Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: Carnivore

Related Topics

In the News (Wed 24 Apr 19)

 Carnivore (FBI) - Wikipedia, the free encyclopedia
Carnivore is a name given to a system implemented by the Federal Bureau of Investigation that is analogous to wiretapping except in this case, email and other communications are being tapped instead of telephone conversations.
Carnivore was essentially a customizable packet sniffer that could monitor all of a target user's Internet traffic.
The Carnivore device works much like commercial "sniffers" and other network diagnostic tools used by ISPs every day, except that it provides the FBI with a unique ability to distinguish between communications which may be lawfully intercepted and those which may not.
en.wikipedia.org /wiki/Carnivore_(FBI)   (711 words)

 Carnivore FAQ (Frequently Asked Questions)   (Site not responding. Last check: 2007-10-21)
Carnivore is used in two ways: as a "content-wiretap" and a "trap-and-trace/pen-register".
Carnivore is widely publicized and many ISP engineers have direct experience with Carnivore (and know where the boxes are placed); Echelon is much more secretive.
A Carnivore system located near the sender can only discover that the suspect is sending e-mail to a remailer, but cannot discover who the destination is. Likewise, a Carnivore wiretap located at the recipient can only discover that a message was received from a remailer, but not who originally sent the e-mail.
corz.org /public/docs/privacy/carnivore-faq.html   (8366 words)

In 1985, the deranged chaos of Carnivore was finally contained in vinyl, as their self-titled debut album surfaced from beneath the tainted earth.
Following the release of 'Retaliation', Carnivore were at the peak of their career, and they were on the verge of breaking free from the confines of Brooklyn and spreading their brand of nuclear mayhem across the globe.
Carnivore may now only exist as a memory, you are free to walkthrough the rest of your days with their twisted ideology as your co-pilot: "If you can't eat it or fuck it, then kill it!
www.universal.nl /users/jgkoops/carnivore/carnivr.html   (740 words)

 I, Cringely . July 13, 2000 - Meet Eater | PBS   (Site not responding. Last check: 2007-10-21)
Carnivore is a sealed box that is installed at the network operations center of an Internet Service Provider.
Adding the Carnivore task is a simple matter of blind copying every packet to or from a bad guy to a third address at the J. Edgar Hoover FBI Building in Washington, DC.
And by doing it themselves with Carnivore, the FBI doesn't have to reveal the identity of the bad guy or extent to which it is using the box.
www.pbs.org /cringely/pulpit/pulpit20000713.html   (984 words)

 Carnivore - Cats Encyclopedia   (Site not responding. Last check: 2007-10-21)
Carnivores are animals that eat a diet consisting only of meat, whether it comes from live animals or dead (scavenging).
They may consume other products presented to them, especially animal products like cheese and bone marrow, or sweet sugary substances like honey and syrup, but, as these products are not essential, they do not need to consume these on a regular basis.
In contrast to the lion, these Emperor penguins show that teeth and claws aren't necessary to be a carnivore.
www.cats.tiptophot.com /cats/index.php?title=Carnivore   (391 words)

 Carnivore Article Part 1   (Site not responding. Last check: 2007-10-21)
Carnivore is a computer surveillance device system developed within the FBI that is installed and used together with a tap on the facilities of an Internet Service Provider.
As Carnivore creates a full copy of the data stream, the next step in the process is to filter the data so that only packets that are identified as being part of a transmission involving the target are actually copied for review by the investigators.
Given that use of Carnivore has been limited, highly trained personnel from FBI Headquarters have, so far, played a critical role in the implementation process, although there is no procedural requirement for their participation.
www.vjolt.net /vol6/issue2/v6i2-a10-Jennings.html   (5489 words)

 Carnivore FAQ (Frequently Asked Questions)
Therefore, if Carnivore misses a packet that was in the middle of an email message, this hole is clearly marked within the packet.
Carnivore is less capable than many programs people already have installed on their desktops.
Carnivore is probably susceptible to typical buffer overflow attacks (such as sending very large emails).
www.linuxsecurity.com /resource_files/documentation/carnivore-faq.html   (5326 words)

 Comments on the Carnivore System Technical Review   (Site not responding. Last check: 2007-10-21)
We applaud the DoJ and IITRI for their openness in the Carnivore review process, especially in light of the time constraints under which the review was conducted and the extraordinary sensitivity of critical law-enforcement surveillance technology.
As Carnivore is not in-line in the protocol, it is quite difficult and not always possible to detect missed or out-of-order packets.
It would also seem to be a good idea to capture the entire configuration of the machine after it is used; perhaps they could use a removable hard disk (as their only permanent storage, so that all software, everything would live on it), and after finishing an interception, put the the removable disk under seal.
www.cdt.org /security/carnivore/001203comments.html   (1953 words)

Carnivore rose from the ashes of Peter Steele & Josh Silver's band Fallout (for those who don't know, Peter & Josh are the cornerstones of Type O Negative).
Carnivore's persona was based upon the post-apocalyptic nuclear warrior, armed to the teeth with makeshift armor and wapons, killing his fellow man to stay alive.
Carnivore shows were quite an experience, as the band was rumored to chum the audience with buckets of animal entrails and blood.
www.angelfire.com /ri/typeoneg/carnivore.html   (885 words)

