Carnivore Demo Report 130
michael : People are really interested in the "inner workings" of Carnivore, as shown by the many submissions. I never thought it was anything special - from the start, when I first knew that the FBI had an Internet interception box, I just assumed that it would neatly sort and deliver all Internet traffic of a particular target. I can spec out how I would design such a box; and the FBI isn't stupid; so I assume they would do it in a similar fashion. I think there's still a lot of disbelief out there, though - "You mean the FBI can really track both Web access AND email? And IRC? And Usenet? ...." People just don't believe it, because they're used to thinking of Internet traffic in different terms than phone or whatever.
The only important design aspects of the carnivore box are things like "Can the FBI set it to snoop on traffic it isn't supposed to? Can I dial into the box and snoop on my neighbors?" and other questions like that, which we'll *never* find out from any powerpoint presentation.
So get used to it, people. Assume that Carnivore neatly captures, sorts, and delivers all traffic that passes through it, and that the FBI can just type in your name and plug it in. Assume that there's a user-friendly, point-and-click interface. Assume that it will pretty-print reports, ready for filing with the court if/when you are prosecuted. Assume that there's essentially no oversight of the FBI's use of this device - after all, judges exercise almost no oversight over wiretaps, there's no reason to believe that Internet-tapping will be overseen any more diligently. The FBI and police approach wiretapping requests in the same way that conniving children approach their parents - it only takes one judge to approve a request, and the FBI can approach as many different ones as needed until they find the one that just doesn't care and rubber-stamps everything.
Get used to it. Want more data about how Carnivore works? Push for the source code to be opened. Nothing else will provide any more information about the system. You can't tell how secure it is (against the FBI, or against anyone else) from a presentation.
As for me, I'm steadily moving toward encrypting as much of my traffic as possible. I set up ssh for my home network recently. I'm setting up SSL. I'm reading up on IPSEC. I guess I just don't have a very trusting nature. The way I figure it, the time to set up countermeasures is before you expect to need them.
Re:I gotta wonder....... (Score:1)
Next, active countermeasures must be made available. I suggest a volunteer network of servers that will verify a given carnivore box IP address and then bomb it with all sorts of bogus traffic. The countermeasures network must be distributed and anonymous because surely they will be open to charges of interfering with justice.
Lastly, the induhviduals responsible for this travesty upon freedom must be identified and targeted with hacker-run packet sniffers, yes, you heard right, vigilantes sniffing the FBI's packets to turn the spotlight back on them.
Have mercy.
How is this different then a port sniffer? (Score:1)
Also the FBI still needs to be on the same physical route of the traffic. They can't plug the box in at their office and spy on traffic that is to and from computers on an internal network as the packets sent are never on the wire they have tapped.
Networks are monitored all the time, why should the FBI be any different. It's no different then tapping a phone. The real difference is that the internet has fostered an idea on anoninimity that dosen't exist and the false sense of security that many have is getting crushed. This is GOOD thing. The more people aware that there is no such thing as internet privacy the more people will keep an eye on goverment orginizations to make sure they don't abuse the power they have.
Anyway... If i installed a port sniffer on my laptop, I would basically have all the functionality of the carnivore box. The threat is not in the box it's in the way it is used.
They will have to pry my gun from my cold dead hands. -?
Judges & Wiretaps (Score:1)
I am not a cop, but I work with them. Our drug enforcement guys, and I'm sure our organized crime guys, have to go before a judge EVERY WEEK and show that the tap is productive, otherwise it gets yanked.
I don't think it's quite the rubber-stamp that Michael believes it to be.
And yes, judges will vary and some might be more of the blind-eye variety.
Tracking Usenet!? (Score:2)
Freedom 2.0 (Score:3)
To protect against unauthorized snooping, you can use Freedom [freedom.net] from Zero-Knowledge Systems [zeroknowledge.com]. It offers 4096 bit encryption of web browsing, pseudonymous email, cooie management, ad blocing and more.
The real problem is the mutability of the records. (Score:4)
The thing that worries me is that now so much evidence used in court is made up of electronic records, which can be forged. In the bad old days you had tape recordings of conversations, which (unless you hired Rich Little) couldn't easily be faked. But with evidence like carnivore data being used in court, what is there to stop *anyone* from putting in a couple of access to www.kiddieporn.com or email to obinladin@bombmasters.com?
Same for hard drives. I know someone who had to send dumps of his hard drives in for some stupid lawsuit. What can stop someone from patching up those dumps to look as if there is a deleted version of a "smoking gun" letter that shows guilt?
I guess on the flip side you can always say "they faked this" as a defense. Does this provide reasonable doubt?
I guess it is time to start signing e-mail.
-- ac (sorry)
Re:More Gun Facts (Score:2)
And don't forget, the establishment in power at the time would have thought that the 'rag-tag hooligans' were just a bunch of noisy reactionaries that should be supressed.
...phil
Re:Oooh... (Score:2)
Correction: a packet sniffer *and* the authority to place said packet sniffer somewhere central in every US ISP's network.
Criminals needn't worry about this, you're right: they can encrypt. It's the rest of us who are doing nothing wrong but want a little privacy nonetheless, who are going to have to put extra effort into encrypting and/or anonymysing our net activities.
--
Re:Someone hand this conspiracy junkie a clue (Score:1)
1) The NSA is not chartered for domestic surveillance
Absolutely correct. There is more in the ways of intelligence oversight than the overly paranoid will ever understand.
