[CTRL] Carnivore Echelon
http://cryptome.org/ece.htm From: S To: [EMAIL PROTECTED] Subject: FBI's Carnivore Date: Tue, 13 Nov 2001 11:14:32 -0400 A (probably) very complicated question for forum members: How does the FBI's new carnivore program (rapidly pushed through Congress after 9/11)[sic] differ in function or purpose from Echelon and what are the potential implications for civil liberties issues? -- Intelligence Forum (http://www.intelforum.org) __ Cryptome: Carnivore as publicized intercepts only select Internet communications while Echelon is claimed to intercept all forms of communications. The US government has admitted to operating Carnivore while no official admission of Echelon has ever been made. The FBI Website has a section which describes Carnivore's operation with diagrams. There is no governmental site which describes Echelon, at least not in overt terms. The full capabilities of Carnivore have not been publicly disclosed, nor any similar program(s) for which Carnivore may be a diversion. Nor is it clear if Echelon is a disinformation campaign to cloak other programs, but that is likely given that Echelon has been reported in the media for some 14 years and few programs continue to use codenames after such exposure except for disinformative purposes. The pre-911 (actually pre-enactment of the USA PATRIOT Act) version of Carnivore was claimed by the government to be sharply limited to a relatively small number of targets and had to be specifically authorized by narrowly-tailored court orders. The post-911 Carnivore is claimed to be far more widely targeted and receives covert support from ISPs which are allegedly much more accommodating than previously. (Penalities for ISP refusal to cooperate were increased by USA PATRIOT). In either case, the dispute about Carnivore relates to its technological capacity to intercept and archive a vast amount of information that was not related to the target, data which was then to be sifted for targetted material as authorized by the court order. Critics were not assured of full compliance by the FBI to not make use of the full intercept. There is no restriction on claimed intercepts by the Echelon system except to exclude intercepts of "US persons" as more fully described by NSA directive USSID 18. Before enactment of the USA PATRIOT Act, intercepted data could not be shared with US law enforcement agencies. Now it can. Similarly, before enactment of USA PATRIOT, US law enforcement could not share material from criminal investigations with US intelligence agencies. Now it can. And this combined investigative and intelligence material can also be shared with other nations. Critics of USA PATRIOT and subsequent directives issued by the Department of Justice claims that the law has potential to dramatically decrease civil liberties. A parallel is drawn between the alleged broad sweep of Echelon aimed at foreign targets now being aimed at the homeland through Carnivore and other surveillance and intercept programs not named but provided for in USA PATRIOT. The technologies and procedures for targetting, interception, storing, sorting, decryption and analysis allegedly used by Echelon are the most sophisticated in the world. Those can now be called upon for domestic law enforcement purposes. Carnivore constitutes only one of these technologies, and it is comparatively unsophisticated. There are many commercial versions of Carnivore readily available for which there are few legal prohibitions against usage. The FBI can now legally do what individuals and corporations have been doing for some time. And individuals, corporations and other nations have access to technologies allegedly used by Echelon if not its full capabilities. This is not to suggest that there are not classified technologies and programs in use by domestic law enforcement as well as intelligence agencies which are not publicly known, and likely in use by individuals, corporations and other nations. Indeed, it is safe to assume that there are, for that has been the history of surveillance and interception: the most effective programs are learned about years later, if ever, as we see hinted at on Intel Forum by comsec, comint and intelligence practitioners. To be sure, there is considerable denial and deception, disinformation and propaganda, about surveillance and intercept capabilities. We have seen that surrounding Echelon and Carnivore, and more recently about terrorism, anti-terrorism, counterterrorism and military and humanitarian campaigns in Central Asia and the US homeland. Not much can be done about that most sophisticated of technologies -- lying and deceiving of the enemy and collateral damage to the citizenry. As argued on Intel Forum, credible lying is too important an intelligence and counterintelligence tool to be ever be foregone by intelligence luminaries, historians, senior officials, unidentified spokespersons. Carnivore and Echelon are likely official
[CTRL] Carnivore Substitute Keeps Feds Honest
