Reposting info that compliments the recent discussion on Echelon.
Carnivore, Sniffers, and You or SWIM
Printed from: WetDreams
Topic URL: http://www.wetdreams.ws/forum/topic.asp?TOPIC_ID=748
Printed on: Dec 01 2009
Topic:
--------------------------------------------------------------------------------
Topic author: ChesireCat
Subject: Carnivore, Sniffers, and You or SWIM
Posted on: Oct 11 2005 05:45:56
Message:
This should make everyone feel all warm and fuzzy.
This information is dated 5 years, but still worth reading. Sleep tight all, SWIM is going to go dig up a pipe and keep an eye on his cd-rom drive. Fucking thing... I know *they* are in there.. ;-)
----------------------------------------------------------------------
Recently the U.S. Federal Bureau of Investigation (FBI) unveiled a new tool in their ongoing fight against crime -- a controversial network sniffer named -- you guessed it -- Carnivore. Not all of the details on Carnivore have been released yet, but already the beast has some networking professionals and privacy advocates fit to be tied!
Just like my local restaurant, Carnivore probably intimidates or offends some people just because of its name. Good advertising and "branding" can make or break a business. Also like the restaurant, Carnviore faces some serious competition. Network sniffers are nothing new, and already some alternatives to the secretive Carnivore system have been discussed.
How Carnivore Behaves
"Electronic surveillance has been extremely effective in securing the conviction of more than 25,600 dangerous felons over the past 13 years" - FBI
The Carnivore system consists of an ordinary personal computer running Microsoft Windows 2000 or Windows/NT and some proprietary (closed-source) software [1]. Carnivore's primary purpose is to intercept large volumes of electronic mail and other forms of electronic communication passing through a network [2]. This listening process remains passive at all times; it alters no data and prevents no messages from continuing on to their intended destination.
Carnivore can theoretically scan millions of emails per second -- processing as much as six gigabytes (6,000 megabytes) of data every hour [3]. It targets data much more selectively in practice. By scanning the subject lines and headers of incoming or outgoing messages, the system identifies relevant communications among selected individuals as part of a criminal investigation. Data deemed useful can be off-loaded onto removable drives and retrieved through secure dial-up sessions.
"The system is not susceptible to abuse because it requires expertise to install and operate, and such operations are conducted, as required in the court orders, with close cooperation with the ISPs." Source: FBI
The FBI named this system "Carnivore" in reference to its objective of collecting hard or "meaty" data. However, Carnivore captures only the raw bits of information. Messages that users encrypt with readily-available tools like PGP, for example, are not "cracked" by the system. Decoding these messages "offline" can require serious effort on the part of investigators.
Pasted from: http://compnetworking.about.com/od/networksecurityprivacy/l/aa071900a.htm
Carnivore, Sniffers, and You or SWIM
Printed from: WetDreams
Topic URL: http://www.wetdreams.ws/forum/topic.asp?TOPIC_ID=748
Printed on: Dec 01 2009
Topic:
--------------------------------------------------------------------------------
Topic author: ChesireCat
Subject: Carnivore, Sniffers, and You or SWIM
Posted on: Oct 11 2005 05:45:56
Message:
This should make everyone feel all warm and fuzzy.
This information is dated 5 years, but still worth reading. Sleep tight all, SWIM is going to go dig up a pipe and keep an eye on his cd-rom drive. Fucking thing... I know *they* are in there.. ;-)
----------------------------------------------------------------------
Recently the U.S. Federal Bureau of Investigation (FBI) unveiled a new tool in their ongoing fight against crime -- a controversial network sniffer named -- you guessed it -- Carnivore. Not all of the details on Carnivore have been released yet, but already the beast has some networking professionals and privacy advocates fit to be tied!
Just like my local restaurant, Carnivore probably intimidates or offends some people just because of its name. Good advertising and "branding" can make or break a business. Also like the restaurant, Carnviore faces some serious competition. Network sniffers are nothing new, and already some alternatives to the secretive Carnivore system have been discussed.
How Carnivore Behaves
"Electronic surveillance has been extremely effective in securing the conviction of more than 25,600 dangerous felons over the past 13 years" - FBI
The Carnivore system consists of an ordinary personal computer running Microsoft Windows 2000 or Windows/NT and some proprietary (closed-source) software [1]. Carnivore's primary purpose is to intercept large volumes of electronic mail and other forms of electronic communication passing through a network [2]. This listening process remains passive at all times; it alters no data and prevents no messages from continuing on to their intended destination.
Carnivore can theoretically scan millions of emails per second -- processing as much as six gigabytes (6,000 megabytes) of data every hour [3]. It targets data much more selectively in practice. By scanning the subject lines and headers of incoming or outgoing messages, the system identifies relevant communications among selected individuals as part of a criminal investigation. Data deemed useful can be off-loaded onto removable drives and retrieved through secure dial-up sessions.
"The system is not susceptible to abuse because it requires expertise to install and operate, and such operations are conducted, as required in the court orders, with close cooperation with the ISPs." Source: FBI
The FBI named this system "Carnivore" in reference to its objective of collecting hard or "meaty" data. However, Carnivore captures only the raw bits of information. Messages that users encrypt with readily-available tools like PGP, for example, are not "cracked" by the system. Decoding these messages "offline" can require serious effort on the part of investigators.
Pasted from: http://compnetworking.about.com/od/networksecurityprivacy/l/aa071900a.htm


wait, is the right bromide? 