2) What makes you think your ISP isn't doing this already? And for whose purposes?
They are. And for non-good-for-the-customer purposes. One guy in the area that I know (same area of the country as Ricdude...) works for one of the largest network transport companies in the world. I'm not talking AOL, I'm not talking Earthlink. We're talking business solution provider-level bandwidth - the people who sell your ISP THEIR network pipes. A direct quote: "Yeah, we mine our data." He also added something to the extent of (not direct quote) "as long as the customers don't know, and the competitors don't find out, it's fine."
Needless to say, there is ONE particular company that I will NEVER buy anything from, and NEVER anything from one of their customers.
BTW - people should really be less worried about the US government snooping than some other countries whose governments have a far greater portion of their national assets behind corporate espionage (yep - other countries' governments help snoop on US corporations for the good of that other country's domestic corporations). They have FAR less oversight, too... You want corruption? Check out some of the former Eastern Bloc countries.
Having worked a computer crime case before... (Score:2)
They don't do this lightly, and don't like to do it, because the turnaround time is lousy, stuff sent sometimes doesn't return, and it's a bureaucratic pain in the ass. It's not in the NSA's charter to conduct domestic surveillance (and I'm inclined to believe that they don't for the most part - the FBI has always been , but you're mistaken if you think they don't cooperate in other capacities with law enforcement.
-Isaac
/. ate my post... trying again (Score:2)
They don't do this lightly, and don't like to do it, because the turnaround time is lousy, stuff sent sometimes doesn't return, and it's a bureaucratic pain in the ass. Essentially, it's only done when other leads are exhausted or stalled. It's not in the NSA's charter to conduct domestic surveillance (and I'm inclined to believe that they don't for the most part - that's the FBI's domain), but you're mistaken if you think they don't cooperate in other capacities with law enforcement.
-Isaac
Re:Hack Carnivore Challenge (Score:1)
This is reasonable because the ISP shouldn't want anyone else accessing their traffic, and if you're worried about the ISP changing the filter settings, they can already access all of your information anyhow. He's just saying that the box is left at the NOC, and is subject to the same kind of security as the NOC itself.
whoops! rewrite one sentence ;) (Score:1)
For this reason kiddie porn is illegal, but drugs are not.
I meant to write, "Under this concept, kiddie porn would still be illegal, but drugs would not be."
"Targeted Tax Cuts" and "sin taxes" (Score:1)
You are absolutely correct. Let's take it a step further.
Government taxes cigarettes to discourage smoking. In other words, if you don't live the government-approved lifestyle, then you have to pay extra money. This is similar to Muslims taking over countries and telling its citizenry, "If you don't convert to Islam, then you must pay a tax."
Some big-government types have reccommended that we enact a tax on twinkies and other "high-fat" foods.
Remember, government knows best (and sends its Japanese citizens to concentration camps).
Re:whoops! rewrite one sentence ;) (Score:2)
How does downloading any type of porn deprive people of life, liberty, etc...?
People who view child porn are those who create the market and the incentive for those who produce it.
"Trust the Government" (Score:3)
If you aren't doing anything illegal, you have nothing to worry about.
Lots of people seem to feel this way. These seem people also seem to be the same people who think that government should be the arbiters of morality and that laws exist to make sure that people are doing the right thing.
"I'm not downloading kiddie porn, so everything is okay. The government can set up a vidscreen in my living room and I don't mind at all. Since I'm not doing anything wrong, what do I have to fear?"
The problem with this is that the lawmakers are no more or less moral than any in the citizenry. Furthermore, it fails to take into account the psychological fact that every person finds his or her own morality. What gives the government the right to dictate morality on the citizenry? Do you really want people like Bill Clinton and Ted Kennedy dictating morality to you? And what makes their morality any better than anyone else's?
This is why I think the only things which should be illegal are things which deprives other people of life, liberty, or property. For this reason kiddie porn is illegal, but drugs are not. Key words in my belief are "other people" -- every person should be completely free to destroy his or her self if they so desire as long as it's only his or her self that is destroyed by their actions.
This is why we need privacy. The government is simply not equipped to decide what we should or should not be doing. Nor can they adequately "monitor" anyone to ensure that they are living the "government-approved lifestyle." And it cannot be shown that the "government-approved lifestyle" is any better than any other lifestyle. The best that government can do is to make laws forbidding the deprivation of another's life, liberty, or property and then enforce those laws. If we allow government to do otherwise, then we are at the whims other other people who are neither more moral nor better equipped to govern than we are -- and they have the right to use deadly force to enact their goals.
There is a solution. [lp.org]
Re:The real danger (Score:1)
Sorry, the police need a reason better than a routine traffic violation to search your car. That's already been through the courts. The cops lost. Probable cause is a really useful thing.
Now, if you consent to the search, that's your problem. You *could* have told them to come back with a warrant instead. One of my college teachers is a lawyer, and delights in making the beach cops get a warrant to search his cooler for alcolholic beverages.
Does planting of evidence never happen? There are cases where it does, sure. Is this really going to change any of that? Probably not. Are the consequences going to be any worse than they are now? Probably not.
Personally, I prefer that law enforcement be the ones doing this, rather than private industry. At least there are limits to what the law is allowed to do...
Someone hand this conspiracy junkie a clue (Score:2)
The NSA is not chartered for domestic surveillance. End of story. If they capture any transmission or conversation with a bona fide U.S. citizen, the identity of the individual on the logs reads "U.S. Citizen". They don't outsource decryption capabilities to other agencies. They don't have the time. They're too busy looking for terrorists. Forget that Enemy of the State crap. Pure fiction. Hysterical. I live close enough to Ft. Meade to know what a joke that movie was.