http://www.theregister.co.uk/content/6/21992.html Carnivore substitute keeps Feds honest By Thomas C Greene in Washington Posted: 02/10/2001 at 20:32 GMT The Forensics Explorers division of CTX is ready to go to market with a Carnivore-like suite called NetWitness which, the company says, can enable ISPs to surrender to the Feds only those specific bits of information about a suspect which a court has authorized for collection. The NetWitness package can separate data to ensure strict, minimal compliance with a pen register or trap and trace order, and later associate the original content if a search warrant or a wiretap warrant is issued, Forensics Explorers General Manager Mark Longworth told The Register. Because Carnivore is capable of capturing far more data than a pen register or trap and trace order is meant to make available, an ISP may well prefer to install its own kit rather than trust Carnivore operators to stick to the letter of the law. There are two chief problems with Carnivore in terms of over-collection, as we reported in a previous article. First is the fact that packet traffic belonging to perfectly innocent subscribers passes through it along with the suspect's data. Basically, we have to trust the FBI not to abuse this incidental access. The motive for them not to do so is the looming possibility of screwing up a prosecution; but now, in the wake of the 11 September atrocities, it's a fair bet that the Feds are going to get a good deal more latitude from the courts in borderline cases. The second problem is that we have no assurance that, when used in 'pen mode', Carnivore doesn't capture more of the packet than its origin, destination and time of transmission. It's quite possible that the subject line of an e-mail memo would be captured, for instance. This certainly goes beyond what's understood as a pen register or trap and trace, where only the origins and destinations of phone calls are to be recorded. The FBI is exuberantly installing Carnivore on public networks now in pursuit of the Bearded Chupacabra. But it's reasonable that an ISP, however eager to cooperate in this venture, might well object to having a mysterious 'black box' installed on its lines. But the fact is, it doesn't have to, so long as it can provide the FBI with the data it's authorized to collect. Doing in-house surveillance can become a feature with which an ISP might differentiate itself from its competitors. For example, you the innocent subscriber can be assured that if a pen register is executed against someone else on the network, your e-mail isn't going to end up in the hands of the FBI. And if you're ever unfortunate enough to come under federal scrutiny, you can be assured that the FBI won't be getting any data beyond what's been legally authorized. There is no logical reason for the FBI to insist that an ISP use its black box. Phone companies don't let them install mysterious devices on their lines, and neither should ISPs. These collections are covered under the CALEA (Communications Assistance to Law Enforcement Act), which obligates communications providers to comply, all right; but that isn't the same as saying that only equipment cobbled together by the Feds can be used. The FBI's irrational devotion to Carnivore is most likely the result of needing to justify the development costs, which we're told were in the neighborhood of $3 million. Pushing it aggressively is essentially a way of denying that it's a sub-standard tool. The NetWitness kit is well within the reach of most ISPs; the collector sells for approximately $2,500 and the analysis station for between $35,00 and $45,000, Longworth told us. Network Ice offers a free do-it-yourself Carnivore kit, but this requires development effort. It may or may not end up cheaper than NetWitness, according to the efficiency of one's in-house geeks.
[CTRL] CARNIVORE: Every link you take, every click you make: The FBI could be watching you
-Caveat Lector- http://dailynews.yahoo.com/h/ct/20011001/cr/every_link_you_take _every_click_you_make_the_fbi_could_be_watching_you_1.html Every link you take, every click you make: The FBI could be watching you Monday October 01 04:27 PM EDT By Matt Bean Court TV Warning: The government could be watching your computer-right now. Depending on your Internet service provider, a special piece of technology called Carnivore could, in fact, be recording the URL of each Web site you visit (including this one) and even the terms you enter into popular search engines. The laws governing when the FBI can use their controversial Internet monitoring system are designed to make sure that criminals, not law-abiding citizens, are targeted. But with the fight against terrorism moving into the digital realm, proposed legislation called for by President Bush could make the technology even easier to use and, say rights groups, even easier to abuse. Though the anti-terrorism proposals may be aimed at suspected saboteurs now, they could act like a Trojan horse for rights abuses in the future, says Jay Stanley, the ACLU's privacy public education coordinator. Americans have to be careful here, said Stanley. That's the way rights are lost. We have to be sure that it's not just a foot in the door to a much broader expansion