Download CARNIVORE

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer security wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Deep packet inspection wikipedia , lookup

Hacker wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Net bias wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Content-control software wikipedia , lookup

Green Dam Youth Escort wikipedia , lookup

Transcript
CARNIVORE
And Other Computer Spy Programs
What is Carnivore?
Carnivore helps the FBI conduct ‘wiretaps’ on
Internet connections.
Carnivore is a computer-based system that is
designed to allow the FBI, in cooperation with an
Internet.
Service Providers (ISPs), have to comply with
court orders requiring the collection of certain
information about emails or other electronic
communications to or from a specific user targeted
in an investigation.
The “Packet Sniffer”
All Internet traffic is broken down into
bundles called "packets".
Carnivore eavesdrops on these packets
watching them go by, then saves a copy of
the packets which meet certain criteria, that
are of interest.
Carnivore Continued
Hardware is plugged directly into the
network at a central location.
It’s the electronic equivalent of listening to
everybody's phone calls to see if it’s the
phone call you should be monitoring.
The Carnivore Box
The Carnivore Box is a COTS (Commercial Off The Shelf)
Windows NT (or Windows 2000) computer system with
128-megabytes of RAM, a Pentium III, 4-18 gigabytes of
disk space, and a 2G Jaz drive where evidence is saved.
The software is written in C++.
The box has no TCP/IP protocol use (so it cannot get
hacked into).
A hardware authentication device is used to control access
to the box (preventing ISP personnel from accessing the
device without leaving visible signs of damage).
The Carnivore Box Continued
Use of a "network isolation device", which is probably a
Shomiti or NetOptics tap, this prevents the box from
transmitting even if a hacker where able to break in
somehow.
COTS "communications software“ which means possible
use of a commercial off-the-shelf application to send the
data to the FBI.
Some units are rumored to have dial-in modem ports, but it
seems that the standard procedure is to have an FBI agent
come in daily to exchange the Jaz disk for a fresh one.
Spy Hardware for the Consumer
KeyGhost - A small device that records
every keystroke typed on any PC computer
Over 500,000 keystrokes can be stored with
a STRONG 128 bit encryption in nonvolatile flash memory. (does not need
batteries to retain storage)
KeyGhost
Unlike software keystroke recorders,
KeyGhost records every keystroke
including those used to modify the BIOS
before bootup
Impossible to detect or disable using
software
Costs between 200 and 400 dollars
iOpus Starr Surveillance
Software
Software that allows the user to access
virtually everything that was done on the
computer
iOpus Highlights
Visual logging ( screenshots)
Text logging
Web Spy- Records all URL’s of visited sites
Chat Spy- Records both sides of a chat
conversation ( works with AOLIM, ICQ,
Microsoft messenger and Yahoo chat
iOpus Highlights Continued
AOL spy- Records IM conversations,
emails and other content inside AOL
Sends reports directly to email as a
password protected compressed zip file
Runs invisibly and maintenance free
Cost- $69.95