfiltered traffic to the interna!
l hard drive" and could save the information on removable high-capacity disks as well. Marcus Thomas, head of the FBI's cybertechnology section, said in an interview with The Associated Press that the test was done only to check Carnivore's "breaking point." He said the tool wouldn't be used to capture broad swaths of Internet communications in a real-world situation. Thomas was one of the FBI agents who approved the lab report. "Certainly, in operation, you could set the filters up to do nothing," Thomas said. "But our procedures are very detailed, we'll only do what we're allowed to in a court order." The difference of opinion is the latest in what has become a debate between Carnivore's capabilities and its actual use. While law enforcement officials have admitted that Carnivore can capture much more than e-mail, including Internet chats and Web browsing, FBI officials insist it is only used to copy e-mail to or from a crimina!
l suspect in accordance with a court order. Opponents say the "black box" nature of the system keeps the public from knowing what it can really do, and its installation at an Internet provider may cause network problems. The Electronic Privacy Information Center started receiving batches of Carnivore-related material in October, after a court ordered the FBI to release the information. EPIC representatives said they have received about 550 pages so far, and expect to get only about 30 percent of the 3,000 documents related to Carnivore. Most of the release documents have large portions blacked out. FBI officials say Carnivore has been used in about 25 cases, most involving national security. Congress considered several measures this year to rein in Carnivore, but none survived. Lawmakers have said that they may consider measures again next year. An independent review of Carnivore was ordered by Attorney General Janet Reno, an!
d that report was due to be received by the Justice Department on Friday, Justice spokeswoman Chris Watney said. Watney said the report is expected to be released to the public early next week, after it is edited to eliminate references to Carnivore's internal blueprints and other sensitive material.

http://interestalert.com/brand/siteia.shtml?Story=storage/remote_n/1117aaa06909.nandSys=v2oFilter=Late%20BreakingFid=LATEBRKN
 


[CTRL] Carnivore monitors email -- and more

2000-10-22 Thread Eric Stewart

-Caveat Lector-

Original Message Follows
From: "Marpessa Kupendua" [EMAIL PROTECTED]
To: undisclosed-recipients:;
Subject: !*Carnivore monitors email --  and more
Date: Wed, 18 Oct 2000 23:33:55 -0500 (CDT)

FORWARDED MESSAGE
===

From: Michael Novick [EMAIL PROTECTED]
Sent: Monday, October 16, 2000 6:45 PM

  Carnivore Details Emerge
  http://www.securityfocus.com/news/97
  A web spying capability, multi-million dollar price tag, and a secret
  Carnivore ancestor are some of the details to poke through heavy FBI
editing.
  By Kevin Poulsen
  October 4, 2000, WASHINGTON

The FBI's Carnivore surveillance tool monitors more than just email.
Newly declassified documents obtained by Electronic Privacy Information
  Center (EPIC) under the Freedom of Information Act reveal that Carnivore
can monitor all of a target user's Internet traffic, and, in conjunction
  with other FBI tools, can reconstruct web pages exactly as a surveillance
  target saw them while surfing the web.
The capability is one of the new details to emerge from some six-hundred
  pages of heavily redacted documents given to the Washington-based
nonprofit
  group this week, and reviewed by SecurityFocus Wednesday.
The documents confirm that Carnivore grew from an earlier FBI project
  called Omnivore, but reveal for the first time that Omnivore itself
  replaced a still older tool. The name of that project was carefully
blacked
  out of the documents, and remains classified "secret."
The older surveillance system had "deficiencies that rendered the design
  solution unacceptable." The project was eventually shut down.
Development of Omnivore began in February 1997, and the first prototypes
  were delivered on October 31st of that year. The FBI's eagerness to use
the
  system may have slowed its development: one report notes that it became
  "difficult to maintain the schedule," because the Bureau deployed the
  nascent surveillance tool for "several emergency situations" while it was
  still in beta release. "The field deployments used development team
  personnel to support the technical challenges surrounding the insertion of
  the OMNIVORE device," reads the report.
  The 'Phiple Troenix' Project
  In September 1998, the FBI network surveillance lab in Quantico launched a
  project to move Omnivore
  from Sun's Solaris operating system to a Windows NT platform. "This will
facilitate the miniaturization of
  the system and support a wide range of personal computer (PC) equipment,"
  notes the project's Statement of Need. (Other reasons for the switch were
  redacted from the documents.) The project was called "Phiple
  Troenix"apparently a spoonerism of "Triple Phoenix," a type of palm tree
  and its result was dubbed "Carnivore."
  Phiple Troenix's estimated price tag of $800,000 included training for
  personnel at the Bureau's
  Washington-based National Infrastructure Protection Center (NIPC).
  Meanwhile, the Omnivore project was formally closed down in June 1999,
with
  a final cost of $900,000.
  Carnivore came out of beta with version 1.2, released in September 1999.
As
  of May 2000, it was in version 1.3.4. At that time it underwent an
  exhaustive series of carefully prescribed tests under a variety of
  conditions. The results, according to a memo from the FBI lab, were
  positive. "Carnivore is remarkably tolerant of network aberration, such a
  speed change, data corruption and targeted smurf type attacks.
  The FBI can configure the tool to store all traffic to or from a
particular
  Internet IP address, while monitoring DHCP and RADIUS protocols to track a
  particular user.
  In "pen mode," in which it implements a limited type of surveillance not
  requiring a wiretap warrant, Carnivore can capture all packet header
  information for a targeted user, or zero in email addresses or FTP login
data.
  Web Surveillance
  Version 2.0 will include the ability to display captured Internet traffic
  directly from Carnivore. For now, the tool only stores data as raw
packets,
  and another application called "Packeteer" is later used to process those
  packets. A third program called "CoolMiner" uses Packeteer's output to
  display and organize the intercepted data.
  Collectively, the three applications, Carnivore, Packeteer and CoolMiner,
  are referred to by the FBI lab as the "DragonWare suite."
  The documents show that in tests, CoolMiner was able to reconstruct HTTP
  traffic captured by Carnivore into coherent web pages, a capability that
  would allow FBI agents to see the pages exactly as the user saw them while
  surfing the web.
  Justice Department and FBI officials have testified that Carnivore is used
  almost exclusively to monitor email, but noted that it was capable of
  monitoring messages sent over web-based email services like Hotmail.
  An "Enhanced Carnivore" contract began in November 1999, the papers show,
  and will run out in January of next year at a total cost of $650,000. Some
  

