SC about those men in black

  • Two Factor Authentication is now available on BeyondUnreal Forums. To configure it, visit your Profile and look for the "Two Step Verification" option on the left side. We can send codes via email (may be slower) or you can set up any TOTP Authenticator app on your phone (Authy, Google Authenticator, etc) to deliver codes. It is highly recommended that you configure this to keep your account safe.

thewalkingman

ssssssssssss bugger!
Nov 12, 2000
6,445
0
0
Quahog
Visit site
You may want dumb down your posts so they dont think you are the next Ted Kaczynski








Friday May 4 1:57 PM ET
Documents Show FBI Web Surveillance


By D. IAN HOPPER, Associated Press Writer

WASHINGTON (AP) - The FBI has used Internet eavesdropping tools to track fugitives, drug dealers, extortionists, computer hackers and suspected foreign intelligence agents, documents show.

The documents, obtained by The Associated Press under the Freedom of Information Act, also detail how the FBI scurried last year to prove it wasn't ``randomly looking at everyone's e-mail'' once its Web surveillance practices came under attack.

The FBI records show the agency used its controversial Carnivore system 13 times between October 1999 and August 2000 to monitor Internet communications, and a similar device, Etherpeek, another 11 times.

Carnivore is a set of software programs for monitoring Internet traffic - e-mails, Web pages, chat room conversations and other signals - going to or from a suspect under investigation. Etherpeek is a commercially available network monitoring program that is far less precise in filtering the information collected.

Civil liberties groups contend that Carnivore can collect too much information and put ordinary citizens at risk. Some Internet service providers have raised concerns that since Carnivore's inner workings are secret, it may damage or slow down their networks while it's capturing e-mails.

While large portions of the FBI documents are blacked out to protect national security and investigative secrets, they reveal new details about the agency's Internet surveillance program.

In January 2000, for example, FBI agents got a wide-ranging order to use a computer wiretap in a gambling and money laundering investigation. The wiretap was successful, according to an e-mail to Marcus Thomas, head of the FBI's cybertechnology lab.

``We got bank accounts, where money was hidden and other information,'' reads the e-mail from an unknown agent. ``Some of the data sent ... was instrumental in tying several of the conspirators to the crime. One of the conspirators is offering to pay ... as part of a plea bargain.''

The following month FBI investigators used Carnivore to catch a fugitive for the U.S. Marshals Service. The Internet provider involved protested in court, but was ordered to cooperate.

The 24 instances of Internet surveillance also included four investigations of computer hacking, three drug probes, one extortion investigation and an intellectual property case. The nature of the other cases was not disclosed. The FBI has said that Carnivore has been used in investigations involving national security and attempted domestic terrorism.

One July 2000 e-mail about Carnivore, with the names of both the author and recipient deleted, contains the only reference to national security matters: ``We have a pending FISA order there and as soon as we get authority to test our (software) we will be installing it.''

FISA stands for the Foreign Intelligence Surveillance Act, which enables the FBI to wiretap foreigners for espionage cases.

E-mails between FBI agents show how determined the bureau was to justify Carnivore's existence after the disclosure of it last year raised protests from lawmakers and privacy advocates.

In July, the Tampa, Fla., field office sent an e-mail to other agents, including Thomas at the FBI lab, offering a slide show explaining how a militia group used the Internet to communicate.

The group's leader pleaded guilty and was sentenced last year for planning to break into military facilities to steal explosives and blow up energy facilities in southeastern states.

``This might be used to show why Carnivore is necessary and essential for law enforcement to combat terrorism,'' reads the e-mail from an unspecified Tampa agent.

Thomas replied: ``This kind of information would be very helpful in fighting the idea that we are randomly looking at everyone's e-mail.''

Also during July, FBI officials found an Internet service provider that was willing to convince other Internet firms that Carnivore was safe. The provider's identity was not disclosed.

The provider ``is available to you as an ISP to address/counter any issues that other ISPs may have in installing Carnivore,'' the e-mail reads, adding that the company ``is aware of issues that national providers need to address for wiretapping.''

The FBI 2002 budget request includes more than $13 million for Internet surveillance, $2.5 million more than this year. Most of the new money would go for research and development.

In justifying the budget, the FBI cybertechnology lab said the number of requests for Internet wiretaps from FBI field offices increased by 1,850 percent from 1997 to 1999. The exact number of requests was not disclosed.

-

On the Net:
 

SimplyCosmic

ERGO. VIS A VIS. CONCORDANTLY.
Dec 25, 1999
6,311
0
0
Northeast Ohio
www.simplycosmic.net
Why? The United States Government likes me to know as much as I do.

And besides, you don't think I sit through all those annual security briefings without having what I can and can't say drilled into my head.

;)

And their suits tend to be either light grey or dark blue.
 

desperado

New Member
Dec 29, 1999
1,028
0
0
q
Visit site
Echelon project still owns your carnivore:)
Effectiveness of Echelon
Echelon has been successful in monitoring international and domestic communications for some time. A number of international criminals have been detected. Among the known or suspected uses are:
Discovery of missile sites in Cuba
Capture of the Achille Lauro terrorists
Discovery of Libyan involvement in the Berlin discotheque bombing
In addition to rooting out those who commit crimes, the system have been used to detect the planning of crimes. This allows police action to prevent these crimes.

But, this power has often been used for less noble purposes. It has also been used for political and economic purposes to spy on individuals who are not involved in international terrorism or plots against a national government. Some suspected uses are:

Target calls from U.S. Senator Strom Thurmond.
Monitor anti-Viewnam war leaders such as Jane Fonda and Dr. Benjamin Spock.
Monitor Black Panther leader Eldridge Cleaver
Monitor Amnesty International organization
Monitor Greenpeace organization
Monitor Christian Aid organization
Margaret Thatcher requested to have two government ministers monitored
Margaret Thatcher ordered observation of the parent company of the London Observer after publication of negative articles
Kissinger used NSA to intercept messages from rival Secretary of State William Rogers
Monitor phone calls of Maryland Congressman, Michael Barnes
Menwith Hill station received the 1991 "Station of the Year" prize for its role in the Gulf War.
Monitoring delegates of the five-day Asia-Pacific Economic Cooperation conference
Monitoring Mexican trade representatives during the NAFTA trade negotiations
Echelon represents a powerful force that can be used for good. Echelon has been used to detect plans for sabotage and espionage; events that were thwarted before they came to fruition and were therefor never reported. It has been used to locate and capture international criminals.

The power of the system also lends itself to corrupting influences. Those whose goal is power have used the system to enhance their positions and diminish the power of others.

As the system is further enhanced, its capabilities will improve. It will likely be used increasingly for police, political, and economic purposes.