Don't forget that whole probable cause thing, either. That *still* limits what they are allowed to collection. If they don't have reason to suspect you're a child pornographer, they have no legal means to collect random data from your machine, hoping to find some reference to illegal activities.
Not to mention it's a lot easier to hit a known target than to sift through all the crap that flows through my machine. A day of legwork and research could easily produce more useful results than sifting through otherwise random network traffic.
So we know the FBI wants to tcpdump at your ISP. What makes you think your ISP isn't doing this already? And for whose purposes?
M-x spook
Re:Encrypt everything (Score:1)
Get a grip slashbots! YOU ARE CHANGING NOTHING HERE!
--
Re:So "open" and "free" are only good sometimes ? (Score:1)
You fools! You buy into anything that goes along with your narrow worldview, and scream and shake like babies if anything threatens to upset it!
WAKE UP SLASH BOTS!
YOU ARE CHANGING NOTHING!
--
Re:The real danger (Score:1)
Unfortunately, this is not the case. They can search anything in 'plain sight' or more importantly, within reach of the driver or any passenger. This includes closed (and locked) glove boxes, consoles, etc. They can do this in pretty much any circumstances that result from being pulled over for any traffic violation. In many places this is called Driving While Black (Hispanic). The idea is that they are looking for weapons within your reach, but certainly if they find any other contraband in the course of this search, you will be busted for that too.
and as far as not consenting to a search, that's fine. Go ahead tell the officer you don't consent. Maybe whine a little bit about your constitution freedoms. That really makes them happy and friendly. They are not going to 'come back with a warrant', they are going to hold your ass on the side of the road while they radio in for the K-9 unit to come out and sniff around your car -- they don't need a warrant for that. Hours later, when the K-9 arrives, assuming you haven't caved in by now to a search, you're still sitting by the side of a road with a suspicious cop who thinks you have something to hide by throwing the Constitution in his face. And if that dog so much as squeeks or piddles while sniffing around your car, that's all the 'warrant' they need to literally tear your vehicle apart bit by bit to search for the dreaded drugs (weapons, illegal aliens, etc). They will not put everything back into place and apologize when they don't find anything. Four hours later they will just be more pissed off, and leave you on the side of the road with your car torn to literally to shreds. That is, if they don't go ahead and plant a few cannabis seeds in the floor of your car. After all, you wouldn't consent to a search, so you probably are guilty of something.
Besides, let's say they did find something, and by a very long shot (and expensive lawyer) you manage to get the case dismissed on the grounds of illegal search. That's ok from the police's point of view, because they don't need to convict you of anything to seize your car under civil forfiture laws. Even if you were not convicted, you will never see your vehicle (home, etc) again if the police decide they want it. They will sell it and use the proceeds to fund another drug checkpoint on the highway.
Perhaps you think this is just a bunch of libertarian nonsense whining that has no basis in reality. Obviously you are not a minority, and have not seen too many real traffic stops (either in real life or on a 'realitly' show like Cops.) Yes, most people who get busted consented to the search. But you can bet your sweet ass that if you don't consent, the officer will more often than not find a reason to do a destructive search.
---
Encouraging Encryption (Score:5)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Comment removed (Score:3)
Re:The solution has been known for centuries (Score:1)
Caution: Now approaching the (technological) singularity.
Re:This is bad (Score:1)
I live in the US. This is clearly unconstitutional. Unfortunately, it is also clear from recent cases that it is unlikely to be successfully challenged. What do you mean legal? What the laws say, or what the courts will uphold?
Carnivore and Echelon are the major reasons that I can't vote for Gore, even when the most likely alternative is Bush.
Caution: Now approaching the (technological) singularity.
Re:Don't forget about Echelon (Score:1)
This isn't an always-true, but is almost one.
The net doesn't really require these snoops. They justify themselves by whatever they used to justify their current accrual of excess power. If they didn't have the excess power, then they wouldn't be able to scheme to have more. They'd just try to get their jobs done. Examples: Teachers, Fire Fighters.
Note that I'm not claiming that teachers and fire fighters are inherently more virtuous, though it may well be that the only people attracted to those jobs are those with a pre-existing attraction to public service. I'm focusing on a different aspect.
My suspicion is that if the teaching profession suddenly acquired more power than it required to get its job done, then teachers would start scheming to get more power. This seems to be an aspect of being human. So you need to take it into account when you design the systems.
And that's why Echelon and Carnivore are inherently bad. Even when decent folk are in charge of them, they will exert their influence to strengthen the reach and scope. If they didn't value the job, then decent folk wouldn't want to do it. If they aren't decent, then they will be reaching to strengthen their own power. I don't see any social win here. Just get rid of them immediately!
P.S.: If you think that revolution is any kind of desireable solution, I suggest that you take a vacation in Bosnia, and ask the locals what they think of it. Russia really lucked out, and their final Communist government deserves all the praise it hasn't gotten. That was one of the easiest transitions on record!