of powers. New laws passed the week of the attack and sponsored by Orrin Hatch (R-Utah) and Dianne Feinstein (D-Calif.) have already expanded Carnivore's reach, giving U.S. and state attorneys the power to order installation of Carnivore on a temporary, limited basis. The current proposed legislation Congress is now considering would give the FBI even more power to install and use the system. How It Works The Carnivore system is part of a class of electronic surveillance devices called packet sniffers. Packet sniffers, which are also used by companies to monitor employee Internet use, filter all of the internet traffic that passes through a network, looking for key phrases in e-mails, for the visitation of earmarked URLs, and more. To monitor a user's traffic, agents must connect a box containing the system to the network, or internet service provider, that individual uses. Say, for example, that a mob boss was suspected of making drug deals through his Earthlink internet account. If the FBI did not already have a Carnivore system installed there, the agency would obtain a court order to install one, and then an agent would head out to the Earthlink offices to install a box. The box would filter the communications passing through Earthlink's network, paying special attention to those coming from, and heading to, the mob boss's account. Later, an agent would return to Earthlink to retrieve a hard drive from the box, which could be scanned back at the FBI offices. The FBI has been careful not to explain everything about how Carnivore works, but FOIA documents indicate that the system is capable of doing a lot more than just sifting for highlighted key words and web addresses -- it is capable of capturing and archiving not only the specific communications it's targeted at, but all unfiltered traffic on the network as well. This voracious appetite for data may be one reason the system, which the FBI renamed last year as DCS1000, has never been able to shake its prehistoric moniker. Trap and Trace Gets an Update The loosening of restriction on Carnivore are only part of the Anti-Terrorism Act (ATA), a set of proposals which would grant law enforcement new powers in everything from immigration law to collecting the DNA of suspected terrorists. And though a current version of the proposal does not specifically mention the system (neither did the law passed the week of the attacks) computer experts agree that it would grant the FBI more leeway to perform surveillance activities that would require the use of Carnivore. The crucial part of the current anti-terrorism laws that has electronic privacy groups worried is a clause that would allow FBI agents to use Carnivore to expand something called the trap and trace authority of the government. Trap and trace is a term that once referred to obtaining phone records from an individual under surveillance, detailing who called whom and when. That information was considered less serious than recording the content of a phone call, and therefore two levels of warrants were established. To do a trap and trace, agents merely needed to assert to a judge that the warrant would be relevant to an ongoing criminal investigation. To do a wiretap, however, agents would have to get a Title III wiretap warrant by convincing a judge that the surveillance would be likely to turn up dirt from, say a suspected terrorist. The crucial difference, says Stanley, is that a trap and trace warrant is much easier to obtain. You don't even need to be suspected of a crime for that, he says. Fast forward to the digital age: The proposed
Re: [CTRL] CARNIVORE: Every link you take, every click you make: The FBI could be watching you
-Caveat Lector- Yeah, ever since i started looking into CIA mind control on the net, all my browsing now goes via mae.west or mae.east, CIA net monitoring nodes. not to mention all my ctrl email being strangely delayed, but not others. so theyre watching me - not much i can do about that. i have no intention of threatening anyones personal freedom, power or finances, so i dont expect to ever get too high on their list of priorities. A HREF=http://www.ctrl.org/;www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substancenot soap-boxingplease! These are sordid matters and 'conspiracy theory'with its many half-truths, mis- directions and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF=http:[EMAIL PROTECTED]/;ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
[CTRL] Carnivore Goes Wireless
