Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Privacy Your Rights Online

Carnivore Comes Up Hungry 131

voodoogumbo writes "A USA TODAY article says universities are declining to review the FBI's controversial Carnivore email sniffer. Academics are concerned that the Justice Department is looking for little more than "rubber stamp" approval of the system. The sordid details are on their site."
This discussion has been archived. No new comments can be posted.

Carnivore Comes Up Hungry

Comments Filter:
  • Have them post the code on slashdot and we'll rip it apart. :)

  • by mholve ( 1101 )
    Why should the universities be taking care of the FBI's dirty laundry?
  • FOURTH POST!!!!

    At any rate...

    This project seems to be pretty obviously closed-source -- they don't have enough confidence in its ability to let things out.

    And you're not going to find anyone who wants to review it anyway -- nobody wants anything to do with it because if they acknowledge it it won't go away...

    /Brian
  • It's probably all a matter of the possibility that if the university 'rubber stamps' the black box, 5 days later in the media, this appears: "Technology approved by MIT violated 540,392 civil rights issues". No one wants that. Furthermore as a quick sidenote, do they expect Carnivore to break into any Joe Schmoe's Hotmail account with SSL? I think not..
  • the FBI wants to test Carnivore this way because using it on a university LAN would be like shooting fish in a barrel.
  • I personally hope that noone agrees to a review since this might raise a red flag in the minds of congress. Could cause it to be shot down quickly.
  • by Sawbones ( 176430 ) on Tuesday September 05, 2000 @03:28PM (#803037)
    Quoth the article:
    -Researchers may examine only those matters the government wants examined.

    Gov't: Please verify that this device has a power switch.

    University: check.

    Gov't: Thank you, this concludes your exhaustive evaluation.
  • ... for not foisting this crap on us.

    If the DoJ had their way, they probably wouldn't even let PUCC tell us about it before they started sniffing our mail.

    All of you college students out there, get a hold of your computing center's admins. Let them know that this is a bad idea. Most likely, they're geeks like us who are willing to listen (I know the guys around here at Purdue are somewhat accessible, but I also had press credentials at the time. Still, doesn't hurt to try.) Give them a link to this Slashdot story. Just make sure to get the point across in a clear, rational manner.
  • Well, you have to admit.. the US gov't is sneaky. This way they can tell people "well, we gave 5[or more] universities the chance to look at it and they decided not to"
    I wonder how long it will be before they actually find someone to look at the flesh-eater, and what kinda effigy it will be.
  • It's pretty common for universities to test products/software/policies that the government wants to issue. That's how they get those grants, you know. For example, my school was involved in determining the privacy implications of the Intelligent Transportion System.

    The publishing restriction is quite common, as is the requirement that they be screened. The real issue is the middle restriction, that "Researchers may examine only those matters the government wants examined." This means that the government can basically say "look at this irrelevant stuff only, and tell us whether it works." The university would not be able to actually examine the product as a whole. That is a restriction that few researchers are willing to live with. It basically renders any opinion worthless. So, I'm with those researchers that are unwilling to do this. I don't think they're going to find a reputable university to do the review... of course, there are many third/fourth tier universities that will do backflips for the grant money.

    Thalia
  • by jjr ( 6873 )
    These schools do not want to liable if Carnivore. Is used for the wrong reason. Would want to be the school that OK a sysytem that framed the wrong man.
  • been in the USA long? ;)
  • Ahhh, okay - yeah, that makes perfect sense. I was going to say, if they (the universities) can't look at the whole product then it's kind of silly unless you can specifically say, "yes, this part is okay, rather than the "rubber stamp" as was quoted - that they're after. I certainly wouldn't want any part of that either.

    Interesting though, that this can be used like a carrot to dangle grant money in front of a university's face.

    I won't even start on the American education system... ;>

  • by Fervent ( 178271 ) on Tuesday September 05, 2000 @03:43PM (#803044)
    Sarah Lawrence College [slc.edu], where I go to (quick plug, we got Time Magazine's school of the year award with 4 other schools), has a damn extensive privacy policy. No school administrator or Dean can touch a student's email on the main server, users aren't logged, users have the option to install Netware or not (to use a few shared servers) and won't be logged anyway, all commercial and user web access is kept private, and users don't need to sign in when they use the lab.

    This beat my last college, Boston College, hands down. Working in the student computing lab here, the administrators wouldn't even think to use a system like Carnivore.

  • This problem will be approached the same way other "control" attempts have been. If email is gonna be sniffed it will be madly encrypted or hell not used through US pipes. Hell if this gets to be a problem and those whom wish to remain anonymous then what's stopping them from developing their own protocol for messaging. Hell pop and smtp are getting old and are insecure (apop is a nice attempt but the majority of people out there are still using plain text passwords with pop).

    encrypt mykey thierkey &lt mymessage | genericserver
  • by bluesclues ( 40988 ) on Tuesday September 05, 2000 @03:54PM (#803046)
    A lot of people are probably going to accuse me of being paranoid here but... I'm sure the government would like nothing more than a big university like MIT to say carnivore is okay. It's part of a propaganda war. Those who are then less educated or lazy will just think the government isn't spying on me, the folks at MIT even said so, and the as a whole Americans give up another bit of privacy. If the government was truly interested in letting the American people know carnivore was about they would open source it. What do they have to loose? There not going to sell the code to carnivore or are they. They want to assure the American public their privacy isn't being violated, don't they? If carnivore is truly what they say it is, let everyone look, not just the "elite" at a university.
  • Give it to me, I'll test it for them.

    "Judge Judy is a man!?" Bwhahaha! Think of the power.

    Uh.. on a realistic note so I don't get moderated down... umm.. Time to start encrypting my email.
  • what happens when terrorists planning to blow up the president through email from saudi arabia sends and email through hotmail, to someone in eville, usa... what is the international law that says that the saudi can't say things like that? even on a us based email service? this could get fun :)
  • "What I don't want to see is a road map of the source code that could give the bad guys the ability to thwart this," he says

    I'm sorry, but doesn't encrypting the message in the first place make it useless to the fbi anyway?

    I've never seen the source for this, or heard anything about how it works, but I just figured that out. I must be an evil genius ;)

    --
  • Actually, it should be a Big Thanks to prof. Gene Spafford [purdue.edu] (Spaf) and his staff for maintaining ther integrity of out humble little CS school. He's a rather well known security guru who's forgotten more than a geek like me will ever learn about locking down boxen. I'm glad he and his staff had the integrity to turn down what's looking more and more like this:

    Uncle Sam: "Is carnivore a program to generate fake credit card numbers?"