 Radical Software Group (RSG): CARNIVORE
Carnivore is created by RSG, an all-star collective of computer artists selected from cities around the world, and directed by Alex Galloway, artist, co-founder and co-director of the new media organization, Rhizome, New York.
Carnivore has recently been exhibited as part of the exhibition Open_Source_Art_Hack at The New Museum of Contemporary Art, New York City, May 2002.
Galloway insisted that he and his collaborators never meant it to be seen as a lightning rod for criticism of the F.B.I.'s system, even though his project seems to undercut the concept of covert surveillance by conducting it openly and prettifying what is unearthed.
www.firstpulseprojects.net /rsg.html   (498 words)

 Privacy at stake: The Carnivore is on the prowl   (Site not responding. Last check: 2007-10-21)
Carnivore is actually a part of the DragonWare Suite, which allows FBI to reconstruct e-mail messages, downloaded files and even WebPages.
Carnivore is actually a part of the DragonWare Suite, which allows FBI to reconstruct - e-mail messages, downloaded files or even WebPages.
Carnivore checks the headers of all e-mails traveling past the device and plucks out the ones it wants based on the search warrant's parameters.
www.ciol.com /content/news/trends/102070401.asp   (894 words)

 EFF Statement to House on Carnivore (July 28, 2000)
The Carnivore system appears to exacerbate the over collection of personal information by collecting more information than it is legally entitled to collect under traditional pen register and trap and trace laws.
We have been able to discover that Carnivore is a packet-sniffer, able to gather pen register and trap and trace information by sniffing each packet as it is routed along.
Allowing a system such as Carnivore to be used unchecked by law enforcement exacerbates the problem of over collection of data and has the potential to harm our open society.
www.eff.org /Privacy/Surveillance/Carnivore/20000728_eff_house_carnivore.html   (1345 words)

 The FBI's Carnivore   (Site not responding. Last check: 2007-10-21)
It is called "Carnivore" and was created by the FBI in response to the inability of an Internet Service Provider to discriminate communications from criminal suspects to the exclusion of all the other communications that the ISP handles.
Approval to use Carnivore is granted where probable cause can be demonstrated, where normal investigative methods may not work, or are too dangerous, and when prior electronic surveillance warrants further interest in the criminal subject.
Carnivore is designed to limit the material that can be viewed from its surveillance to just the data described and authorized by the electronic surveillance order.
www.infinisource.com /features/carnivore.html   (531 words)

 Surveillance Technology
Carnivore is a packet "sniffer" diagnostic tool that the FBI's Engineering Research Facility (ERF) in Quantico, Va. developed to covertly search for e-mails and other computer messages from criminal suspects.
Thus in order to make sense out of the billions of 1s and 0s passing by it, Carnivore has to be familiar with the most common applications used for Internet communications (e.g., MS Outlook E-mail and Lotus Notes E-mail) and their updates.
The FBI offered its presentation on the Carnivore program during the June 2000 meeting in order to demonstrate at least one of the means by which the FBI is conducting electronic surveillance pursuant to court orders.
www.tiaonline.org /standards/carnivore   (563 words)

 I, Cringely . August 3, 2000 - Carnivore 3.0 | PBS   (Site not responding. Last check: 2007-10-21)
You'll remember Carnivore is a sealed box that the FBI proposes to install in the Network Operations Centers of Internet Service Providers that are known to serve users who are criminal suspects and who are under a court-ordered e-mail tap.
The way it was originally explained, Carnivore boxes would copy and store e-mail to and from the bad guy for decryption and examination by appropriate officials.
And since the Carnivore boxes need to be directly in the flow of all e-mail at an ISP, this is doubly concerning.
www.pbs.org /cringely/pulpit/pulpit20000803.html   (1078 words)

 Define Carnivore - a Whatis.com definition
Carnivore was an Internet surveillance system developed for the U.S. Federal Bureau of Investigation (FBI) so that they could monitor the electronic transmissions of criminal suspects.
Critics, however, charged that Carnivore did not include appropriate safeguards to prevent misuse and might violate the constitutional rights of the individual.
EPIC, a public interest group dedicated to emerging civil liberties issues, was the chief critic of Carnivore and continues to be concerned about violations of privacy rights.
searchsecurity.techtarget.com /sDefinition/0,,sid14_gci508347,00.html   (322 words)

 Carnivore (2000)   (Site not responding. Last check: 2007-10-21)
Carnivore is more likely to be enjoyed by someone who thinks that Killer Klowns from Outer Space is a masterpiece.
Carnivore is one of those 'genetic experiments gone wild' films, with touches of the X-Files and an 80's slasher flick mixed into the stew.
Instead, Carnivore plays like an impeccable, hilarious spoof of its influences, sometimes approaching a spoof of a spoof, and at the same time seems like a lost horror gem from 1985 (its authenticity in that respect is incredible).
www.imdb.com /title/tt0251005   (928 words)