http://www.washtech.com/news/regulation/12051-1.html FBI's 'Carnivore' Might Target Wireless Text By Robert O'Harrow Jr., Washington Post Staff Writer Friday, August 24, 2001; 7:32AM Federal law enforcement authorities may soon expand the use of a controversial FBI monitoring system to capture e-mail and other text messages sent through wireless telephone carriers, as well as messages from their Internet service providers, according to a telecommunications industry group. The FBI has been using the system, called Carnivore, for two years, subject to court authorization, to tap into Internet communications, identify e-mail writers online or record the contents of messages. It does so by capturing "packets" of information containing those details. Civil liberties advocates and some lawmakers have expressed concerns because the system could scan private communication about legal activities of others besides those under investigation. The Justice Department is reviewing the system's impact on privacy. Now the the Cellular Telecommunications Internet Association is warning that authorities could use Carnivore as soon as October to examine messages such as those sent by cellular telephones and other handheld devices. That's because the industry has been unable to come up with a way to give law enforcement agencies the ability to monitor digital communications as they can the more easily captured analog messages, as required by a 1994 law. In an Aug. 15 letter to the Federal Communications Commission, Michael Altschul, the association's senior vice president and general counsel, said its members can't meet the Sept. 30 deadline for the technology. "If the industry is not provided the guidance and time to develop solutions for packet surveillance that intercept only the target's communications, it seems probable that Carnivore, which intercepts all communications in the pathway without the affirmative intervention of the carrier, will be widely implemented," Altschul wrote. Altschul said in an interview that the FBI has told industry officials it would use Carnivore in the absence of another system. "It could well be a huge expansion of the use of Carnivore," he said. The FBI said in a prepared statement yesterday: "We have never proposed or planned to have Carnivore used as a solution for . . . compliance." A spokesman said Internet service providers are now so adept at meeting the technical demands of approved surveillance of suspects' Internet traffic that the FBI has used Carnivore only twice this year. The spokesman declined to say whether the FBI would use Carnivore – now known in the agency as DCS1000 – to capture communications handled by telephone carriers. Privacy advocates agreed with Altschul that the industry's technical problems could mean an expansion of Carnivore use. David Sobel, general counsel of the Electronic Privacy Information Center, said the FBI has not demonstrated that it can narrowly target the system. That raises the prospect that it will collect information from many people's communications while searching for a suspect's communications. "It opens the door to the collection of communications of people who aren't even named in [court] orders," Sobel said. Law enforcement agencies use two legal methods to collect information about suspects' communications. Under federal "pen register" procedures, authorities need only say that call information is relevant to an investigation to get court permission to obtain the origin or destination of electronic communication to and from a suspect. Those rules do not allow authorities to capture the content of communication. But Sobel and Altschul said Carnivore cannot separate address information from the content of a message in a packet, and so authorities must be trusted to weed out data they are not allowed by law to have. The standard is much higher to obtain the content of e-mail or telephone calls. It requires authorities to show probable cause that a crime has been committed and secure a court order signed by a judge. In 1998, federal authorities used the pen register procedures more than 7,300 times to obtain phone logs. That same year, federal and state authorities received 1,329 court orders to capture the content of communications. An official at the Federal Communications Commission declined to discuss Altschul's letter but said the agency intends to decide soon whether it will extend the deadline for meeting the law's requirement.
[CTRL] Carnivore News
FBI's e-mail surveillance tool questioned WASHINGTON (November 17, 2000 2:43 p.m. EST ) - The FBI's controversial e-mail surveillance tool can retrieve all communications that go through an Internet service - far more than FBI officials have said it does - a recent test of its potential sweep found, according to bureau documents. An FBI official involved with the test of the tool known as Carnivore stressed Friday that although Carnivore has the ability to grab a large quantity of e-mails and Web communications, current law and specific court orders restrict its use. Neverthe! less, privacy experts said they are worried about the breadth of Carnivore's capability and questioned why the FBI even conducted such a test in June if it intends to use the tool only for narrow purposes. "That really contradicts the explanation that the FBI has provided as to the purpose of the system and how it works," said David Sobel, general counsel for the Washington-based Electronic Privacy Information Center. "We've been led to believe that the purpose of Carnivore is to filter and pinpoint the particular communications that the FBI is authorized to obtain. If that's true, then why are they testing the system's ability to store and archive everything?" Sobel's group recently obtained the