[CTRL] Carnivore

2000-10-21 Thread K

-Caveat Lector-

http://www.ubersoft.net/d/20001016.html
http://www.ubersoft.net/d/20001017.html
http://www.ubersoft.net/d/20001018.html


###

As for [that truck almost hitting George Bush],
political experts say that having your opponent
almost get hit by a tractor trailer is just one
of the many benefits Al Gore will receive after
his recent endorsement by the AFL-CIO.
--Saturday Night Live comic Colin Quinn

A HREF="http://www.ctrl.org/"www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 A HREF="http://peach.ease.lsoft.com/archives/ctrl.html"Archives of
[EMAIL PROTECTED]/A

http:[EMAIL PROTECTED]/
 A HREF="http:[EMAIL PROTECTED]/"ctrl/A

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



[CTRL] Carnivore: a toe in the door

2000-10-18 Thread nessie

-Caveat Lector-

http://www.foxnews.com/national/101300/carnivoretwo_riley.sml


FBI's Carnivore Just the First Step in Internet Surveillance

Monday, October 16 2000

by Patrick Riley FOX News

Amid  all the hubub over whether its Carnivore e-mail surveillance system
violates privacy rights, the FBI has quietly been working to develop an
even
sharper-toothed information chomper

The FBI says its controversial Carnivore system is just "the tip of the
iceberg" when it comes to Internet surveillance because an even
sharper-toothed information chomper is now in development.

Amid all the hubbub over whether the current system violates privacy
rights,
the agency has been quietly working on both "Carnivore 2.0" and "Carnivore
3.0,"
according to FBI documents released this month under a Freedom of
Information
Act claim filed by the Electronic Privacy Information Center. The current
Carnivore is
version 1.3.4, according to the documents.

An "Enhanced Carnivore" program has been under development since last
November
#151; under a $650,000 contract scheduled to end in January 2001. Most of
the
details on the souped-up snoopers were blacked out in heavy black marker
before the papers were released.

The Federal Bureau of Investigation makes no bones about its plans for the
system, which sifts an Internet Service Provider's transmissions to track
suspects' online  activity.

"As it looks today, it could be completely different a year from now,"
said
FBI spokesman Paul Bresson. "Really, we've only seen the tip of the
iceberg
in terms of the change in technology."

He said improving Carnivore is vital for keeping pace with criminal
elements.

"This is going to continue to be a cat-and-mouse game," he said.
"There's always going to be software and other encryption technology that
render a system less useful."

He declined to give specific details. But privacy experts say an evolving
Carnivore presents a problem for those trying to keep an eye on it.

"It's a moving target," said David Banisar, a senior fellow at EPIC. "It
means there needs to be continual oversight, not just onetime oversight.
It
means that if we get the source code we'll have to get the source code as
it
changes also, and do a re-analysis as the functions of the software
change."