 BBC News | AMERICAS | Carnivore upsets privacy groups
Carnivore scans all the incoming and outgoing e-mail of people under surveillance.
In addition, the government told the ISP that the Carnivore system would be capable of capturing much more information than authorised under the court order, but that they would programme the system to target only information from a suspect's account.
Barry Steinhardt, Associate Director of the ACLU said that Carnivore "is comparable to allowing government agents to rip open Post Office mailbags and scan every piece of mail in search of one specific letter whose address they already know".
news.bbc.co.uk /1/hi/world/americas/831111.stm   (513 words)

 CNN.com - Technology - FBI says Carnivore will not devour privacy - July 21, 2000
According to the FBI, Carnivore works much like a "sniffer," a program that has been around for some time and is designed to monitor and analyze network traffic so as to help network administrators eliminate such problems as bottlenecks.
Before Carnivore can be used in a case, the FBI must go through several high-level judiciary approvals, and inform the relevant Internet service provider of its actions.
Attorney General Janet Reno said while she had been informed that Carnivore was in development, she learned from a newspaper article that the system had already been deployed in actual investigations.
archives.cnn.com /2000/TECH/computing/07/21/fbi.carnivore   (787 words)

 FBI retires its Carnivore
FBI surveillance experts have put their once-controversial Carnivore Internet surveillance tool out to pasture, preferring instead to use commercial products to eavesdrop on network traffic, according to documents released Friday.
Carnivore became a hot topic among civil libertarians, some network operators and many lawmakers in 2000, when an ISP's legal challenge brought the surveillance tool's existence to light.
Developed by a contractor, Carnivore was a customizable packet sniffer that, in conjunction with other FBI tools, could capture e-mail messages, and reconstruct Web pages exactly as a surveillance target saw them while surfing the Web.
www.securityfocus.com /news/10307   (478 words)

Carnivore Server is a set of Perl scripts running on top of tcpdump, an open source packet sniffer application widely available for Linux and Unix computers.
Carnivore Server is released under the GNU Public License.
Each Carnivore client application will be developed and released according to the wishes of its author.
rhizome.org /carnivore/index.php3   (519 words)

 Suck.com: Daily
It is no small irony that the inept fumbling of Carnivore could be the greatest boon to privacy — both legitimate and otherwise — that electronic communication has ever known.
A collection of independent reviewers has gone over the Carnivore code, of course — after several others passed, citing onerous FBI conditions — but their report has done exactly nothing to mollify critics.
Though the Bureau promises — cross their hearts — that Carnivore would never be used to invade anyone's privacy without a court order, their regard for the Fourth Amendment appears shaky at best.
www.suck.com /daily/2000/12/04/1.html   (1037 words)

 The Missing Amendment - The Right to Privacy   (Site not responding. Last check: 2007-10-21)
Carnivore was responsible for tracking down terrorist activities and detaining 400-500 suspects immediately following the attacks on the World Trade Center in 2001.
Carnivore was working on much smaller feeds and could not scale.
Carnivore does not work like a single-phone line wiretap; it must be installed on the public Internet where it filters through many otherwise uninvolved people's data to get to the subject(s) of interest.
www.themissingamendment.org /carnivore.htm   (1768 words)

 Wired News: Carnivore Can Read Everything
An FBI official involved with the test stressed Friday that although Carnivore has the ability to grab a large quantity of e-mails and Web communications, current law and specific court orders restrict its use.
Nevertheless, privacy experts said they are worried about the breadth of Carnivore's capability and questioned why the FBI even conducted such a test in June if it intends to use the tool only for narrow purposes.
While law enforcement officials have admitted that Carnivore can capture much more than e-mail, including Internet chats and Web browsing, FBI officials insist it is only used to copy e-mails to a criminal suspect or from a criminal suspect in accordance with a court order.
www.wirednews.com /news/politics/0,1283,40256,00.html   (774 words)

 FBI system covertly searches e-mail | Tech News on ZDNet
But legal challenges to the use of Carnivore are few, and judges' rulings remain sealed because of the secretive nature of the investigations.
FBI experts acknowledge that Carnivore's monitoring can be stymied with computer data such as e-mail that is scrambled using powerful encryption technology.
Most of the criminal cases where the FBI used Carnivore in the past 18 months focused on what the bureau calls "infrastructure protection," or the hunt for hackers, though it also was used in counterterrorism and some drug-trafficking cases.
news.zdnet.com /2100-9595_22-522071.html?legacy=zdnn   (1051 words)

 Archives -The 10 Truths of Network Troubleshooting   (Site not responding. Last check: 2007-10-21)
"Carnivore most likely performs multiple boolean filter operations and the Carnivore system must be placed in the path of the interesting data (i.e., at the appropriate ISP).
I am certain, however, that Carnivore must have a more complex filtering mechanism to automatically wade through the sea of mail and other data that would pass 'through' it and ensure that 'interesting mail' is captured.
In the case of Carnivore, however, we wouldn't want to see the data cross the wire a second time (encrypted or not) -- we'd want to 'dump' the data into a holding tank that is picked up by the authorities.
www.packet-level.com /archives/archives11.htm   (680 words)

Try your search on: Qwika (all wikis)

  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.