FBI retires Carnivore

Status
Not open for further replies.

Faithless

Member
Joined
Feb 27, 2004
Messages
141
By Kevin Poulsen, SecurityFocus
Published Saturday 15th January 2005 10:41 GMT


FBI surveillance experts have put their once-controversial Carnivore Internet surveillance tool out to pasture, preferring instead to use commercial products to eavesdrop on network traffic, according to documents released Friday.

Two reports to Congress obtained by the Washington-based Electronic Privacy Information Center under the Freedom of Information Act reveal that the FBI didn't use Carnivore, or its rebranded version "DCS-1000," at all during the 2002 and 2003 fiscal years. Instead, the bureau turned to unnamed commercially-available products to conduct Internet surveillance thirteen times in criminal investigations in that period.

Carnivore became a hot topic among civil liberations, some network operators and many lawmakers in 2000, when an ISP's legal challenge brought the surveillance tool's existence to light. One controversy revolved around the FBI's legally-murky use of the device to obtain e-mail headers and other information without a wiretap warrant -- an issue Congress resolved by explicitly legalizing the practice in the 2001 USA PATRIOT Act.

Under section 216 of the act, the FBI can conduct a limited form of Internet surveillance without first visiting a judge and establishing probable cause that the target has committed a crime. In such cases the FBI is authorized to capture routing information like e-mail addresses or IP addresses, but not the contents of the communications.

According to the released reports, the bureau used that power three times in 2002 and six times in 2003 in cases in which it brought its own Internet surveillance gear to the job. Each of those surveillance operations lasted sixty days or less, except for one investigation into alleged extortion, arson and "teaching of others how to make and use destructive devices" that ran over eight months from January 10th to August 26th, 2002.

Other cases investigated under section 216 involved alleged mail fraud, controlled substance sales, providing material support to terrorism, and making obscene or harassing telephone calls within the District of Columbia. The surveillance targets' names are not listed in the reports.

In four additional cases, twice each in 2002 and 2003, the FBI obtained a full-blown Internet wiretap warrant from a judge, permitting them to capture the contents of a target's Internet communications in real time. No more information on those cases is provided in the reports because they involved "sensitive investigations," according to the bureau.

The new documents only enumerate criminal investigations in which the FBI deployed a government-owned surveillance tool, not those in which an ISP used its own equipment to facilitate the spying. Cases involving foreign espionage or international terrorism are also omitted.

Developed by a contractor, Carnivore was a customizable packet sniffer that, in conjunction with other FBI tools, could capture email messages, and reconstruct web pages exactly as a surveillance target saw them while surfing the web. FBI agents lugged it with them to ISPs that lacked their own spying capability.

Cited from
 
ditto Only1Asterisk.

And as I recall, carnivore wasn't for tapping known suspects, which is pretty easy to do (all you need is a 14 year old kid with a script), it was for sieving data from the stream for suspicious patterns.

Data Mining is ENTIRELY DIFFERENT from digital "wiretapping".
 
"...teaching of others how to make and use explosive devices?"

Oh, My! Floating somewhere around here in the clutter, is US Army FM-abunchanumbers, having to do with making expedient, improvised, explosive gizmos. It has articles on fougasses, and flame fougasses, and picric acid recipes, and swelling-wet-rice delay timers, and urea nitrates, &cetera &cetera.

I mean, that's an official US Army document (though it's a commercial reprint) lent to me by the retired US Army (Ordnance, cackle) officer who lives next door!

It's ohhkaaay to know how to blow things up, it's fun to blow things up, just play safe and don't blow up any person or thing which doesn't deserve it!
 
Obviously they have something better now, the FBI has the No Such Agency. When you unite all the intelligence agencies you build something big. Echelon has been around for decades, uses Britain and Canada in a tri-partite pact to elude constraining national laws.

New software not only reads every e-mail sent for certain words, it has adaptive pattern-recognition software. If you are being 'sneaky' and it seems that 'Birthday Cake' might not really mean 'Birthday Cake' then your message is flagged for further inspection. That's just what is released in public media, imagine what they don't tell you they can do. Oh yes, btw it's not just e-mails, all telephone conversations are screened through the same process, and probably a lot of other things (when your workplace isn't screening them first for slacker content).
 
All phone communication is screened. All phone communication is digital today. It is compressed and filtered by the NSA. They run every single word said on a phone through massive super computers that are equipped with advanced voice recognition. Key words are searched for. Key words can trigger recording and instant tracking.


While no one can prove this for fact, all one has to do is read about the type of supercomputing horsepower that the NSA has always been interested in. Most supercomputers are used for doing simulations of nuclear weapons (we can test new nukes while forcing other nations to stagnate in development because of the test ban treaty), planatary movements, earthquakes, weather, plate techtonics, etc....


Those supercomputers are so massive, so immense they just amaze. And those are only the declared commercial supercomputers. You cannot export these computers without government approval. Even their use is monitored by the government. All supercomputers used at universities or commercial locations are 100% monitored by the government to insure their time is never spent running any operation not approved by the government.

NSA and other governments need that sort of massive supercomputing power only for 2 possible tasks. REAL TIME world wide voice screening, and REAL TIME world wide encryption breaking. Those are the only 2 things that they could possibly ever use that much raw power for. Just think, an OLD Cray supercomputer can currently run the entire EARTH's financial transactions in real time with no problem. We are talking everything.