P.P.S.: The immediate eruption of Bosnia shows a part of the reason for their militaristic oppression. As foreigners, they had no hope of getting support from the locals, all they could do was support one side or the other, and try to keep a limit on the violence. And, of course, when the military got too strong, it started using the excess power to strengthen itself. There is no simple answer. Anarchy is unstable -- not even an unstable equilibrium, it immediately starts to fall apart into groups that compete. Democracy works well for groups of a certain size, and certain minimum average wealth, but it also has tendencies towards instability. The balence of power between the branches of government was an important concept, but wasn't specified sufficiently, so that nobody really knows who is responsible for what. E.g., the constitution implies, but doesn't really state, that the congress can impeach and remove the president just because it happens to feel like it. But everyone pretends it's because the president has done something really bad. Nonsense. If the president did something really bad, he could pardon himself. The president is supposed to be the center of the enforcement of the laws. More system design is needed here. But it's not going to happen. (Think of how it even could!)
Caution: Now approaching the (technological) singularity.
Re:Will Making Carnivore Open Source Change Anythi (Score:1)
Caution: Now approaching the (technological) singularity.
Re:What about a switched network? (Score:2)
Besides, if you have a Cabletron, HP or other high-end switch, the firmware usually has a function that will mirror one port to another just for the purpose of sniffing - and they will likely have the court order (or subpoena or writ or whatever)forcing you to use it.
I'll admit, that if it were me facing such a court order to assist in using Carnivore, I'd trade some sc4ip7 kid33z ass for mine in an instant. Revolting, eh?
Re:More Gun Facts (Score:2)
Look at the militia of that era. Not only were most state or local township forces, but there were plenty of independants. Remember, this was a revolution that had just occured, not two established nations fighting each other.
Revolutionaries wrote our constitution... they weren't just the kind of people who believed that if you don't like your government, you should pick up a gun and fight for what you believe in... they did pick up a gun and put their lives on the line for their moral beliefs.
Every letter in the constitution was written because British citizens died - so that their sons would be Virginians, Carolinians, and New Yorkers, all under a flag of the United States.
I'm amazed at the historical ignorance of the people who spout things like "Some people choose to interpret this to mean that they have a right to own a lethal firearm that is capable to inflicting serious injuries and death.". Have you ever sat down and read Jefferson? Paine? Hell, even Franklin was a hardass when it came to fighting for human rights.
These were people who had just participated in the French Revolution (yes, the same people were involved), and believed in blood-won rights. The "Don't Tread on Me" credo is associated with a venemous snake, and "Unite or Die" is Franklin's revolutionary credo.
Yes, these men were talking about empowering people with basic human rights that did not exist at the time, when masses of people still followed a King who was ordained by God... and then equipping the people with the lethal power to keep those rights though whatever means necessary.
--
Evan "I was going to vote for gun control, until I found a little known law on the books that made murder illegal already" E.
Legal in Britain (Score:1)
If you didn't do anything to prevent RIP, it's too late to complain.
carnivore isn't their only input (Score:4)
1) Carnivore is just one tool in a suite of information-gathering utilities. Other software (demonstrated at NANOG) sorts the information gathere from carnivore, and could easily take input from other data gathering systems. All the fuss over carnivore could be (and this is just conjecture) a convenient distraction from really nefarious FBI tools.
2) Carnivore needs to be deployed with the cooperation of the ISP. In addition to simply needing access to the ISP facilities, the FBI engineers need to know where on the ISP's network to locate the box so it can be effective. The FBI agent claimed his folks didn't 'strongarm' ISPs into putting these boxes on their network, although someone from the NANOG audience vigorously claimed that that exact thing (pushy FBI agents force their way onto his network) does happen.
Either way, carnivore itself is just a packetsniffer with an interface even an agent can love. I'm more interested in what other sources of input the FBI has or is developing.
Encrypt everything (Score:2)
--
Re:Oooh... (Score:2)
That's the point in the one time pad. Eliminates all possibility of decryption as long as the pad length is the same as the message, and as long as the pad is kept secret.
Even without that, I would find it very suprising to learn that anyone, including the NSA, finds it trivial to decrypt multiple levels. Even then, the problem with the big guns is that they are big. You ever seen the flotilla that accompanies one of the Navy's big gun ships or aircraft carriers. Getting the NSA to pull out there best and brightest to tackle 4 level encryption to bust a drug ring or kiddie porn ring will not be and easy political maneuver.
Oooh... (Score:3)
Seriously though. As I read the description, the only thing that would come to mind was that this device would only stop the most stupid of criminal. The type of rogues that murdered Michael Jordan's father. They commit a crime and then run around telling everyone about it.
Anyone foolish enough to be transmitting data in the clear concerning something that the FBI would care about needs to be locked away for their own protection. Any criminal with half a brain would set up a VPN to set up an SSH session in order to run their custom chat program that uses one-time-pad security. I guess the paranoid aren't being caught, only those who would log into #imACriminal and type, "Me Shotgun. Me rob Wells Fargo at Fifth and main last night. Me live in yellow house."
Again, I reiterate, this will only catch the stupid criminals, and maybe those that the powers that be want bad enough to invest the resource of the NSA to break a ridiculous amount of encryption.
What about a switched network? (Score:2)
If the FBI wanted to monitor one of our customers, they would have to put the RADIUS server, the mail server, the proxy server AND all our routers on the same network segment. The reason that we run a switch is because we were getting network resets on a normal 100Base-T hub. Running a switch eliminates that problem and if we were *forced* to put them back on a hub, it would definately cause us some greif.
What I'm wondering is how the FBI handles making these ISPs do what I'm describing? How do the bigger ISPs deal with having to put all their machines on the same network segment? I realize that some ISPs may be running fiber, but even still, not switching the main parts of your network can cause huge problems in performance. How far is the FBI prepared to go to monitor a particular user?