    University "Nope, it's not."

    Uncle Sam: "Thanks for making sure this wasn't an illegal program. Have a nice day."

    Art, if you see this, drop me a line. Haven't heard from you since Terry graduated.

    -dave

  • This should be open to any US citizen who wants to review the system. Why should only /a/ University get to review this? What are they afraid of? After all this is supposed to be the equivalent of a phone tap. I don't recall there being anything at all secretive about a phone tap short of the order itself. This is a double standard, and the Justice Dept expects people to accept that it is ok because they, and one elite university "said so".

    The secrecy sorrounding the entire sordid affair needs to go to the wayside. If they have no dirty secrets to hide, they should willingly expose carnivores innards for review. Especially when viewed with their logic that only "criminals" need to be concerned about privacy.

  • If Big Brother wants to calm anybody's fears about Carnivore, they should give L0pht, 2600, and their friends at Antionline free and unfettered access to one of the machines for a week. Let them do an independent review and post a nice report on its capabilities, along with demonstrations of how easy it is for the individual FBI agent to 'improperly' use the device.
  • by jaa ( 22623 ) on Tuesday September 05, 2000 @04:11PM (#803054)
    they don't want us to see how feeble this stupid sniffer is. Here are the Carnivore rules:

    • if email "From:" matches (target) CAPTURE
    • if email "To:" matches (target) CAPTURE
    • if email body contains (target) CAPTURE
    • if URL contains (target) CAPTURE
    • if IP packet contains (target) CAPTURE
    • else ignore

    So, encrypt, or forge headers/ip addresses, or tunnel, or...

    whatever. move on, nothing to see here.

  • The following is a repost from freenet-chat. Before we go attacking the FBI, it might be a good idea to look at their history.

    --
    What follows is an executive summary of Carnivore. The information provided is accurate to the best of my ability. I am not responsible for any omissions or factual errors.
    --

    First, it is called Carnivore. Second, "victim" is spelled "victim". I will make a brief summary for those who have not heard of it. Carnivore is a network of black boxes the FBI is planning on deploying at all major ISPs to monitor e-mail traffic. One of the first major ISPs to be asked to install it, Earthlink, refused on the grounds that it was incompatible with their network infrastructure. Based on information released, it is essentially a glorified packet sniffer modified to capture e-mail communications.

    The FBI claims that Carnivore is needed because criminals are becoming more sophisticated and using e-mail to carry out criminal activity. There is some precident to support this, as well as evidence that the FBI may very well be justified in this. In many cases since the early 80's phone logs have had a substantial impact on forensics. The phone companies currently maintain logs on who calls where for an indeterminate period of time, generally atleast 90 days. It makes sense to provide a network where this information could be garnered online. The fact that e-mail is "plain text" and requires no additional processing (unlike voice, which requires someone to actually listen and transcribe the conversation), there is a lower barrier to entry. Translated, it is cost effective.

    Those are the justifications. Now, essentially the argument against this boils down to one simple statement: Do you trust the government? There is plenty of reason not to trust the government. There have been a variety of high profile cases where the government spied on citizens without a warrant or any judicial approval. In particular, the handling of the Waco, TX and Ruby Ridge incidents come to mind for the FBI. As a result, the FBI has been busily modifying judicial procedures to allow them to tap without a warrant, as well as the ability to use illegally obtained evidence. They have continually been expanding their power base. Something which was illegal 5 years ago is now not only legal but approved by the majority of citizens. Carnivore could be seen as part of a larger initiative by the FBI to remove accountability for its actions and also to treat the average citizen as the enemy until proven otherwise (guilty until proven innocent). The current political atmosphere the so-called "baby boomer" generation has engendered has further fostered this attitude.

    Other intelligence / law enforcement agencies have also been busily adapting their organizations to take advantage of net-based technology. Recently it was discovered the NSA had (and continues to) partner with several countries including Great Britain, Franch, and Australia to form a global monitoring network called Echelon. It is a more general information gathering network than Carnivore and is more in-line with the NSA's role in our government - handling signals intelligence (SIGINT).

    I would request in advance that political discussion on this matter be taken offline, as this issue has been hashed and rehashed on a variety of websites, lists, and zines. Further information is available by simply searching on Google (www.google.com).

    --
    Signal 11 -o- BOFH, boredengineers.com
    All truth goes through three stages. First, it is ridiculed.
    Then, it is violently opposed. Finally, it is accepted as self-evident.

  • Furthermore as a quick sidenote, do they expect Carnivore to break into any Joe Schmoe's Hotmail account with SSL? I think not..
    Only Hotmail's login authentication happens via SSL. Once you're in, everything goes through plaintext.
  • by TheFrood ( 163934 ) on Tuesday September 05, 2000 @04:14PM (#803057) Homepage Journal
    Justice's Colgate counters the FBI already has laws it must follow to intercept e-mail. "What we don't want is a debate over the government's inherent authority to conduct electronic surveillance.

    The government's inherent authority to conduct electronic surveillance? Funny, I thought the government was only supposed to have the powers enumerated in the Constitution, and I'm fairly sure Madison&co. didn't include an "inherent authority to conduct electronic surveillance."

    TheFrood

  • Underrated = This moderation is only rumored to existence and has never been seen in the wild.

    Any moderators up for some irony?
    ___

  • "What I don't want to see is a road map of the source code that could give the bad guys the ability to thwart this," he says. "If evaluators say there are security deficiencies that need to be addressed, that's precisely what we want them to address."

    This is ridiculous. Everyone already knows how to "thwart" Carnivore: Encryption! What the FBI I probably really afraid of is someone hacking the server and using it to steal passwords. Gee, wouldn't that be embarassing. Of course, we all know how well simply not mentioning vulnerabilities helps in stopping them....
    --

  • > ... for not foisting this crap on us.

    Yeah, but there's bound to be some uni out there that will go for it. Maybe the Chancellor is an ex G-man. Maybe the President has been downloading kiddie p0rn, and the FBI would like to make him an offer he can't refuse.

    There's always someone out there willing to eat a turd to get ahead.

    --
  • by jesterzog ( 189797 ) on Tuesday September 05, 2000 @04:20PM (#803061) Journal

    ...when they can just purchase the information they want from any number of private organisations that monitor traffic every day? All carnivore does is to put an idiotically suspiscious sounding name on the process.