FBI documents providing the test results as part of litigation it brought under the Freedom of Information Act. In the lab report, FBI officials said Carnivore "could reliably capture and archive all unfiltered traffic to the interna! l hard drive" and could save the information on removable high-capacity disks as well. Marcus Thomas, head of the FBI's cybertechnology section, said in an interview with The Associated Press that the test was done only to check Carnivore's "breaking point." He said the tool wouldn't be used to capture broad swaths of Internet communications in a real-world situation. Thomas was one of the FBI agents who approved the lab report. "Certainly, in operation, you could set the filters up to do nothing," Thomas said. "But our procedures are very detailed, we'll only do what we're allowed to in a court order." The difference of opinion is the latest in what has become a debate between Carnivore's capabilities and its actual use. While law enforcement officials have admitted that Carnivore can capture much more than e-mail, including Internet chats and Web browsing, FBI officials insist it is only used to copy e-mail to or from a crimina! l suspect in accordance with a court order. Opponents say the "black box" nature of the system keeps the public from knowing what it can really do, and its installation at an Internet provider may cause network problems. The Electronic Privacy Information Center started receiving batches of Carnivore-related material in October, after a court ordered the FBI to release the information. EPIC representatives said they have received about 550 pages so far, and expect to get only about 30 percent of the 3,000 documents related to Carnivore. Most of the release documents have large portions blacked out. FBI officials say Carnivore has been used in about 25 cases, most involving national security. Congress considered several measures this year to rein in Carnivore, but none survived. Lawmakers have said that they may consider measures again next year. An independent review of Carnivore was ordered by Attorney General Janet Reno, an! d that report was due to be received by the Justice Department on Friday, Justice spokeswoman Chris Watney said. Watney said the report is expected to be released to the public early next week, after it is edited to eliminate references to Carnivore's internal blueprints and other sensitive material. http://interestalert.com/brand/siteia.shtml?Story=storage/remote_n/1117aaa06909.nandSys=v2oFilter=Late%20BreakingFid=LATEBRKN
[CTRL] Carnivore monitors email -- and more
-Caveat Lector- Original Message Follows From: "Marpessa Kupendua" [EMAIL PROTECTED] To: undisclosed-recipients:; Subject: !*Carnivore monitors email -- and more Date: Wed, 18 Oct 2000 23:33:55 -0500 (CDT) FORWARDED MESSAGE === From: Michael Novick [EMAIL PROTECTED] Sent: Monday, October 16, 2000 6:45 PM Carnivore Details Emerge http://www.securityfocus.com/news/97 A web spying capability, multi-million dollar price tag, and a secret Carnivore ancestor are some of the details to poke through heavy FBI editing. By Kevin Poulsen October 4, 2000, WASHINGTON The FBI's Carnivore surveillance tool monitors more than just email. Newly declassified documents obtained by Electronic Privacy Information Center (EPIC) under the Freedom of Information Act reveal that Carnivore can monitor all of a target user's Internet traffic, and, in conjunction with other FBI tools, can reconstruct web pages exactly as a surveillance target saw them while surfing the web. The capability is one of the new details to emerge from some six-hundred pages of heavily redacted documents given to the Washington-based nonprofit group this week, and reviewed by SecurityFocus Wednesday. The documents confirm that Carnivore grew from an earlier FBI project called Omnivore, but reveal for the first time that Omnivore itself replaced a still older tool. The name of that project was carefully blacked out of the documents, and remains classified "secret." The older surveillance system had "deficiencies that rendered the design solution unacceptable." The project was eventually shut down. Development of Omnivore began in February 1997, and the first prototypes were delivered on October 31st of that year. The FBI's eagerness to use the system may have slowed its development: one report notes that it became "difficult to maintain the schedule," because the Bureau deployed the nascent surveillance tool for "several emergency situations" while it was still in beta release. "The field deployments used development team personnel to support the technical challenges surrounding the insertion of the OMNIVORE device," reads the report. The 'Phiple Troenix' Project In September 1998, the FBI network surveillance lab in Quantico launched a project to move Omnivore from Sun's Solaris operating system to a Windows NT platform. "This will facilitate the miniaturization of the system and support a wide range of personal computer (PC) equipment," notes the project's Statement of Need. (Other reasons for the switch were redacted from the documents.) The project was called "Phiple