Distributed, real-time indexing of the Internet. Coming soon [grub.org]!
Kord
Re:Oooh... (Score:3)
Though I suppose these could be smudged a little bit by sending random data to random people on random UDP ports. Or other ways (open proxies, but we know how much spammers like those).
And it's a real pain in the ass to make sure that your recipients have the proper asymetric encryption to be able to receive your encrypted messages.
--
The solution has been known for centuries (Score:4)
Use metaphors.
Pick up a decent, non-idiosyncratic translation of some of the writings of the first century A.D. in southern Europe. They're full of references to (for example) the fall of Babylon, but what they're actually talking about is the fall of the Roman Empire.
(Recall that Rome was good at oppressing people, and that the nation of Babylon had died a long time earlier.)
Religious and political tracts have done this for a long time. We do it today: every /. reader knows which corporation I mean when I say Evil Empire, although in the mid-80's it was a different corporation, one with a three-letter acronym.
Encrypt the text, but also encrypt the meaning.
Re:Oooh... (Score:2)
Re:Oooh... (Score:1)
Re:More Gun Facts (Score:3)
"Firearms stand next in importance to the Constitution itself. They are the American people's liberty teeth and keystone under independence. From the hour the Pilgrims landed, to the present day, events, occurrences and tendencies prove that to ensure peace, security and happiness, the rifle and pistol are equally indispensable. The very atmosphere of firearms everywhere restrains evil interference - they deserve a place of honor with all that's good."
-George Washington
"A free people ought
-George Washington
Americans [have] the right and advantage of being armed -- unlike the citizens of other countries whose governments are afraid to trust their people with arms,"
-James Madison
"That the said Constitution shall never be construed to authorize Congress to infringe the just liberty of the press or the rights of conscience; or to prevent the people of the United States who are peaceable citizens from keeping their own arms..."
-Samuel Adams
"The Constitution of most of our states (and of the United States) assert that all power is inherent in the people; that they may exercise it by themselves; that it is their right and duty to be at all times armed and that they are entitled to freedom of person, freedom of religion, freedom of property, and freedom of press."
-Thomas Jefferson
"And what country can preserve its liberties, if its rulers are not warned from time to time that this people preserve the spirit of resistance? Let them take arms
-Thomas Jefferson
"No free man shall ever be debarred the use of arms. The strongest reason for people to retain their right to keep and bear arms is as a last resort to protect themselves against tyrrany in government,"
Thomas Jefferson
"The great object is that every man be armed. Everyone who is able may have a gun,"
-Patrick Henry
"To preserve liberty, it is essential that the whole body of people always possess arms
-Richard Henry Lee
"The best we can hope for concerning the people at large is that they be properly armed,"
-Alexander Hamilton
"False is the idea of utility that sacrifices a thousand real advantages for one imaginary or trifling inconvenience; that would take fire from men because it burns, and water because one may drown in it; that has no remedy for evils except destruction. The laws that forbid the carrying of arms are laws of such a nature. They disarm only those who are neither inclined nor determined to commit crime."
-Cesare Beccaria, quoted by Thomas Jefferson
"Both the oligarch and Tyrant mistrust the people, and therefore deprive them of arms."
-Aristotle
Amendment. II. A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed.
--The Consitution of the United States of America
________________________________________
Re:Don't forget about Echelon (Score:2)
> [
> when things get bad enough, the people will rise up and overthrow the ruler/government that is oppressing them
"If there is hope, it is in the proles."
- Winston Smith
Didn't exactly work out that way in 1984, did it?
If you believe "popular uprisings" against the government will even happen in a properly-managed police state, (let alone actually succeed in stopping oppression!), you haven't read much Orwell ;-)
Re:Oooh... (Score:2)
1) As an AC has already pointed out (albeit in an inflammatory way), the suggestion that NSA break your crypto was made by the author of the posting, not by the FBI official at the NANOG meeting.
2) If you were NSA, and you had the ability to break strong crypto, you would never risk exposing that fact by doing so on behalf of FBI, where evidence indicating that you had done so would become part of a public record in the resulting court case.
Shotgun's got it right with his aircraft-carrier analogy. The ability (and information regarding the existence or non-existence of the ability) to break strong crypto is a big gun, and will remain a big gun for the forseeable future. It will not be used for the kinds of routine surveillance of citizens that FBI is attempting to implement with Carnivore.
Re:Someone hand this conspiracy junkie a clue (Score:3)
Thanks. Like I've said before. I trust NSA and CIA way the hell more than I do FBI.
NSA and CIA are intelligence organizations. They are tasked to generate intelligence -- to process data and generate information useful to decisionmakers. The higher the signal-to-noise ratio, the better the quality of the intelligence. Sure, they may capture everything you do, but they're not interested in it. The data comes in, but its only value is that it can be transmuted to more useful data for processing by decisionmakers.
FBI is an enforcement organization. Their mandate is to generate arrests, not information. Data-gathering enables them to generate more arrests by placing a larger segment of the population under surveillance and then enforcing the laws as they choose.
To illustrate the difference, I'll fabricate an analogy out of another bit of automated surveillance technology: photo radar.
Both organizations would go through their photo radar records if a Ryder truck blew up a federal building near the highway, in order to make life hell for the bastard.
But the intelligence-operated radar trap wouldn't be trying to justify its existence by annoying everyone else during non-crisis situations.
interesting FBI story (Score:2)
They related some of their experiences tracking "network crime" (mostly pimply 13-year-olds) and talked about their opinion of computer security. During one anecdote, they related that they had seized a CD containing data that had been encrypted.