    If people want to protect information over the net they should encrypt it, which unfortunately is very infeasible at the moment because 99% of people don't have the right software installed to use it on the other end. (In short, the current infrastructure is dismal.)

    That said, the net is an open system like it or not. The concept of privacy by regulation (government or otherwise) is as unfeasible as expecting information to be automatically delivered to the place it was sent without any end-to-end intervention to check the correct information actually got there. This is why TCP is used so much, because it creates reliable information streams over an open system.

    If net privacy is going to go anywhere seriously, it has to be end-to-end. Relying on anyone, government included, to turn their back because you ask nicely doesn't make much sense in the long term. Encryption needs to be opened and standardised fast. It also needs to be more decentralised, so nobody can take control of it. (At the moment my favourite idea for email decentralisation is if ISP's began running their own public key servers for email addresses on their domains.)

    Other useful things to happen would be if web providers started using secure connections automatically. This would be much easier to get going if browser makers would stop popping up annoying dialog boxes that "warn" people when they're entering a secure session by default.

    Warning about entering an insecure session is understandable, even though this almost never happens unless the user was in a secure session first. Otherwise all the dialog boxes do is provide an incentive for web designers not to make things secure until they absolutely have to.


    ===
  • by zeugma-amp ( 139862 ) on Tuesday September 05, 2000 @04:23PM (#803062) Homepage

    The secrecy FEDGOV is attempting to maintain around this Privacy Invasion Tool(PIT)(tm) is laughable if you even think about it just a little while.

    FEDGOV appears to be implementing what is essentially just a custom filter that seems to be tweakable to some degree that is designed to suck up email (and possibly other traffic) for a targeted individual. The key to this is that they aren't willing to settle for logs and the cooperation of the ISP they are placing their black box in front of. Seems to me that they are trying to do a bit of an end-run around any possible accountability that might somehow be seen if they had to actually ask politely and show a warrant like they have had to do in the past.

    This is the real danger of such devices being placed in the network. What is it that will be coming out of this box? Bits and Bytes. Are we really supposed to trust the FBI by essentially writing them a blank check? Let's consider that question in light of the fact that the FBI has been known to manufacture evidence when they feel the need is "pressing".

    If they want to place these PITs on a network, there need to be verifyable protocols to determine that the bits the FBI claims were found were actually there. I think if they are entirely on the up-and-up, these things should be opened up and the internet community solicited for comments on how to make sure that they are verifiable and trustworthy.

    Z

  • by Nanookanano ( 213568 ) on Tuesday September 05, 2000 @04:27PM (#803063)
    Change your name to Sarin N. Gas. Find a pen-pal in Saudi Arabia. Have the word LETTERBOMB as your letterhead. Talk exclusively about 'freeing the people'. And end all correspondance with the cryptic phrase, "My Bird takes a long walk."
  • Ha! How long do you suppose it will be before the carnivore source is actually posted to the net? With all the ISPs, and all the hacker types that work at them, I would gamble that it would happen within weeks. Just how secure is that black box?

    Imagine how fashionable it will be to wear your Carnivore tie over your Carnivore t-shirt while listening to your Carnivore mp3 (maybe we can even get the old metal band, Carnivore, to play it, just for kicks).

    Yes, folks, you're going to need to encrypt those messages from now on. This will turn out to be another FBI foot bullet, because it will spur the development of better, easier to use encryption tools, and the average Joe will embrace encryption when he learns all his emails are subject to being spied upon.
  • by jaa ( 22623 ) on Tuesday September 05, 2000 @04:31PM (#803065)
    I'm guessing they don't want the public embarrassment of the universities disclosing the fact that ROT-13 will defeat 99% of their snooping ability.
  • Washington, DC (AP) - In a surprise development, the Department of Justice announced today that Hope College (Holland, MI) has been selected to review the controversial Carnivore program. In a rather terse statement, DoJ stated, "Carnivore is written in Perl and and Hope College is internationally renowned for their excellence in Perl. Researchers associated with Hope College will provide a comprehensive review of the Carnivore program and will be presenting their results in a timely manner". A highly place unnamed source with DoJ commented that the review methodology was based on the established twin methods of release early, release often, and bop the mole. It is rumored that the project will be led by a former U.S. Navy Officer.
  • Warning: this post is going to be seriously random.

    I almost can't take this anymore. How can we wake up the public to see that our Constitutionally guaranteed freedoms are being stolen right from under our nose? On a related note, check out this article [worldnetdaily.com] Harry Browne wrote about his Supreme Court litmus test (question 1: "Can you read?").

    Back to the serious part: what can we do? What organizations are out there watching the government now? A thousand angry Slashdot readers are nothing but noise. How can we organize; create an "open source" protest against this ("this" not being Carnivore specifically, but the gradual movement of the USA to Oceania)? Let's get some suggestions here.

    I tried to register unconstitutional.org yesterday but it's already taken. Does anyone know of a site that lists all of the laws in effect which are clearly unconstitutional? I'd love to see that.

    --jb
  • This is actually a good idea. Thus, it will never happen.
  • Anyone working on this system (at whatever organization decides to test the Carnivore system) *must* be 'cleared' before they can work on this?

    What a bunch of BS!

    "What I don't want to see is a road map of the source code that could give the bad guys the ability to thwart this," [Assistant Attorney General Stephen Colgate] says. "If evaluators say there are security deficiencies that need to be addressed, that's precisely what we want them to address."

    What about PGP? It seems like a VERY simple workaround for this system! Plus anyone with any brians could use something like yahoo mail or hotmail; or even better would be a service like www.ziplip.com [ziplip.com]. This is a waste of everyone's money; in fact, I believe the whole 'war on drugs' falls under the same category. This whole issue is just plain dumb.

  • ...that everyone thinks 1) the FBI is looking for a rubber stamp in order to lull the avg. american (further) into her/his sense of complacency - or provide continuity in it; 2)the FBI has consistently illustrated its inability to control itself in regards to information gathering on the 'average' person (if you think the FBI is watching you, you're probably NOT paranoid); and 3) if the FBI implements it anyway, they will probably only catch the 'dumb' criminals who communicate/work on-line.
    The question is: will the FBI care (read: 'revise' or 'not use/release') if no educational institution provides the rubber stamp? I have no faith (but that's beside the point), and I have no trust that any congressional committee/panel/hearing will in any way change the actions of the FBI (though it might change their line of BS).
  • Several documents on the Carnivore system and what it does:

    1. Statement for the Record on Internet and Data Interception Capabilities Developed by FBI [slashdot.org] presented by Donald M. Kerr, Assistant Director FBI Laboratory Division to the House Judiciary Committee's subcommittee on the Constitution.