BTW, the speed and power of government supercomputers is classified. However, they were using supercomputers that are still in the top 20 commercial supercomputer speed list over 20 years ago.....HMMMMM
 
D.T.O.M. "BTW, the speed and power of government supercomputers is classified. However, they were using supercomputers that are still in the top 20 commercial supercomputer speed list over 20 years ago.....HMMMMM"

Otherwise yes, it is humilitatingly scary how powerful the NSA is, and their new-found freedom to use their powers. IIRC they used to have several acres of linked computers for nothing but decryption, acres! I still can't quite grasp how a computer can tell if you are using 'golf-bag' as a code-word or not, but it is safe to assume that while you may be planning a surprise birthday party, you are also accruing suspicion.

A classmate did a study of privacy laws back in 2000, and his summation was, "Have you seen that Will Smith movie 'Enemy of the State'? That's pretty much realistic, all of that."
 
Echelon was (is) an agreement between Britain Canada and the USA to spy on each other's citizens, because laws prevented the goverments from doing it to their own citizens. I think Britain still houses one of the most sophisticated listening arrays in the world, but echelon is out of date - they don't need to hire other people to spy on us now.
 
Contrary to popular belief, Carnivore was a just a government contractor written packet sniffer. Just another run of the mill packet sniffer. Not a great one at that. Versions only were written for Solaris and NT. Better programs are included with Linux by default.

Echelon is more of a world wide surveillance network. All of the G7 (G8 now, I think) countries agreed to pool their signal intelligence resources. So, America spies on Canadian citizens (which is legal), Canada spies on American citizens (which is legal), and they trade information (which is legal). If the NSA were to actively spy on American citizens without Congressional oversight, they'd get in trouble. If they got the same info from the Canucks, it's ok.

"Oh what a tangled web we weave when we practice to deceive."

Telcos have always have a comfy relationship with the NSA. NSA gave them cutting edge technology in exchange for cooperation. For instance, an ATT won a contract to build a switching center in a hostile third world country. Included was a backdoor that'd kill the entire communications system of that country if we ever decided to invade. (The NSA could intercept the information anyways. This would allow them to have the ability to turn off the phones.)
 
Incidentally, I read a good tech article a few years back that demonstrated that general purpose super computers are not the best tool for factoring large primes, which is the central task of modern code breaking.

As I recall, special purpose machinery designed and built for the purpose of factoring numbers was a lot faster and cheaper way to go, but since the only commercial application is in fact code breaking, they're pretty much either academic novelties or line items on The Black Budget.
 
As I recall, special purpose machinery designed and built for the purpose of factoring numbers was a lot faster and cheaper way to go, but since the only commercial application is in fact code breaking, they're pretty much either academic novelties or line items on The Black Budget.

We have those too.

The acres of server farms are meant to handle the mountain of patches from Microsoft. :neener:
 
NSA and other governments need that sort of massive supercomputing power only for 2 possible tasks. REAL TIME world wide voice screening, and REAL TIME world wide encryption breaking. Those are the only 2 things that they could possibly ever use that much raw power for. Just think, an OLD Cray supercomputer can currently run the entire EARTH's financial transactions in real time with no problem. We are talking everything.


They don't monitor mine!
(I like big toys, guns and otherwise :)

onyx2-3rack-install.JPG


The restrictions you stare are a bit more than acctually happens. Ie, few univs if any are monitored on the job level. Sales logs however are likely scrutinized. (good, I bought mine used, doubt they even know I have it. :)

However, I cannot legally export this machine, nor can a university export their bigger units. I'm sure some of the larger ones are logged if/when they move geographic location.
 
The sheer might of the NSA is scary.

They are the largest employer in the state of Maralyand.

If public, they would be a Fortune 500 (or was it 100?) company.

They are HUGE, and really do have acres of datacenter floor, used for goodness knows what.

All that Enemy of the State ???? is about 20 years out of date.
 
I find it amazining that with this capability to sort of see all and know all, somewhere, someone that knows something as to the location of OBL hasn't slipped and they nabbed that data or comment.

If all this stuff was as powerful as one would think, statistically by now surely the bgs that know where he is would have made a comment and the trackers would have detected that slip.

Of course one assumes they are looking for him more than they are looking at us with all these contraptions. I sure hope that's the case.

S-
 
Was that fund or find....?
Fund, I don't know but I think not in a million years, personally.
Find, don't the periodic tapes and videos indicate they haven't located him.

If they have found him, why would they keep that hidden from the public?


TC,
S-
 
I read an industry report on hard drives and at one point it broke down the buyers of magnetic storage (hard drives). The government for use of servalience was by far at the top.
 
BTW, the speed and power of government supercomputers is classified. However, they were using supercomputers that are still in the top 20 commercial supercomputer speed list over 20 years ago.....HMMMMM
Supercomputers are out. Distributed computing is in.
 
The printed circuit board has been outdated for a good while.They were to slow.There is a limit to the multi layered boards to increase speed.New technology exist that is amazing.Very few exist.To tag a computer now you just get a program that comes in with your firewall are virus software from your vendor.I may still have a copy of the norton firewall that uploaded to a phony network provider in california with two customers.As for as net monitoring the fuzzy logic programs are very very good.Israel has helped us a lot.They are the best because they have been at it a long time.The CIA is pretty much worthless.The CIA and the DOD use to spend a lot of time spying on each other and probably still do.The people that do the real work are not in the military because you can not be subject to the UCMJ and still do your work.The FBI is ok but still has to follow to many rules.The DOD is devided into a very long list of seperate operations.NSA and DOD are sisters.

Ed
 
Status
Not open for further replies.
Back
Top