Now they didn't say exactly what this encryption was, so it might be less interesting than it sounds, but the FBI guys said they were relieved that they managed to convince the cracker to give them the key because "we hate having to ask the NSA to crack encryption." The way they said it, you would think cracking encryption was some kind of beaurocratic hassle rather than a major computation and theoretical feat.
Of course, it might have just been XOR or the key might have been a password. Still, interesting story.
-konstant
Yes! We are all individuals! I'm not!
What can YOU do besides complain? (Score:1)
It's been said before, but:
Vote Libertarian [lp.org].
Support the EFF [eff.org].
Support the ACLU [aclu.org].
Use encryption [pgp.com] (someone post me a Linux link).
Call your representative [house.gov].
Don't just sit there, do something. Put the right people in power and this crap will get fixed.
--jbRe:More Gun Facts (Score:1)
Re:Oooh... (Score:1)
This is bad (Score:4)
How legal is this? Is it, for example, legal here in Britain? Can any intelligence agency in the world just switch it on and type in my name and monitor my activities? This seems to enable monitoring from a distance - therefore, though I am in Britain, could the FBI snoop on me and get away with it because they're on US soil?
Re:Encrypt everything (Score:2)
Re:OK. (Score:2)
Re:Oooh... (Score:1)
Umm, did you read the article? It's a packet sniffer with some intelligent filters. My only additional question is whether ISPs these days tend to use hubs or switches? Isn't a packet sniffer kinda pointless in a switched envrionment?
Packet sniffing on switched networks? (Score:1)
I guess in this case, it would mean the box gets all the attempts at being hacked ;)
Re:Oooh... (Score:1)
Doesn't need to go on every Mom-n-Pop. Just needs to go on the major backbones, preferably at the peering points. Two boxes (one at Mae East and one at Mae West) would capture well over 50% of the U.S. internet traffic. As long as their packet sniffer can handle the load, I'd guess they only need to deploy ten or twenty boxes to capture the vast majority of traffic with origin or destination IP's in the U.S.
'Course, since it's running on NT Workstation, I wonder how well it can handle the load? Hmm... wonder if there's a way to remotely crash their box?
Re:So "open" and "free" are only good sometimes ? (Score:2)
Re:Hack Carnivore Challenge (Score:1)
You're Exactly Right (Score:2)
Vacation at Shell Extension City [shellcity.net]
Re:One Oceanic axiom down, two to go. (Score:1)
Using Carnivore, we can save you from all those nasty child pornographers and other undesirables of the day.
WAR IS PEACE
Not to mention terrorists, hackers, communists, drug pushers/traffickers/users/advocates. IGNORANCE IS STRENGTH
Releasing the source code would make Carnivore less secure.
Looks like they're 3 for 3 to me.
Will Making Carnivore Open Source Change Anything? (Score:3)
This will probably be moderated down as flamebait, but hear me out.
The issue that's on everyone's minds here is not what so much what Carnivore can do (we all know it's just a sniffer with a nice interface), but how open it is for abuse. I really don't think that by forcing the FBI to allow us to audit the source that we'll find some spectacular hidden feature, again, it's only a sniffer. Carnivore can do the things a sniffer can do (capture any and all network traffic).
The issue isn't so much the potential for "hidden features", but the potential for abuse by those using it. Could the FBI watch the traffic for all users on a subnet even thought they're only supposed to be watching one user? Yes. Could the FBI do extra things and gather extra information that a normal network sniffer could not? Probably not.
In conclusion, Carnivore's potential for hidden features are what makes in dangerous, but it's potential for abuse by the people who use it is.
Re:Oooh... (Score:1)
Even if that lame password (easy target for any dictionary attack) can pose an obstacle to the investigation I don't think they will have any luck with 256-bit symmetric Rijndael :-) If someone wants to protect his personal documents then there is no need for public key crypto. Memorize a verse of an obscure poet, invent rules of capitalization and use it as a passphrase. If it is longer than truly random key length then the attacker will be better off just trying the binary key itself. Not that he will ever succeed...
detecting being carnivored. (Score:1)
Re:Freedom 2.0 (Score:1)
Well of course not, that would be against the DMCA!
Re:"Trust the Government" or "Targeted Tax Cuts" (Score:1)
Re:So "open" and "free" are only good sometimes ? (Score:2)
So, evil_roy, appealing as your comment sounds, "I don't want someone to see what I'm doing...but I want to see their source code", it certainly doesn't hold any weight when it comes to encryption algorithms.
In the case of computer security, there isn't as much agreement among the experts, but there is a strong trend or school of thought, that says for a system to be secure, it must be studied extensively. There are a small group of experts who believe in security through obscurity. In either case, the only hypocracy here is that a pair of dissimilar words tend to be used and if you take them out of context, it sounds funny, but it in fact does make a lot of sense to have open peer review of software and algorithms used in secure systems. The data is "closed", but the code that prevents access to the data should be (according to many experts) "open".
Dragon Systems (Score:2)
In the case of Carnivore, well, it's part of the "DragonWare Tools". In the English article, the speech to text converter mentioned is made by Dragon Systems [dragonsys.com].
Ok, there's probably no relation, but being a bit paranoid and enjoying a good (or not so good) conspirancy theory like many slashdot readers, I thought I'd mention it. Maybe Carvivore 3.x will also intercept streaming audio, internet radio, voice over IP, etc... all with textual keyword searches and whatnot. Even if they're not the same Dragon, it's still not a giant stretch to envision capturing multimedia formats (with keyword matches) in real time... but if they are the same Dragon it'd be only a stone's throw away....