    2. The Carnivore System [slashdot.org]: the FBI's own report on it.

    3. Open Internet Wiretapping [crypto.com]: a paper by Steve Bellovin and Matt Blaze.

  • by DustyHodges ( 174738 ) on Tuesday September 05, 2000 @05:05PM (#803072)
    If they really feel that this software is nothing to be worried about, why don't they put it up as an 'Ask Slashdot'?

    Janet Reno [mailto] asks:"I have the source code to a piece of software that my employer is a bit worried about. Do you think that this is a violation of anyone's rights?" So, what do you think crowd? Go ahead and check it out, and feel free to let us know what you think...

    ((Source Code Follows, then followed by 12 first posts, 18 Dickinson Poems, 23 Penis Birds, 4 rants on MDMA, and 1 comment about how the FBI sucks, moderated up to +5 Insightful.))
  • Text of Memorandum of Understanding Between the People of the United States and The Department of Justice on Inspections of CARNIVORE
    September 4, 2000

    1. The Department of Justice reconfirms its acceptance of all relevant resolutions of the People of the United states, including the declaration of independence and the bill of rights. The Department of Justice further reiterates it's undertaking to cooperate fully with the People of the United States.

    2. The People of the United States reiterate the consent of all people to respect the lawful application of justice. We hear by give the department of justice permission to execute our will as defined by the Constitution and bill of rights.

    3. The Department of Justice undertakes to accord to The People of the United States immediate, unconditional and unrestricted access to CARNIVORE

    4. The People of the United States and the Department of Justice agree that the following special procedures shall apply to the initial and subsequent inspections of CARNIVORE.

    a) A special group shall be established for this purpose by the People. This group shall comprise a group of people selected an modded on /. The group shall be headed by a commissioner elected by the group. Possible people include Linus Tovaralds, Steve Gibson, Neal Stephenson and Kevin Mitnick

    b) In carrying out its work, the special group shall operate under no mandated guidelines other than this: Find the Truth. This is the will of the people.

    c) The report of the special group on its activities and findings shall be submitted to the People.

    5. The People of the United States and the Department of Justice agree that all other areas, facilities, equipment, records and means of transportation shall be subject to Inspection at all times.

    This contract was derived from The memo we sent Iraq in regards to inspections involving weapons of mass destruction...The DOJ is pulling all the same tricks that Iraq did. This is an example of Government NOT deriving their just power from the consent of the governed.

  • by mholve ( 1101 ) on Tuesday September 05, 2000 @05:08PM (#803074)
    D'ohhh! Try these links - they're fixed.
    1. Statement for the Record on Internet and Data Interception Capabilities Developed by FBI [antivore.com] presented by Donald M. Kerr, Assistant Director FBI Laboratory Division to the House Judiciary Committee's subcommittee on the Constitution.
    2. The Carnivore System: [antivore.com] the FBI's own report on it.
    3. Open Internet Wiretapping: [crypto.com] a paper by Steve Bellovin and Matt Blaze.
  • Um, as I understand it, failing to change your encryption key allows your friendly spooks at the NSA to decrypt your messages in too damn short a period of time.

    Using an encryption key once and then changing it prevents this.

    Any crypto-freaks out there care to add anything?
  • Who knows, they might just snag everything and put into into some sort of database. Then, they just keep some computers chewing through the database putting everything together, making connections, flagging emails with key words or phrases (or senders or recipients!), etc.

    It's not like the hard drive, DB systems, or processors of today aren't up to the task for something of this magnitude. Hell, I'm sure there are larger more complex databases out there already.

    Anyway, that's how I would do it if I were a jack booted government computer punk who used constitution imprinted toilet paper.

  • Carnivore's output goes on a zip disk. The advantage of "capturing" data to a disk is that the disk now becomes evidence, separate from the collection system. In a court system, this is important -- separate the surveillance data from the surveillance system.

    The frequency of the output dump is on the order of a week or several weeks. Snagging huge amounts of data is pretty much out of the question. That's not to say Carnivore won't be "extended" in the future to include such traffic analysis.

  • Most people call that a non breaking space.. heh
  • by copito ( 1846 ) on Tuesday September 05, 2000 @05:30PM (#803079)
    Carnivore does what no 3rd party private company can do, put an unreviewed, secret source, remotely administered, low level packet sniffer in the heart of the data center of every major ISP.

    Granted, email is not particularily secure, since any computer on an network in the path can read it in a similar manner to what Carnivore does. But Carnivore is a terrible precedent since it means that the Government has a _right_ to read our mail, which it can take all necessary means to enforce even when it is no longer technologically sensible.

    I can easily envision a future where email is seamlessly encrypted but To and From is recorded for all emails and anybody can be forced to hand over encyption keys given any hint of suspicion of criminal activity (like recieving an email from someone who received email from a person under investigation).

    As you say, the only solution is end to end, but that means really end to end, i.e. no ISP mail servers. Even then it is hard to see how we can technologically prevent the government from monitoring traffic patterns.

    As far as HTTPS goes, since RSA is expiring soon, SSL can be much more widely deployed, but SSL certificates are per IP so they can't be used on IP sharing virtual servers which are most common.
    --
  • That particular line from the article blew me away. And why not have a public debate over goverment-sanctioned electronic surveillance? Do you think we, the mass, have become so blinded by the manufacturing of consent that we would let such a thing roll over us, given the chance to share our thoughts? (What do you think? - Sharing is caring!)

    You can read lines like this from government officials everyday in the papers. And it kinda frustrates me that this stuff can breeze past us like generic cool jazz.

    STORY TIME (ZzZzZzZ):

    Read a front page article yesterday about the US gov's push to get a continental anti-missle system going by 2005 at the latest. Such a system would undoubtably violate US weapons-treaty agreements with Russia, and perhaps initiate another cold war (but I guess Russia has not the funds to compete, so hey - we already won!). The only argument in Congress regarding this anti-missle system is whether to deploy it now, or wait and let the technology advance in time. There is no noticable record of anyone in the House asking why we would need a system so absurdly huge at all.

