1 / 11

CARNIVORE

CARNIVORE. And Other Computer Spy Programs. What is Carnivore?. Carnivore helps the FBI conduct ‘wiretaps’ on Internet connections. Carnivore is a computer-based system that is designed to allow the FBI, in cooperation with an Internet.

leon
Download Presentation

CARNIVORE

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CARNIVORE And Other Computer Spy Programs

  2. What is Carnivore? • Carnivore helps the FBI conduct ‘wiretaps’ on Internet connections. • Carnivore is a computer-based system that is designed to allow the FBI, in cooperation with an Internet. • Service Providers (ISPs), have to comply with court orders requiring the collection of certain information about emails or other electronic communications to or from a specific user targeted in an investigation.

  3. The “Packet Sniffer” • All Internet traffic is broken down into bundles called "packets". • Carnivore eavesdrops on these packets watching them go by, then saves a copy of the packets which meet certain criteria, that are of interest.

  4. Carnivore Continued • Hardware is plugged directly into the network at a central location. • It’s the electronic equivalent of listening to everybody's phone calls to see if it’s the phone call you should be monitoring.

  5. The Carnivore Box • The Carnivore Box is a COTS (Commercial Off The Shelf) Windows NT (or Windows 2000) computer system with 128-megabytes of RAM, a Pentium III, 4-18 gigabytes of disk space, and a 2G Jaz drive where evidence is saved. • The software is written in C++. • The box has no TCP/IP protocol use (so it cannot get hacked into). • A hardware authentication device is used to control access to the box (preventing ISP personnel from accessing the device without leaving visible signs of damage).

  6. The Carnivore Box Continued • Use of a "network isolation device", which is probably a Shomiti or NetOptics tap, this prevents the box from transmitting even if a hacker where able to break in somehow. • COTS "communications software“ which means possible use of a commercial off-the-shelf application to send the data to the FBI. • Some units are rumored to have dial-in modem ports, but it seems that the standard procedure is to have an FBI agent come in daily to exchange the Jaz disk for a fresh one.

  7. Spy Hardware for the Consumer • KeyGhost - A small device that records every keystroke typed on any PC computer • Over 500,000 keystrokes can be stored with a STRONG 128 bit encryption in non-volatile flash memory. (does not need batteries to retain storage)

  8. KeyGhost • Unlike software keystroke recorders, KeyGhost records every keystroke including those used to modify the BIOS before bootup • Impossible to detect or disable using software • Costs between 200 and 400 dollars

  9. iOpus Starr Surveillance Software • Software that allows the user to access virtually everything that was done on the computer

  10. iOpus Highlights • Visual logging ( screenshots) • Text logging • Web Spy- Records all URL’s of visited sites • Chat Spy- Records both sides of a chat conversation ( works with AOLIM, ICQ, Microsoft messenger and Yahoo chat

  11. iOpus Highlights Continued • AOL spy- Records IM conversations, emails and other content inside AOL • Sends reports directly to email as a password protected compressed zip file • Runs invisibly and maintenance free • Cost- $69.95

More Related