Please Scroll Down to See Forums Below
napsgear
genezapharmateuticals
domestic-supply
puritysourcelabs
Research Chemical SciencesUGFREAKeudomestic
napsgeargenezapharmateuticals domestic-supplypuritysourcelabsResearch Chemical SciencesUGFREAKeudomestic

Some info about Carnivore and DragonWare

decem

New member
recently, i have had 3 or 4 people email me at my ziplip address, yet i haven't received anything. some were replying to my emails, so they had to have had my address correct. this recent mysterious disappearance of these emails has led me to believe that the fbi may be utilizing their cybersnoop programs more than we think. anywho, did some research and learned some interesting facts about carnivore and just thought i'd share.

by the way, we all know that big brother monitors us. that is no big surprise. but with the recent disappearances of my email, i can't help but think that they are taking their monitoring techniques to new levels of privacy invasion and are now using their programs on the average joe instead of just people suspected of terrorism, child pornography/exploitation, espionage, information warfare or fraud. not only that, but i also can't help but think that they are not going through the appropriate procedures or getting the appropriate permission from the courts.

the technology that allows us to capture packets off the line has been around for a long time- with the right software (i.e Etherpeek) and the right permissions, anyone can successfully capture any tcp/ip packets that are being transmitted from any to sender to any receiver. so you know that if an average joe can do it, then the government is capable of that and much much more with their little bullshit cybersnoop programs such as carnivore or omnivore, but like i said, they have supposedly limited the objects of these programs/techniques to the group listed above. and even when they use it on them they're supposed to request a court order to use them.

carnivore is actually the third generation of spy software used by the fbi, and carnivore is actually just a portion of a more comprehensive system, the DragonWare Suite, which allows the FBI fucks to reconstruct e-mail messages, or downloaded files or even web pages.

DragonWare contains three parts:

Carnivore - a Windows NT/2000-based system that captures the information

Packeteer - no official information released, but presumably an application for reassembling packets into cohesive messages or Web pages

Coolminer - no official information released, but presumably an application for extrapolating and analyzing data found in the messages

the FBI is supposed to have a reasonable suspicion that someone is engaged in criminal activities and is supposed to request a court order to view the suspect's online activity.

a court grants the request for a full content-wiretap of e-mail traffic only and issues an order. a term used in telephone surveillance, "content-wiretap" means that everything in the packet can be captured and used. The other type of wiretap is a trap-and-trace, which means that the FBI can only capture the destination information, such as the e-mail account of a message being sent out or the web-site address that the suspect is visiting. a reverse form of trap-and-trace, called pen-register, tracks where e-mail to the suspect is coming from or where visits to a suspect's web site originate.

the FBI contacts the suspect's ISP and requests a copy of the back-up files of the suspect's activity.

the ISP does not maintain customer-activity data as part of its back-up.

the FBI sets up a Carnivore computer at the ISP to monitor the suspect's activity. The computer consists of:

A Pentium III Windows NT/2000 system with 128 megabytes (MB) of RAM

A commercial communications software application

A custom C++ application that works in conjunction with the commercial program above to provide the packet sniffing and filtering

A type of physical lockout system that requires a special passcode to access the computer - This keeps anyone but the FBI from physically accessing the Carnivore system.

A network isolation device that makes the Carnivore system invisible to anything else on the network - This prevents anyone from hacking into the system from another computer.

A 2-gigabyte (GB) Iomega Jaz drive for storing the captured data - The Jaz drive uses 2-GB removable cartridges that can be swapped out as easily as a floppy disk.

The FBI configures the Carnivore software with the IP address of the suspect so that Carnivore will only capture packets from this particular location. It ignores all other packets.

Carnivore copies all of the packets from the suspect's system without impeding the flow of the network traffic.
Once the copies are made, they go through a filter that only keeps the e-mail packets. The program determines what the packets contain based on the protocol of the packet. For example, all e-mail packets use the Simple Mail Transfer Protocol (SMTP).

The e-mail packets are saved to the Jaz cartridge.
Once every day or two, an FBI agent visits the ISP and swaps out the Jaz cartridge. The agent takes the retrieved cartridge and puts it in a container that is dated and sealed. If the seal is broken, the person breaking it must sign, date and reseal it -- otherwise, the cartridge can be considered "compromised."
The surveillance cannot continue for more than a month without an extension from the court. Once complete, the FBI removes the system from the ISP.

The captured data is processed using Packeteer and Coolminer. If the results provide enough evidence, the FBI can use them as part of a case against the suspect.

There are some key issues that are causing a great deal of concern from various sources:
Privacy - Many folks think that Carnivore is a severe violation of privacy. While the potential for abuse is certainly there, the Electronic Communications Privacy Act (ECPA) provides legal protection of privacy for all types of electronic communication. Any type of electronics surveillance requires a court order and must show probable cause that the suspect is engaged in criminal activities. Therefore, use of Carnivore in any way that does not adhere to ECPA is illegal and can be considered unconstitutional.

Regulation - There is a widespread belief that Carnivore is a huge system that can allow the U.S. government to seize control of the Internet and regulate its use. To do this would require an amazing infrastructure -- the FBI would need to place Carnivore systems at every ISP, including private, commercial and educational. While it is theoretically possible to do so for all of the ISPs operating in the United States, there is still no way to regulate those operating outside U.S. jurisdiction. Any such move would also face serious opposition from every direction.

Free speech - Some people think that Carnivore monitors all of the content flowing through an ISP, looking for certain keywords such as "bomb" or "assassination." Any packet sniffer can be set to look for certain patterns of characters or data. Without probable cause, though, the FBI has no justification to monitor your online activity and would be in severe violation of ECPA and your constitutional right to free speech if it did so.

Echelon - This is a secret network rumored to be under development by the National Security Agency (NSA). Echelon is supposedly designed to detect and capture packets crossing international borders that contain certain keywords, such as "bomb" or "assassination." While there is no solid evidence to support the existence of Echelon, many people have confused it with the very real Carnivore system.
All of these concerns have made implementation of Carnivore an uphill battle for the FBI. The FBI has refused to disclose the source code and certain other pieces of technical information about Carnivore, which has only added to people's concerns. But, as long as it is used within the constraints and guidelines of ECPA, Carnivore has the potential to be a useful weapon in the war on crime.




well, there it is. if you want any more info on carnivore or dragonware, just do a search and you'll come up with loads of it.


btw, has anyone else had trouble with ziplip and receiving their email? what do you guys think? is it ziplip being just plain shitty or is there someone else to blame for these lost emails?
 
sheesh..... one lousy response. that's all i get for all the time and effort i put into this post. o.k., so i did some cutting and pasting, but it still took a little while. alright alright, it only took 3 minutes, but it's still good info that deserves at the very least a "good post decem," or maybe "thanks for the info decem, quite informative."

now give me some props god damn it.... j/k



btw manny, i'm not saying your response was lousy, just that i didn't get anymore.
 
Stop your scaring me. Here i am saving up for gear hopeing the person im going to get it from wont be paranoid when he finally hears from me and you go and post this. how is a brother soposed to stay calm? Im no tarrorist, all I want to do is get in shape because im tired of being fat. Thanks for the info. Is there any protection out there?:bawling:
 
There are also other network analyzers out there, some that you can download for free, that with some basic info like ip addresses will let you capture packets.

Really good post bro!
 
Good post, decem, and good reasons to always log on to Safeweb or other IP masking and encrypting technologies prior to emailing sensitive data, and while surfing web interests such as these on Elite.
 
um... ok....bump for a good post.
good info decem NOW QUIT BITCHIN:p
 
Top Bottom