    Why do I get the feeling that there is something very wrong going on here? When is the last time the US was really threatened with a continental attack. And who the hell has the nerve to deploy weapons of mass destruction in this day and age (besides the US), and let alone deploy them at a county that has the rest of the world by the gonads? We really need this, eh?

    16 years late, 1984 is just pulling into the station.

    Don't be afraid to share your thoughts...
  • And I don't even live in fucking America.

    I do. Can I come live with you?
  • by scotpurl ( 28825 ) on Tuesday September 05, 2000 @05:33PM (#803082)
    With phone records, and in court, you only need to show record that something passed between two parties. You don't need to show what passed between two parties, only that the two parties communicated.

    It's also funny that academia, usually seen as the enemy of Big Brother, is now seen by the FBI as saviour.
  • Justice's Colgate counters the FBI already has laws it must follow to intercept e-mail. "What we don't want is a debate over the government's inherent authority to conduct electronic surveillance. If researchers find there are issues that have to be addressed, we can do that," he says.

    They may not want a debate, but they sure as heck are going to get one. When did a citizen's right to privacy become so radical an issue, anyway?
  • I don't know about everyone else, but this is absolutely ridiculous. While the FBI does have some grounded beliefs in how this system may stop acts of terrorism and the like, the opposers equally have strong grounded beliefs why this system is an invasion of our privacy, etc.

    My friend and I were discussing how simple it is to boycott this. For instance, if they attempt to start testing Carnivore at the universities across the world, just have your university email account forward incoming mail to a free account at yahoo.com or another free email service. It is an extremely simple and effective way to show your opinions. The only problem is that Carnivore will still pick up all incoming mail to your university email account...any thoughts on the validity of this measure, should the FBI attempt to implement such a device at a university?
  • I couldn't find it initially. Here's a link

    Physically, Carnivore is a personal computer with a network interface, and ZIP or Jaz removable disk drive, running a version of the Microsoft Windows operating system, with the Carnivore software loaded.

    http://www.house.gov/judiciary/perr0724.htm [house.gov]

  • Has anyone considered that maybe universities don't want to know what is inside carnivore. That maybe the government would prefer not having the specs of carnivore published or even analyzed by J. Random sworn-to-secrecy-grad-student. Okay, call me paranoid.

    But it'd be interesting to know on what grounds the universities declined to review carnivore--and who is meant by "universities": which schools, and who specifically at those schools. Have they seen specs, or were they only allowed to review particular portions? Are there stipulations? Are they refusing because of principles, administrative reasons (read $$$), or just lack of interest?

  • "The People of the United States..."...

    I don't remeber being polled on this. The DOJ apparently singed the dotted line for us. In some corners, they'd call that forgery.
  • Say, for instance, that the NSA was kind enough to forward information to the FBI on some US citizen-US citizen communication? Such information must be 'legitamized' before it can be used in a court of law, and Carnavor can provide that exact service. "Your Honour, we got this information from Echelo..Carnavor [ahem], thats it!"
    They could--but don't worry, they *never* would.
  • Here here. As an alum I am glad to see that there is still a modicrum of integrity at our University. I had a feeling that Purdue would be one of the schools the the DoJ would call upon for this nasty little task.

    Knowing that Purdue refused to lend their name to a shady venture like this actually makes me more likely to donate to the school. But then they probably thought of that angle too. :-)

    Go Boilers!!! (And Brees!!!)
  • a href="http://www.liberty-tree.org/">http://www.lib erty-tree.org/
    [google.com]
  • More likely it's due to the restrictive rules imposed on whichever university audits it.

    By 'rubber stamp' they mean that the auditing guidelines are such that the university cannot actually publish negative results, and basically is just supposed to 'rubber stamp' it without really testing.

  • > How can we wake up the public to see that our Constitutionally guaranteed freedoms are being stolen right from under our nose?

    You can't wake everyone up.

    Because "people are WILLING to give up essential liberty to obtain a little temporary safety." (Didn't one of the founding fathers WARN about this?!)

    The Constitution has, unfortunately, become just another piece of paper.

    Everytime we turn around, we need "permission" (aka licenses) to do anything, and we're the ones that let the crooks, er government get away with demanding permission from us, even though WE ORIGINALLY have the right! What ever power we DON'T give, we RETAIN. But somehow congress has twisted that into meaning, people don't have ANY rights, and must ask them for permission! The NERVE! And we let them get away with this crap!

    The best we can do, is get people to READ this book [amazon.com] to see documented cases of just how tyrannical the U.S. has become. (Yes, it really is called: The Rape of the American Consistution) It starts off with a discussion on the BACKGROUND on "Colonial crisis with Great Britain, the Articles of Confederation, the Constitutional Convention, and the Bill of Rights."

    Here's one quote: Alexander Hamilton,
    "I affirm that bills of rights are not only unecessary in the proposed Constitution, but would even be dangerous. They would contain exceptions to powers which are not granted; and on this very account, would afford a colorable pretext to claim more then were granted. For why declare the things shall not be done which there is no power to do? ... I will not contend that such a provision would confer a regulating power; but it is evident that it would furnish, to men disposed to usurp, a plausible pretense for claiming that power.


    Unfortunately, its going to get a whole lot worse before it gets any better. One World government is being rammed down people's throats even if they don't want it. e.g. Social Security is already established in most countries, but governments fail to mention that you can legally "opt-out".

    Another great book is It's None of Your Business, A Complete Guide to Protecting Your Privacy, Identity, and Assets [amazon.com] by Larry Sontag.

    Once people are aware of the problem, THEN they can start working on a solution. Like maybe a return to Common Law, Lawfull money, and Trial by Jury.

    --
    "The only people I can't tolerate are the intolerant bastards that try to tell me how to live my life..." - (ZanThrax?)
  • by CaptainCarrot ( 84625 ) on Tuesday September 05, 2000 @06:14PM (#803093)
    Justice's Colgate counters the FBI already has laws it must follow to intercept e-mail. "What we don't want is a debate over the government's inherent authority to conduct electronic surveillance. If researchers find there are issues that have to be addressed, we can do that," he says. (Emphasis mine.)

    Here is a government official, one of the top law enforcement officers in the country, who does not understand his own Constitution. The government has no inherent authority whatsoever! All the government's authority is delegated to it by the American people. If our Supreme Court weren't populated by a bunch of balless pinheads, they would have made that clear by now in numerous rulings. Instead they are by and large content to expand the government's ability to invade our privacy and usurp our rights pretty much whenever they are asked to.