Re:detecting being carnivored. (Score:1)
That said, I wouldn't imagine you'd be able to catch it, if all it's doing is sniffing packets. When you transmit data over the network, your computer is essentially 'shouting' the packet it wants transmitted over the wire. Every other computer on the network can 'hear' the packet being transmitted, but any computer which doesn't need to hear it (usually) ignores it. If you're requesting a web page, the only computer which should pay any attention to the packet should be the one which serves as the gateway for the network.
It's possible, though, to tell your computer -not- to ignore those packets not addressed to it. That's what a packet sniffer does. Kinda like eavesdropping on a conversation being shouted across a crowded room. Polite folks ignore it, rude folks might not.
There used to be a problem on my campus with this when they first put a LAN in each dorm. Folks could eavesdrop on the telnet sessions of other people in their building. Then they found a way to set it up so that -every- packet transmitted over the campus networks would be encrypted.
---
Pen mode (Score:1)
The reason this is significant: Getting permission to get pen records (telephone slang, a list off all calls made by a particular phone) is a whole lot easier. IANALawyer, but I think they may be able to just supoena them, no inconvienent judge that has to be talked into issuing a warrant.
I know of at least one case where pen records (telephone) played a big role -- The investigators of a series of arson fires in the (near to the slashdot home) city of Lawrence, used analyis of calling patterns to identify the central figures.
So use that encrypted VPN, and when you aren't using it, send random data back and forth over the link so you won't face someone in the witness box pointing at an anacapa timeline, and saying: "mail was sent on tuesday, 12 hours before the bomb went off, and a reply was sent 15 minutes after detonation"...
The GUIfication of Amerika (Score:1)
It's like the "Bob" of packet sniffers.
Of course, when this obviously computer-savvy agent (or team of them... ooh) sees "suspicious" traffic, well, then you're busted.
Except if all they do is point and click, how the hell are they expected to be able to competently analyze network traffic?
On Linux, you can do the same thing with tcpdump, iptraf, and sniffit, depending on which task you're actually trying to do. Or hell, run them all, and dump to a huge logfile.
All this does is make it easier for non-technical people to operate a technical piece of machinery, and puts us all in danger of being investigated by stupider people than before.
Location, Location, Location (Score:2)
IPSEC and SSH are great tools, but they do nothing for home user's security - what's needed are things like a secure IRC client (and server), secure IM clients (and servers), and an easy-to-use PGP-style email encryptor.
The chain is only as strong as its weakest link.
Re:This is bad (Score:1)
I don't know if US law would allow the FBI to monitor those outside the US boundaries but the UK would almost certainly allow it.
Here's another cheery thought. Does anybody know if the boxes that are to be installed in UK ISPs thanks to the RIP bill will be Carnivore? I guess it would make sense to the UK to use established technology.
Funny (Score:1)
I think the workarounds are pretty simple and probably obvious to most Slashdotters. Using encryption to muzzle Carnivore might be news on CNN but not on Slashdot. We also might want to think about the day when 4096 bit encryption can be broken in a few minutes (or seconds). Once a log of your session is captured it can be kept around for quite a long time.
Change your sigs buddies, keep'em busy (Score:1)
So everyone include words like
guns, bomb, terrorist, bomber, semtex, nuclear weapon, spy, communist in your sig now!
Its hopelessly low tech but the easiest way to give'em a headache.
Two things... (Score:1)
1) Carnivore is installed *everywhere*. Even at all government offices.
2) Anyone can access its records, or begin a trace attempt.
Ho ho.
--Perianwyr Stormcrow
Re:The real problem is the mutability of the recor (Score:1)
In some ways anyway.
See, one of the major points in the OJ Simpson case (he got off scot free for those who can't recall) was how easy it is to corrupt a DNA sample.
If anyone gets prosecuted with Carnivore as the main evidence remember: If anyone can forge a 'smoking-gun' letter, there is no way to prove that a suspect (in this case you) has actually produced this evidence! Use it as your argument with Jonny Cochran as your defense attorney, and there is little way you will serve any jail time.
Going through a case like this, where Carnivore evidence has been excluded from a trial due to ease of forgability, why would the FBI continue to use it to collect evidence? There wouldn't be any logical reason to! And I'm sure the CIA wouldn't mind taking over the Carnivore project.
Re:Freedom 2.0 (Score:1)
I'd like to discuss this in more detail.
Thanks.
I am a zks employee, I do not represent them in any official capacity.
Here is question. (Score:1)
By the way, do you know that according to the United State's Constitution, you can vote if you are under 18. It specifically forbids infringing upon 18+ year olds right to vote, but says nothing about 18.
encrypted post... read on... (Score:1)
--cr@ckwhore
Take advantage of the FOIA! (Score:1)
Basically, it would be really nice to have a list of ISPs with carnivore installed. Anybody up for the task?
--cr@ckwhore
Re:More Gun Facts (Score:1)
Hold it right there. Neither you nor ESR is "fighting" anything. Your lives are not on the line, and you insult genuine freedom fighters [dictionary.com] by pretending they are.
The correct term for you and Eric Raymond would be "freedom whiner"
Re:Funny (Score:1)
For the current rate at which CPU power is increasing, one will probably run up against the statute of limitations before a 4096 bit encryption is cracked.