Troenix"apparently a spoonerism of "Triple Phoenix," a type of palm tree and its result was dubbed "Carnivore." Phiple Troenix's estimated price tag of $800,000 included training for personnel at the Bureau's Washington-based National Infrastructure Protection Center (NIPC). Meanwhile, the Omnivore project was formally closed down in June 1999, with a final cost of $900,000. Carnivore came out of beta with version 1.2, released in September 1999. As of May 2000, it was in version 1.3.4. At that time it underwent an exhaustive series of carefully prescribed tests under a variety of conditions. The results, according to a memo from the FBI lab, were positive. "Carnivore is remarkably tolerant of network aberration, such a speed change, data corruption and targeted smurf type attacks. The FBI can configure the tool to store all traffic to or from a particular Internet IP address, while monitoring DHCP and RADIUS protocols to track a particular user. In "pen mode," in which it implements a limited type of surveillance not requiring a wiretap warrant, Carnivore can capture all packet header information for a targeted user, or zero in email addresses or FTP login data. Web Surveillance Version 2.0 will include the ability to display captured Internet traffic directly from Carnivore. For now, the tool only stores data as raw packets, and another application called "Packeteer" is later used to process those packets. A third program called "CoolMiner" uses Packeteer's output to display and organize the intercepted data. Collectively, the three applications, Carnivore, Packeteer and CoolMiner, are referred to by the FBI lab as the "DragonWare suite." The documents show that in tests, CoolMiner was able to reconstruct HTTP traffic captured by Carnivore into coherent web pages, a capability that would allow FBI agents to see the pages exactly as the user saw them while surfing the web. Justice Department and FBI officials have testified that Carnivore is used almost exclusively to monitor email, but noted that it was capable of monitoring messages sent over web-based email services like Hotmail. An "Enhanced Carnivore" contract began in November 1999, the papers show, and will run out in January of next year at a total cost of $650,000. Some
[CTRL] Carnivore
-Caveat Lector- http://www.ubersoft.net/d/20001016.html http://www.ubersoft.net/d/20001017.html http://www.ubersoft.net/d/20001018.html ### As for [that truck almost hitting George Bush], political experts say that having your opponent almost get hit by a tractor trailer is just one of the many benefits Al Gore will receive after his recent endorsement by the AFL-CIO. --Saturday Night Live comic Colin Quinn A HREF="http://www.ctrl.org/"www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substancenot soap-boxingplease! These are sordid matters and 'conspiracy theory'with its many half-truths, mis- directions and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF="http://peach.ease.lsoft.com/archives/ctrl.html"Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF="http:[EMAIL PROTECTED]/"ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
[CTRL] Carnivore: a toe in the door
-Caveat Lector- http://www.foxnews.com/national/101300/carnivoretwo_riley.sml FBI's Carnivore Just the First Step in Internet Surveillance Monday, October 16 2000 by Patrick Riley FOX News Amid all the hubub over whether its Carnivore e-mail surveillance system violates privacy rights, the FBI has quietly been working to develop an even sharper-toothed information chomper The FBI says its controversial Carnivore system is just "the tip of the iceberg" when it comes to Internet surveillance because an even sharper-toothed information chomper is now in development. Amid all the hubbub over whether the current system violates privacy rights, the agency has been quietly working on both "Carnivore 2.0" and "Carnivore 3.0," according to FBI documents released this month under a Freedom of Information Act claim filed by the Electronic Privacy Information Center. The current Carnivore is version 1.3.4, according to the documents. An "Enhanced Carnivore" program has been under development since last November #151; under a $650,000 contract scheduled to end in January 2001. Most of the details on the souped-up snoopers were blacked out in heavy black marker before the papers were released. The Federal Bureau of Investigation makes no bones about its plans for the system, which sifts an Internet Service Provider's transmissions to track suspects' online activity. "As it looks today, it could be completely different a year from now," said FBI spokesman Paul Bresson. "Really, we've only seen the tip of the iceberg in terms of the change in technology." He said improving Carnivore is vital for keeping pace with criminal elements. "This is going to continue to be a cat-and-mouse game," he said. "There's always going to be software and other encryption technology that render a system less useful." He declined to give specific details. But privacy experts say an evolving Carnivore presents a problem for those trying to keep an eye on it. "It's a moving