    It's things like this that make me despair of the Republic.

  • Now, essentially the argument against this boils down to one simple statement: Do you trust the government? There is plenty of reason not to trust the government. ...

    In general I don't trust the government...but like so many others I know that there are bad people, and I want someone else to try and stop them.

    The government is supposed to be on our side, hired by us for us. But now (IMO) it's just too big for us to properly police it by voting people/laws in/out.

    How do we get ourselves to a position where we can trust someone else to use technology for our advantage, against the bad people?

  • Yeah, the output there's nothing to say exactly what they do with information they don't use as evidence yet.

    Nevertheless, I think Carnivore is probably a pretty simple system. Now, Echelon on the other hand.....

  • The government's inherent authority to conduct electronic surveillance? Funny, I thought the government was only supposed to have the powers enumerated in the Constitution, and I'm fairly sure Madison&co. didn't include an "inherent authority to conduct electronic surveillance."

    God, ignorance like this is irritating. Did you fall asleep in civics class, or do you just think that criminals should have carte-blanche in our society to do whatever they want? From the Bill of Rights (you know of that part of the constition, right?):

    The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

    Note the phrase "but upon probable cause". This means the government has the right perform lawful searches. That's called "inherent authority".


    --

  • Where do you think they recruit those gmen, grade school? Hint hint mormon university, utah....
  • If they have no dirty secrets to hide, they should willingly expose carnivores innards for review.

    Old habits die hard. The government has a history of security-through-obscurity. They believe that they are well-enough equipped to design security systems and that by not letting the world know how they work, that improves security. Maybe true for the physical world, but definately not for a wired one.

  • Hmmmm.... I don't know how S.T.A.R.T. and such are written. The ABM treaty was signed with the U.S.S.R. In case you haven't noticed, that government doesn't officially exist anymore, and I haven't heard of any attempt to re-ratify the treaties with the new government.

    For some odd reason ABM technology is pretty difficult to perfect, although ships with the AEGIS system (such as theTiconderoga cruiser class and Arleigh Burke destroyer class) can shoot down surface to surface and surface to air missiles quite easily. I think it has something to do with the speed and altitude of the flight of one of these things.

    Another issue to consider is that there are plenty of missle silos that could go under rogue control, as illustrated with the Kursk incident, the Russian military isn't well maintained, and the Kursk was the prize of the Russian navy, now think about some silo that few know about... As some missles have MIRV capabilities to possibly take out a state (or two), I'd want some way of preventing a successful flight of these things.

    I doubt that the nuclear stockpile will reduce all that significantly, right now it is supposedly at half of the peak, but I don't expect that the US or anyone else are willing to totally give them up for quite some time.
  • yeah, those who moderated this to flame-bait. meta-moderation should let us non-moderators moderate the moderation: funny, etc.

    -----
  • Note the phrase "but upon probable cause". This means the government has the right perform lawful searches. That's called "inherent authority".

    Granted. But the procedure in question here isn't search and seizure... it's stealth and surveillance. Sounds unreasonable to me...

    A system like Carnivore could allow the FBI the ability to monitor a massive amount of public and private comunications on a whim. They've already given themselves the power to tap phone lines with or without court order, and Carnivore is the first step in applying the idea to the Net.

    I can't wait for telescreens! - (sorry :D )
  • Does anyone remeber when we shot down that satelite a while ago? Why can this technology be applied to nucular missles?
  • What constitutes a university?

    Can't one set up their own university or call themselves Whatever University?

    Is there licensure to the word 'university'?

    Once upon a time I was able to get an 'edu' address from the Internic without any sort of verification or authorization or whatever.

    Love

    Mark

  • This cuts to the core of the matter at hand. This one post should be at the TOP of the moderation list. My Kingdom for Karma!
  • by Anonymous Coward
    Sorry, open source won't help. The Carnivore boxen live in steel cages, protected by Federal trespassing statutes. We will *never* know what those things are up to locally; the best we can do is put packet sniffers upstream of them and determine what volume of network traffic they originate. (Anything over 0 packets will prove the FBI is lying.)

    Any takers in USP geekdom? Be the first in your IP block to bust Carnivore.

    :o)

  • Ever heard of "Diplomatic mail" .. Case closed.. the material for the bom and the mail will be in it..
  • The problem with letting everyone look at the source code is that most Americans would have no idea what they were looking at. Let's face it, most of the country is not programming literate. Sure, the gov. could open source Carnivore, and ppl on slashdot could show them what's wrong with it, but the vast majority of Americans would have no idea what's going on. (I even have to wonder if they would care very much.) Hence why they want a few university's seals of approval--that way the average American has something more than computer freaks or the gov. to listen to. Because most ppl would just rather trust a university than a computer nerd. (-: Even though we're more trustworthy. --go easy on your responses to me, I'm a newbie. (-;
  • When is the last time the US was really threatened with a continental attack
    What its about is the development of missile technology in countries such as Korea (serious push for missle tech), Pakistan (nuclear capable), and various middle eastern countries that have serious money and a less than US-friendly heartfelt desire.
    Its about development and timing. Querry: how long until 20 or 30 nations could fire a nuclear missle our way? Impossible? Its only a matter of time.
    Now? No.
    30 years? 20 years?
    Eventually missiles will seem as simple as Cessena prop driven planes to much of the world...
  • Stage One: anybody can be forced to hand over encyption keys given any hint of suspicion of criminal activity (like recieving an email from someone who received email from a person under investigation).
    Stage Two: recieving email thats been encrypted is cause for the issuing of a warrent (since if you didn't have anything to hide you wouldn't encrypt).
  • Thanks for the insight ...

    Unless i'm misinformed (which i may be), I've read that there are still agreements with the Russian government, new or old, that the US has a part in, regarding ABM systems, and that a system of the degree they (the US) are planning would "clearly break" these agreements.

    Rogue control of weapons systems is a scary thought and is always a possibility. And with our own government leaping half-blind into the 21st century, using 1/2-assed security systems on their information networks, a similar situations could arise here at home.

    And "rouge" is a funny word... "Rogues" can become "freedom fighters" overnight in the press, and vice versa (ie: the KLA in Kosovo). :)

    I just wonder when too much defense can lend itself to an all out offense. We could seize offensive rougue control over the entire globe with a large enough forcefield.
  • We could seize offensive rougue control over the entire globe with a large enough forcefield.