Re:FBI guns quote.. (Score:1)
Nathan
Re:FBI guns quote.. (Score:1)
Nathan
Re:Meaning of second amendment (OT) (Score:1)
Encrypted Licq (Score:1)
Re:This is bad (Score:2)
The BBC News article and one of the Slashdot articles poses the argument that the RIP bill is contrary to the recently passed Human Rights Act.
Don't forget about Echelon (Score:3)
Anyways, I wouldn't worry too much. Yes, they are bringing us closer to living in the world written about by George Orwell, but there will always be those of us that will be on the edge of the law, and a danger to the system, to keep the governments in check. Ummm...sorry, don't want to sound like I am making a movie trailer. Anyways, the point is that in any society, when things get bad enough, the people will rise up and overthrow the ruler/government that is oppressing them. This is not happening yet, and that's why some of us who see these crimes against us being committed by our leaders get frustrated when the average person on the street is apathetic. So far we still are pretty free and can do what we want for the most part. We do have less freedoms now than people did 50 years ago though, at least in the U.S.
Re:I gotta wonder....... (Score:2)
We have privacy?
Re:The real danger (Score:2)
The only reasonable thing to do is agree to the search and hope that the officer isn't looking for the adrenaline rush that arresting an innocent suspect brings. Some cops really get off on the idea that they are - for all practical purposes - destroying someone's life; it gives them the illusion that they rather than the government that they represent are the ones who are powerful.
If you are charged with a drug offense the odds are excellent that you will be convicted. In fact it almost doesn't matter what the outcome of the trial is; the legal system will grind you into paste regardless of whether you draw or lose. (The best you can hope for in a criminal case is a zero - zero tie. You are not allowed to score, only the state is. For sure you aren't going to win and send the prosecutor, and arresting officer to jail for lying about you to a jury. It seems pretty obvious to me, but evidently other people appear to miss the fact that if you really are innocent, everything the prosecution uses to try to convict you is a lie; they might believe their own lies, but they are still lies. )
The real danger (Score:3)
Don't think that law enforcement agencies would do something like that? Of course, you are correct: the police have never planted drugs on a suspect. Not one time, ever.
For example: no police officer would ever claim you were speeding when you weren't - just because he wanted to search your vehicle. Oh wait, I have had that happen to me three times in the last 20 years. And no, I don't look like a drug user - or even meet any sort of profile other than being a single male driving a not very expensive vehicle. I think the officers were just bored. When they couldn't find anything wrong they looked really disappointed. I was always polite and courteous to them when they pulled me over, so they didn't 'find' any drugs in my vehicle. Of course all it would have taken was a little outrage at being stooped for a crime I wasn't committing, and suddenly boom: "Look what I found." See guys, its not paranoia when it has happened to you.
Carnivore enables the modern version of a thought crime: "We thought you might be a criminal, so you are one!"
Get used to it? (Score:2)
Get used to it? Not in a million years.
-Rob
Hack Carnivore Challenge (Score:2)
Is it just me, or does that statment just give you instant wood?
Based on current ISP security [slashdot.org] and the willingness of 31337 h4xx0rz to plunder whatever and whenever they can, I'm willing to bet that at some point in the not-too-distant future we're going to hear of a Carnivore box being 0wn3d. I can just see it now:
Earlier today the FBI put out a warrant for its own arrest for a series of "distributed denial of service" attacks on major e-commerce websites earlier this week. Said one FBI source, "It appears as though we the FBI have been performing these attacks from our controversial Carnivore monitoring stations, set up around the country for legitimate purposes. Go figure, huh?"
Re:I gotta wonder....... (Score:2)
One Oceanic axiom down, two to go. (Score:2)
Well, Carnivore is certainly going to have the FBI touting this Oceanic axiom from 1984 (the book, not the year). Now there's just the other two to go:
WAR IS PEACE
They're working on that one. We're almost sure to see some kind of conflict against the Taliban and Hamas.
IGNORANCE IS STRENGTH
I'm not sure how this one will be implemented. Of course, there's the CIA hiding everything from us. Also, there's the MiB factor (... and the only reason why they go on with their pathetic lives is that they do not know about it!).
I gotta wonder....... (Score:2)
"sex on tv is bad, you might fall off..."
OK. (Score:2)
Very well, where? Anybody got an URL to
So what? (Score:2)
As a systems administrator, I have total access to all the email that goes in and out of my system. I have access to every machine in the department, both over the network and physically. And I'm just one guy on one end of the chain. On the other end is someone else like me who has access to your systems.
Perhaps your logged into an ISP and those folks don't have direct access to your machine... they still have access to everything that goes in and out of the machine. And so does everyone between my site and yours. MCI/Sprint/whoever, has access to the packets that flow between. Institutional paranoia aside, think of all the individuals who work at those sites... care to trust each and every one of them?
Anyone want to guess what percentage of network traffic is clear text? Even if its encrypted, it's just a matter of CPU and time before anyone who wants to know what your sending can know it (believe strength of encryption being another topic).
So the feds can read your email. So what? So can I or someone like me.
Do not worry about questions like: are my methods of communiation private? They are not.
Instead work to ensure that those who can have access to your "private" conversations (email or otherwise), don't have the right to do anything with it.
The first step: VOTE next month. Pick your candidates at every level of office and then tell them what you want. It's that simple. And it's really all you can do about it.
Oh... and remember, sysadmins are usually bribable with a good import. Beer that is. Cars show up on the IRS radar.