target," said David Banisar, a senior fellow at EPIC. "It means there needs to be continual oversight, not just onetime oversight. It means that if we get the source code we'll have to get the source code as it changes also, and do a re-analysis as the functions of the software change." The program's source code, the piece of information most sought after by activists trying to figure out if Carnivore reads the e-mail of more than just those targeted by a court order, was omitted from the 600-plus pages given to EPIC in the first of several planned releases. But the organization has vowed to continue fighting for it. Despite the incomplete technical blueprint, the newly public papers do shed some light on what sequels to Carnivore might look like. Three jargon-heavy lines of text that survived the FBI censor reveal that Version 2.0 will be capable of "built-in data analysis that Carnivore doesn't appear to do now," Banisar said. That means being able to display captured Internet data as soon as Carnivore intercepts it. The current system merely stores the data and two other programs #151; "Packeteer" and "Coolminer" #151; must be used to process and display it. No information was released from the Version 3.0 section but research mentioned elsewhere in the unclassified papers involves an aspect of the technology dubbed "Dragon Net" that captures telephone conversations held via the Web #151; a process known as "voice over IP" technology. Banisar suspects the FBI might also want its future sniffers to have the ability to track multiple targets simultaneously. That wouldn't bode well, he said. "The more capability it has to intercept more than one target, the more likely it is to be abused." While the current Carnivore is purely monogamous, it casts a wider net than commonly thought, according to an analysis of the FBI documents by anti-computer crime site SecurityFocus.com. Carnivore can "be programmed to watch for all the Internet activities of a particular person," said Kevin Poulson, editorial director at SecurityFocus and a former hacker. The system can even reconstruct Web pages viewed by a suspect. "All that's been talked about is its ability to monitor e-mail." C Associated Press. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed. C Reuters Ltd. All rights reserved. In light of this, said EPIC's Banisar: "It makes you wonder what else they could possibly want." A HREF="http://www.ctrl.org/"www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substancenot soap-boxingplease! These are sordid matters and 'conspiracy theory'with its many half-truths, mis- directions and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to
[CTRL] Carnivore Review Team Exposed!
-Caveat Lector- from:alt.conspiracy As, always, Caveat Lector Om K - Click Here: A HREF="aol://5863:126/alt.conspiracy:643876" Carnivore Review Team Exposed!/A - Subject: Carnivore Review Team Exposed! From: "www.wired.com web2news.pl" A HREF="mailto:Use-Author-Address-Header@[127.1]" Use-Author-Address-Header@[127.1]/A Date: Thu, Sep 28, 2000 4:47 AM Message-id: [EMAIL PROTECTED] Carnivore Review Team Exposed! 12:30 p.m. Sep. 27, 2000 PDT Call it the Curse of Carnivore. It was bad enough when word leaked out this summer that the FBI's electronic eavesdropping system went by the unfortunate, if eerily accurate, name of Carnivore. The Feds took another blow when researchers at MIT and other prestigious institutions refused to [ A HREF="http://www.wired.com/news/politics/0" http://www.wired.com/news/politics/0/A Full text at: A HREF="http://www.wired.com/news/politics/0,1283,39102,00.html" http://www.wired.com/news/politics/0,1283,39102,00.html/A Posted with: A HREF="http://www.deja.com/getdoc.xp?AN=596972256fmt=text" http://www.deja.com/getdoc.xp?AN=596972256fmt=text/A http: www wired com news politics 0,1283,39102,00 html web2news.pl - Aloha, He'Ping, Om, Shalom, Salaam. Em Hotep, Peace Be, All My Relations. Omnia Bona Bonis, Adieu, Adios, Aloha. Amen. Roads End A HREF="http://www.ctrl.org/"www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substancenot soap-boxingplease! These are sordid matters and 'conspiracy theory'with its many half-truths, mis- directions and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF="http://peach.ease.lsoft.com/archives/ctrl.html"Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF="http:[EMAIL PROTECTED]/"ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
[CTRL] CARNIVORE EATS FBI