The program's source code, the piece of information most sought after by
activists trying to figure out if Carnivore reads the e-mail of more than
just those targeted by a court order,  was omitted from the 600-plus pages
given to EPIC in the first of several planned releases. But the
organization
has vowed to continue fighting for it.

Despite the incomplete technical blueprint, the newly public papers do
shed
some light on what sequels to Carnivore might look like.

Three jargon-heavy lines of text that survived the FBI censor reveal that
Version 2.0 will be capable of  "built-in data analysis that Carnivore
doesn't appear to do now," Banisar said.

That means being able to display captured Internet data as soon as
Carnivore
intercepts it. The current system merely stores the data and two other
programs #151; "Packeteer" and "Coolminer" #151; must be used to process
and
display
it.

No information was released from the Version 3.0 section but research
mentioned elsewhere in the unclassified papers involves an aspect of the
technology dubbed "Dragon Net" that captures telephone conversations held
via
the Web #151; a process known as "voice over IP" technology.

Banisar suspects the FBI might also want its future sniffers to have the
ability to track multiple targets simultaneously. That wouldn't bode well,
he said. "The more capability it has to intercept more than one target,
the
more likely it is to be abused."

While the current Carnivore is purely monogamous, it casts a wider net
than
commonly thought, according to an analysis of the FBI documents by
anti-computer crime site SecurityFocus.com.

Carnivore can "be programmed to watch for all the Internet activities of a
particular person," said Kevin Poulson, editorial director at
SecurityFocus
and a former hacker. The system can even reconstruct Web pages
viewed by a suspect. "All that's been talked about is its ability to
monitor
e-mail."

C Associated Press. All rights reserved.
 This material may not be published, broadcast, rewritten, or
redistributed.
 C Reuters Ltd. All rights reserved.
In light of this, said EPIC's Banisar: "It makes you wonder what else they
could possibly want."

A HREF="http://www.ctrl.org/"www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to 

[CTRL] Carnivore Review Team Exposed!

2000-09-28 Thread Kris Millegan

-Caveat Lector-

from:alt.conspiracy
As, always, Caveat Lector
Om
K
-
Click Here: A HREF="aol://5863:126/alt.conspiracy:643876"  Carnivore Review
Team Exposed!/A
-
Subject:   Carnivore Review Team Exposed!
From: "www.wired.com web2news.pl" A
HREF="mailto:Use-Author-Address-Header@[127.1]"
Use-Author-Address-Header@[127.1]/A
Date: Thu, Sep 28, 2000 4:47 AM
Message-id: [EMAIL PROTECTED]

Carnivore Review Team Exposed!


 12:30 p.m.  Sep. 27, 2000 PDT

Call it the Curse of Carnivore.

It was bad enough when word leaked out this summer that the FBI's electronic
eavesdropping system
went by the unfortunate, if eerily accurate, name of Carnivore.

The Feds took another blow when researchers at MIT and other prestigious
institutions refused to
[ A HREF="http://www.wired.com/news/politics/0"
http://www.wired.com/news/politics/0/A

Full text at: A
HREF="http://www.wired.com/news/politics/0,1283,39102,00.html"
http://www.wired.com/news/politics/0,1283,39102,00.html/A

Posted with: A HREF="http://www.deja.com/getdoc.xp?AN=596972256fmt=text"
http://www.deja.com/getdoc.xp?AN=596972256fmt=text/A

http:  www wired com news politics 0,1283,39102,00 html web2news.pl
-
Aloha, He'Ping,
Om, Shalom, Salaam.
Em Hotep, Peace Be,
All My Relations.
Omnia Bona Bonis,
Adieu, Adios, Aloha.
Amen.
Roads End

A HREF="http://www.ctrl.org/"www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 A HREF="http://peach.ease.lsoft.com/archives/ctrl.html"Archives of
[EMAIL PROTECTED]/A

http:[EMAIL PROTECTED]/
 A HREF="http:[EMAIL PROTECTED]/"ctrl/A

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



[CTRL] CARNIVORE EATS FBI

2000-07-26 Thread Kris Millegan

from:
http://www.skolnicksreport.com/carnivore.html
Click Here: A HREF="http://www.skolnicksreport.com/carnivore.html"Sherman
Skolnick's Report/A
-
CARNIVORE EATS FBI
by Sherman H. Skolnick

Remember Frankenstein's Monster? It turned on its creator.

The Federal Bureau of Investigation created a system called CARNIVORE. It has
become the Big Ear and the Big Eye at Internet Service Providers, ISPs, and
Online Services. Without court orders, but with the apparent acquiescence if
not complicity of e-mail servers, it intercepts and analyzes gargantuan
amounts of e-mail supposedly for the FBI investigations. The Bureau-crazies
have been spending too much time emulating George Orwell and his "Big
Brother".