    This is obviously absurd. A 'forcefield' over the entire globe? Please. It will be much more cost-efficient to deploy drone-management neck restraints with thoughtcrime detection circuits and remote detonation capabilities. As the noble ideal of fitting these on all of humanity is currently (regrettably) somewhat remote, we will start with those who presume to debate the Ministry of Love's inherent authority to conduct electronic surveillance.

  • by soldack ( 48581 ) <soldacker@yahoo . c om> on Tuesday September 05, 2000 @08:27PM (#803112) Homepage
    It seems that some people are pretty angry about this. Perhaps you have listened to too much Rage Against the Machine (as I am now)? Those guys can really get you going! :-)

    Seriously though, what has the government done to each of you specifically that you are so angry about? I am not a Canivore lover either but I am also not ready to burn the White House.
    The way I see it, you have two choices:
    1. Work within the sytem to make things better. Vote. Write letters. Write e-mails. Get involved.
    2. Move somewhere better. Good luck finding a place with as much oppertunity for success and freedom. When you get there, send us a post so that we can visit you.

    Most /. readers are involved with technology and those of us who are out of college know that we all do pretty well economically. Guess who is partly responsible? Yep, the government. While many of us may not remember (or may not want to remember it) there was a time 20-30 years ago when we had double digit inflation and a much larger jobless rate.

    My point is that while things are far from perfect, they are much better than they are else where and much better than they were here. We are in the midst of one of the longest streaks of prosperity ever. Lets use this time to keep making things better with constructive ideas.
  • This is just a huge effort by the Post Office Mafia to take over the world by making everybody stop using email and go back to snail mail.

    The postmen of the world dropped all thier guns and realized that they could get a piece of what the MPAA, Rambus, and RIAA were all getting.

  • God, ignorance like this is irritating.

    So is arrogance like yours.

    The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

    Note the phrase "but upon probable cause". This means the government has the right perform lawful searches. That's called "inherent authority".

    Surveillance is neither search nor seizure. Search and/or seizure happens in the open, with the knowledge of the those whose security is being (lawfully) violated. When your house is searched for drugs, you know it. When you are arrested for possession, you know it. This is not the case with wiretapping, nor is it the case with Carnivore -- surveillance happens without the knowledge of its subject. If the Founding Fathers had intended the Fourth Amendment to cover surveillance, the word "surveillance" would appear in it.

    TheFrood

  • copito said:

    I can easily envision a future where email is seamlessly encrypted but To and From is recorded for all emails and anybody can be forced to hand over encyption keys given any hint of suspicion of criminal activity (like recieving an email from someone who received email from a person under investigation).

    So here's what I'd do:

    1. Run Mojo Nation (similar to Gnutella but you can earn money for your bandwidth, disk space, and cpu cycles; see here [mojonation.com] for details).

    2. Since this splits everything up and encrypts it and sends it out, you don't need to be on-line for your partner to download it.

    3. You can communicate through a secure channel what to search for, and your partner then searches and downloads it.

    4. They communicate back through the same method.

    It's like plucking a memo out of a tornado, scribbling something on it, and tossing it back. It's ether -- it's nothingness until it's put back together, then decrypted.

    It's two cans and invisible string!

    --

  • Here is a government official, one of the top law enforcement officers in the country,

    Uhh...judges aren't law enforcement officers. Nominally at least, law enforcement is tasked to the executive branch (e.g., DOJ, FBI.) Interpretation is the purview of the judicial branch.

    Instead they are by and large content to expand the government's ability to invade our privacy and usurp our rights pretty much whenever they are asked to.

    We have twelve years of Reagan/Bush to thank for no small part of this, so remember that in November ;)

    They (supposedly) base their decisions in part on previous applicable rulings. Each ruling that erodes personal liberties in the name of whatever provides an additional foothold for future rulings of the same nature. Think of it as a positive feedback loop: Read up on your Bateson and Wilden's System and structure: essays in communication and exchange if you're doing any headscratching right now. The upshot is, it's a self-perpetuating process which gets progressively worse. The only good news (I think) is that at some point it becomes so bad it can no longer continue (or else it causes permanent damage to the environment in which it functions, so don't hold your breath.)

    BTW, I haven't read any of this stuff since the early '90s, so if I'm misrepresenting the stuff I've invoked, anyone please jump in. Also, I'm assuming O'Conner was spayed rather than neutered ;)

    It's things like this that make me despair of the Republic.

    Lasciate ogne speranza, voi ch'intrate.
  • Given the policies on Internet monitoring in the UK and the Russian Federation, they should invite tenders from GCHQ and the FSB. I am sure that they are quite knowledgable in these things. Perhaps they will even add a couple of backdoors so they can listen too!

    Only joking, I think!
  • 2. Move somewhere better. Good luck finding a place with as much oppertunity for success and freedom.

    You are kidding, right? I don't know what you think as an opportunity for success (what is success anyway), but from what I have seen, freedom in USA is a big joke. Now, don't get me wrong, things are a lot worse in many 3rd world countries, but you can't seriously say that you can't find a country in Europe where citizens have more freedom than in USA.
  • it became such a radical issue when it went into the universal declaration of human rights:

    Article 12.
    No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.

    ofcourse the US is one of the few countries that has NOT signed this. big surprise...

    //rdj

  • Academia USED to be the enemy of Big Brother, back when "tenure" meant something. Nowadays, with universities beholden to a dozen government bureaus for grant money, tenure is only granted with the contractual "understanding" that the scholar will be dismissed if he/she is not being "useful and productive"- i.e. studying only PROFITTABLE subjects and NOT harassing Sugar Daddy Uncle Sam. Academic impartiallity vanished when the government, in an attempt to curtail "waste", required full accounting of where every penny of a grant went, and then told universities where the money COULDN'T go.
  • The tool that grabs certain messages today can grab all messages tomorrow.

    The laws (or lack thereof) that allow encryption to happen today, can change tomorrow.

    Some people have indicated encryption is the way to get around Carnivore, and that we can ignore this threat on that basis.

    OK, what happens when the Government decides to make encryption illegal?

    Police departments already refer to the Fourth Amendment as the "One-Fourth Amendment", because of the way seizure laws have been written. We already have the situation where police can seize cash above certain amounts on the basis that possession of large amounts of case is de facto evidence of wrongdoing. Now, think of encryption, and apply the same thinking.

    You can't afford to ignore this tool. You can't afford to blow it off.

  • Instead they are by and large content to expand the government's ability to invade our privacy and usurp our rights pretty much whenever they are asked to.