from: http://www.skolnicksreport.com/carnivore.html Click Here: A HREF="http://www.skolnicksreport.com/carnivore.html"Sherman Skolnick's Report/A - CARNIVORE EATS FBI by Sherman H. Skolnick Remember Frankenstein's Monster? It turned on its creator. The Federal Bureau of Investigation created a system called CARNIVORE. It has become the Big Ear and the Big Eye at Internet Service Providers, ISPs, and Online Services. Without court orders, but with the apparent acquiescence if not complicity of e-mail servers, it intercepts and analyzes gargantuan amounts of e-mail supposedly for the FBI investigations. The Bureau-crazies have been spending too much time emulating George Orwell and his "Big Brother". Some believe it to be a spy system, an offshoot of PROMIS, super software used by secret political police, like the FBI, worldwide, to track so-called "terrorists", code word for those unfriendly to the Established Order. After all, in many big cities in the U.S., the FBI is quietly using PROMIS with its zillion lines of code, as software for federal prosecutors and other federal agents case management, software stolen from its rightful owners, INSLAW. By the way, one of the super-secrets of the Microsoft Affair, is that the Justice Department and their step-sister, FBI, stole and are using copyright software of Microsoft without paying royalties. If it dared, Microsoft could blow apart the Justice Department's Anti-Trust case against it by counter-claiming for theft of Microsoft's intellectual property. The Internal Revenue Service, however, could jump in, claiming Microsoft, despite its out-of-this-world revenue, pays NO TAXES and is a frightful tax evader. Auditors familiar with Microsoft's accounting system contend the software bogeyman is technically if not actually bankrupt, with billions of shares issued and peddled, on which it pays no dividends, enriching insiders with various dark mirror, money-siphoning tricks. Microsoft, its judges, and its bankers, are all in a position to know the truth of Microsoft with its Macbeth's cyber witches, and their bookkeepers kettle, reportedly cooking the software Monster's books. Foreign intelligence operatives are reportedly laughing about all this, all the way to their windowless "sterile" rooms, supposedly themselves exempt from interception. They have found a way to REVERSE the FBI's CARNIVORE evil robot. At the hands of these spooks and their computer wizards, the FBI system has reportedly become a devilish turn-the-tables burrowing tool, digging out the Bureau's own family jewels. FBI's super-secret Counter-Intelligence inner sanctum, Division Five, has reportedly been exposed and unmasked, at least to the inside delight of foreign intelligence hackers, or those claiming to be. A super computer honcho, asked by us about all this, confirms that reversing the FBI's spy device is a known great possibility if not an immense actuality. "The Bureau", he told us, "has either shown their incompetence or has been infiltrated. Reversal is known to be possible by appropriate software, with 'trap doors', not just by counter-spies compromising from inside the Bureau." A retired Central Intelligence "black operations" agent when asked about this, said: "The Bureau should have known better. Reversing their spy machine serves them right", adding "Of course, since its birth, 'The Firm' has viewed FBI as a meddling, incompetent would-be competitor which should not be operating offices as they do overseas." Funny thing. Publicly, the so-called "American Civil Liberties Union" was among the first in July, 2000, to supposedly rail against CARNIVORE as an invasion of privacy issue. As a legal entity, however, ACLU ceased to exist in 1967, and was at that time taken over by the Roger Baldwin Foundation and a team of related so-called tax-exempt entities reportedly financed, at least in part, through covert funding by the American CIA passed through other Foundations to hide the tracks. The alleged "American Civil Liberties Union" has been in the forefront of those reportedly watering down the Freedom of Information Act, exempting the CIA from certain disclosures. Masquerading as the alleged "American Civil Liberties Union", the Roger Baldwin Foundation has helped screw up the FOIA by leaning on plyable members of Congress. This done to the detriment of common Americans seeking divulging of records to understand the operations of their government. Do not count on the alleged ACLU telling you about how the FBI CARNIVORE devices have been reversed. At the time the ACLU was taken over in 1967, there was a now-forgotten huge CIA-Foundation scandal, exposing how the CIA manipulates dissidents through layers of "foundations" to disguise covert funding. [Check the New York Times INDEX volume in a good reference library for the summary of stories of 1967. Bobby Kennedy played a role in fingering this mess, probably an additional reason for his assassination in 1968. President
[CTRL] Carnivore, etc...
http://news.cnet.com/news/0-1005-200-2257522.html http://www.nytimes.com/library/tech/00/07/biztech/articles/14net-wiretap.html http://www.nytimes.com/library/politics/071400email-inquiry.html *** NOTICE: In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. Feel free to distribute widely but PLEASE acknowledge the source. *** http://www.angelfire.com/mi/smilinks/thirdeye.html A HREF="http://www.ctrl.org/"www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substancenot soap-boxingplease! These are sordid matters and 'conspiracy theory'with its many half-truths, mis- directions and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF="http://peach.ease.lsoft.com/archives/ctrl.html"Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF="http:[EMAIL PROTECTED]/"ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om