Some believe it to be a spy system, an offshoot of PROMIS, super software
used by secret political police, like the FBI, worldwide, to track so-called
"terrorists", code word for those unfriendly to the Established Order. After
all, in many big cities in the U.S., the FBI is quietly using PROMIS with its
zillion lines of code, as software for federal prosecutors and other federal
agents case management, software stolen from its rightful owners, INSLAW.

By the way, one of the super-secrets of the Microsoft Affair, is that the
Justice Department and their step-sister, FBI, stole and are using copyright
software of Microsoft without paying royalties. If it dared, Microsoft could
blow apart the Justice Department's Anti-Trust case against it by
counter-claiming for theft of Microsoft's intellectual property. The Internal
Revenue Service, however, could jump in, claiming Microsoft, despite its
out-of-this-world revenue, pays NO TAXES and is a frightful tax evader.
Auditors familiar with Microsoft's accounting system contend the software
bogeyman is technically if not actually bankrupt, with billions of shares
issued and peddled, on which it pays no dividends, enriching insiders with
various dark mirror, money-siphoning tricks.
Microsoft, its judges, and its bankers, are all in a position to know the
truth of Microsoft with its Macbeth's cyber witches, and their bookkeepers
kettle, reportedly cooking the software Monster's books.

Foreign intelligence operatives are reportedly laughing about all this, all
the way to their windowless "sterile" rooms, supposedly themselves exempt
from interception. They have found a way to REVERSE the FBI's CARNIVORE evil
robot. At the hands of these spooks and their computer wizards, the FBI
system has reportedly become a devilish turn-the-tables burrowing tool,
digging out the Bureau's own family jewels. FBI's super-secret
Counter-Intelligence inner sanctum, Division Five, has reportedly been
exposed and unmasked, at least to the inside delight of foreign intelligence
hackers, or those claiming to be.

A super computer honcho, asked by us about all this, confirms that reversing
the FBI's spy device is a known great possibility if not an immense
actuality. "The Bureau", he told us, "has either shown their incompetence or
has been infiltrated. Reversal is known to be possible by appropriate
software, with 'trap doors', not just by counter-spies compromising from
inside the Bureau."

A retired Central Intelligence "black operations" agent when asked about
this, said: "The Bureau should have known better. Reversing their spy machine
serves them right", adding "Of course, since its birth, 'The Firm' has viewed
FBI as a meddling, incompetent would-be competitor which should not be
operating offices as they do overseas."

Funny thing. Publicly, the so-called "American Civil Liberties Union" was
among the first in July, 2000, to supposedly rail against CARNIVORE as an
invasion of privacy issue. As a legal entity, however, ACLU ceased to exist
in 1967, and was at that time taken over by the Roger Baldwin Foundation and
a team of related so-called tax-exempt entities reportedly financed, at least
in part, through covert funding by the American CIA passed through other
Foundations to hide the tracks. The alleged "American Civil Liberties Union"
has been in the forefront of those reportedly watering down the Freedom of
Information Act, exempting the CIA from certain disclosures. Masquerading as
the alleged "American Civil Liberties Union", the Roger Baldwin Foundation
has helped screw up the FOIA by leaning on plyable members of Congress. This
done to the detriment of common Americans seeking divulging of records to
understand the operations of their government.

Do not count on the alleged ACLU telling you about how the FBI CARNIVORE
devices have been reversed. At the time the ACLU was taken over in 1967,
there was a now-forgotten huge CIA-Foundation scandal, exposing how the CIA
manipulates dissidents through layers of "foundations" to disguise covert
funding. [Check the New York Times INDEX volume in a good reference library
for the summary of stories of 1967. Bobby Kennedy played a role in fingering
this mess, probably an additional reason for his assassination in 1968.
President 

[CTRL] Carnivore, etc...

2000-07-16 Thread Oscar

http://news.cnet.com/news/0-1005-200-2257522.html

http://www.nytimes.com/library/tech/00/07/biztech/articles/14net-wiretap.html

http://www.nytimes.com/library/politics/071400email-inquiry.html


*** NOTICE: In accordance with Title 17 U.S.C. Section 107, this material
is distributed without profit to those who have expressed a prior interest
in receiving the included information for research and educational
purposes. Feel free to distribute widely but PLEASE acknowledge the
source. ***

http://www.angelfire.com/mi/smilinks/thirdeye.html

A HREF="http://www.ctrl.org/"www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 A HREF="http://peach.ease.lsoft.com/archives/ctrl.html"Archives of
[EMAIL PROTECTED]/A

http:[EMAIL PROTECTED]/
 A HREF="http:[EMAIL PROTECTED]/"ctrl/A

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om