    We have twelve years of Reagan/Bush to thank for no small part of this, so remember that in November ;)

    Eight years of Clinton/Gore have been every bit as outrageous, and perhaps even worse [cato.org], so I'd advise you to vote third party.
    /.

  • - Universities and any other contractors must agree not to publish anything the government deems sensitive.
    -Researchers may examine only those matters the government wants examined.
    -Teams must agree to clear all personnel working on the evaluation with the government.

    On a practical level I can understand the first and third requirement. Actually the first follows from the third. If there is a restriction on publication then you have to know who you are restricting. This is fairly standard Federal Gov stuff. One of the downsides to doing research for say, the DOE or the NSA is there is lots of work that could probably win a Nobel or a Fields but it will never be published.

    It's the second requirement that is probably the stumbling block. It's just bad science to be restricted in WHAT you MAY evaluate.
  • My view on the presidential elections: Both are going to cause large amounts of trouble for everyone. Best solution: convince the FBI that the president is after it. Watch the system self-destruct.


    -RickHunter
  • by CaptainCarrot ( 84625 ) on Wednesday September 06, 2000 @10:09AM (#803139)
    Uhh...judges aren't law enforcement officers. Nominally at least, law enforcement is tasked to the executive branch (e.g., DOJ, FBI.) Interpretation is the purview of the judicial branch.

    Leave off the basic civics lesson and read the article. "Colgate" is Stephen Colgate, Assistant Attorney General.

    We have twelve years of Reagan/Bush to thank for no small part of this, so remember that in November

    You don't even pay attention, do you? Justice Scalia, a Reagan appointee, takes a strict view of the Constitution and most often rules in favor of individual rights over governmental intrusion. Thomas often joins his opinions. The others are generally disappointments, but recall that the Democrat-controlled Senate consistently rejected any other Supreme Court nominees who thought along these lines, even if that meant they had to lie outright about his record. There's a reason "bork" is now a verb in Washington.

    That's what you get, and what you deserve, for insisting on "rights" that are not in the Constitution and making them a litmus test for the Supreme Court. If the Constitution can be misconstrued so as to give you something you want it can be misconstrued for other purposes as well, and the same people who are willing to do the job for you are just as happy to do it for someone else.

    They (supposedly) base their decisions in part on previous applicable rulings... More basic civics. Look, I know this. Why do you think this is so worrisome? The situation will take decades to repair, if it even can be repaired - and once that process is begun, which may not happen.

  • Note the phrase "but upon probable cause". This means the government has the right perform lawful searches. That's called "inherent authority".

    No, there's nothing inherent about it. That authority derives from the People. It may also be revoked by the People at any time and for any reason.

    It should also be noted that when the 4th amendment was written, a search and seizure necessarily put the person on notice and required the presentation of a Warrant before the fact. In wiretaps and e-mail snooping, no warrant is presented to the targeted person, and no notice is given of the ongoing seizure.

    Did you fall asleep in civics class, or do you just think that criminals should have carte-blanche in our society to do whatever they want?

    I note that in Japan, the government is explicitly NOT permitted to employ wiretaps (and by extension, snoop on IP traffic) by the constitution that the U.S. government wrote for them after WWII. I also note that Japan has not degenerated into lawless anarchy as a result.

    In a perfect world, the FBI and other law enforcement agencies could be counted on to never break the law (and so could all citizens). Unfortunatly, the history of the FBI and other law enforcement agencies in the U.S. shows repeated violations.

    If those agencies truly wanted to avoid future violations (and as law enforcement agencies, that should be utmost on their minds), they would seek more oversight and technologies that incorperate more checks and balances. Instead, it is THEY who seek carte blanche. Otherwise, rather than carnivore, they would prefer to present the ISP with a warrant requireing them to forward copies of the suspect's email activity and by having to inform a dis-interested 3rd party, a check and balance is created, much like the case of wiretaps and phone company techs.

    Though that would represent a pain in the ass to the ISP, so does trying to cram carnivore into an overcrowded rack and reconfiguring the switch/routers so that it can see all outgoing and incoming traffic.

  • Yes -- so what? Where in the fourth amendment do you see that the target of an investigation has the right to be informed of searches and/or seizures? Think it through -- the police are supposed to notify a mobster that they are in the midst of searching their off-shore bank account? They're supposed to notify the mass murderer that they are searching his rented storage space for bodies?

    Actually, in both cases, if something illegal really is going on, they will find it even if they inform the suspect just before commencing the search. If there is nothing there, perhaps they're innocent.

    You are correct that the Supreme Court does in fact uphold wiretaps as constitutional.

  • What long history? Paranoia is not logic. I can't even think of any high profile cases where surveillance has been abused, short of back in the 50s.

    Personally, I'd call Watergate pretty high profile, why don't you? Then there's the illegal surveilance of John Lennon and MLK, Hoover's 'special' presidential files, etc.

    f there are abuses, then we'll fix them and move on. But your making assumptions that the FBI is currently a corrupt organization, and you have zero facts to back that up.

    How many times does a person or organization have to be caught red handed before you conclude that they are a criminal?

    You can't deny law enforcement tools just because there is a small, theoretical possibility of abuse.

    I agree there. It is, however, perfectly reasonable to demand that the tools and methods have checks and balances in place. Consider that the very same FBI that lobbied for every encryption device in the U.S. to have a back door just for them also strongly prefers a snooping system with no oversight to an equally good system where they have to tell the ISP who they are investigating.

  • All carnivore does is to put an idiotically suspiscious sounding name on the process.

    There's an interesting psychology at work in police terminology. Mostly is says that they want to be awesome bad-asses that strike terror into the hearts blah, blah, blah rather than being dutiful and ever vigilant public servants.

    That's why a group of patrol cars is a 'wolf pack' and not a 'brownie troop' or 'traffic enforcement unit'. That's also why the paramillitary look and troop carriers and black helicopters with no markings (I'm not making that up! Unlike the more famous black helicopters, they don't have secret bases and they do have navigation lights).

  • Network ICE Releases Open-source Carnivore

    They are saying this gives ISPs the ability to do what Carnivore is supposed to do on their own, and thus eliminate any need to allow Carnivore to be installed to comply with an intercept order.

    The Altivore Page [networkice.com]

    Newsalert coverage. [newsalert.com]

Any circuit design must contain at least one part which is obsolete, two parts which are unobtainable, and three parts which are still under development.

Working...