- Carnivore (software)
-
Federal Bureau of Investigation Common name Federal Bureau of Investigation Abbreviation FBI Seal of the Federal Bureau of Investigation agency information Motto Fidelity, Bravery, Integrity Agency overview Formed July 26, 1908 Employees 35,437[1] (May 31, 2011) Annual budget 7.9 billion USD (2010)[1] Legal personality Governmental: Government agency Jurisdictional structure Federal agency
(Operations jurisdiction)United States Legal jurisdiction As per operations jurisdiction. Governing body United States Congress Constituting instrument United States Code Title 28 Part II Chapter 33 General nature - Federal law enforcement
- Civilian agency
Operational structure Headquarters J. Edgar Hoover Building, Washington, D.C. Sworn members 13,963 (May 31, 2011)[1] Unsworn members 21,474 (May 31, 2011)[1] Agency executives - Robert S. Mueller III, Director
- Timothy P. Murphy, Deputy Director
- List of FBI Directors, Other directors
Child agencies Major units 5- Behavioral Analysis Unit (BAU)
- Law Enforcement Bulletin Unit (LEBU)
- Hostage Rescue Team (FBI) (HRT)
- Joint Terrorism Task Force (JTTF)
- FBI Police
- National Security Branch (NSB)
Field offices 56 (List of FBI Field Offices) Notables People - John Edgar Hoover, Director, for being the founding director
- William Mark Felt, former Federal Agent, for whistle blowing, Watergate scandal
- Joseph Leo Gormley, Forensic Scientist, for expert testimony
Significant Operations Website fbi.gov
this informationCarnivore was a system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. It used a customizable packet sniffer that can monitor all of a target user's Internet traffic. Carnivore was implemented in October 1997 and replaced in 2005 with improved commercial software such as NarusInsight.[2]
Contents
Configuration
The Carnivore system was a Microsoft Windows-based workstation with packet-sniffing software and a removable disk drive.[3] This computer must be physically installed at an Internet service provider (ISP) or other location where it can "sniff" traffic on a LAN segment to look for email messages in transit. The technology itself was not highly advanced — it used a standard packet sniffer and straightforward filtering. The critical components of the operation were the filtering criteria. To accurately match the appropriate subject, an elaborate content model was developed.[4]
Placement
The Carnivore system could be installed on a system either through the cooperation of the system owner, or by use of a court order. Once in place, the system was restricted by U.S. Federal law[citation needed] to only monitor specific persons. Under the current regulations, publicly acknowledged government personnel are required to get a warrant or court order naming specific people or email addresses that may be monitored.[citation needed] When an email passes through that matches the filtering criteria mandated by the warrant, the message is logged along with information on the date, time, origin and destination. This logging was believed to be relayed in real time to the FBI. All other traffic would presumably be dropped without logging or capture.[citation needed]...
Controversy
Several groups expressed concern regarding the implementation, usage, and possible abuses of Carnivore. In July 2000, the Electronic Frontier Foundation submitted a statement to the Subcommittee on the Constitution of the Committee on the Judiciary United States House of Representatives detailing the dangers of such a system.[5] The Electronic Privacy Information Center also made several releases dealing with it[6]
The FBI countered these concerns with statements highlighting the target-able nature of Carnivore. Assistant FBI Director Donald Kerr was quoted as saying:
The Carnivore device works much like commercial "sniffers" and other network diagnostic tools used by ISPs every day, except that it provides the FBI with a unique ability to distinguish between communications which may be lawfully intercepted and those which may not. For example, if a court order provides for the lawful interception of one type of communication (e.g., e-mail), but excludes all other communications (e.g., online shopping) the Carnivore tool can be configured to intercept only those e-mails being transmitted either to or from the named subject. ... [it] is a very specialized network analyzer or "sniffer" which runs as an application program on a normal personal computer under the Microsoft Windows operating system. It works by "sniffing" the proper portions of network packets and copying and storing only those packets which match a finely defined filter set programmed in conformity with the court order. This filter set can be extremely complex, and this provides the FBI with an ability to collect transmissions which comply with pen register court orders, trap & trace court orders, Title III interception orders, etc.... ...It is important to distinguish now what is meant by "sniffing." The problem of discriminating between users' messages on the Internet is a complex one. However, this is exactly what Carnivore does. It does NOT search through the contents of every message and collect those that contain certain key words like "bomb" or "drugs." It selects messages based on criteria expressly set out in the court order, for example, messages transmitted to or from a particular account or to or from a particular user.[7]
After prolonged negative coverage in the press, the FBI changed the name of its system from "Carnivore" to the more benign-sounding "DCS1000." DCS is reported to stand for "Digital Collection System"; the system has the same functions as before. The Associated Press reported in mid-January 2005 that the FBI essentially abandoned the use of Carnivore in 2001, in favor of commercially available software, such as NarusInsight (a mass surveillance system).[8]
See also
- Communications Assistance For Law Enforcement Act
- Total Information Awareness
- Surveillance
- COINTELPRO
- Echelon NSA worldwide digital interception program
- Room 641A NSA interception program (started circa 2003, but first reported in 2006)
- Policeware
References
- ^ a b c d "Quick Facts". Federal Bureau of Investigation. http://www.fbi.gov/quickfacts.htm. Retrieved 2009-11-20.
- ^ "FBI Ditches Carnivore Surveillance System". Associated Press. Foxnews.com. 2005-01-18. http://www.foxnews.com/story/0,2933,144809,00.html. Retrieved 2008-10-29.
- ^ "How Carnivore Email Surveillance Worked". about.com. http://email.about.com/od/staysecureandprivate/a/carnivore.htm. Retrieved 2008-10-29.
- ^ http://www.securityfocus.com/news/97
- ^ http://www.eff.org/Privacy/Surveillance/Carnivore
- ^ http://www.epic.org/privacy/carnivore/foia_documents.html
- ^ Richard F. Forno, Who's Afraid of Carnivore? Not Me, cryptome.org, May 2005.
- ^ "FBI Ditches Carnivore Surveillance System". Associated Press. Foxnews.com. 2005-01-18. http://www.foxnews.com/story/0,2933,144809,00.html. Retrieved 2008-10-29.
External links
Categories:
Wikimedia Foundation. 2010.