Documente Academic
Documente Profesional
Documente Cultură
1. INTRODUCTION
2. WHAT IS CARNIVORE ?
3. TYPES OF MODES
4. FILTERING METHODS
6. IS IT NEW TECHNOLOGY ?
7. ANTIVORE
9. CONCLUSION
INTRODUCTION :
Technology can be used for good as well as for bad purposes. The
development of technology makes the human life comfortable and simple
but at the same time it also helps to anti-social elements like criminals and
terrorists. With the evolution of communication system they can talk and
send information as easy as we with our family members and friends. The
evolution of cell-phone technology is useful for both Norman people as
well as for the terrorist and criminals at the same extent. For avoiding this
type of crimes law enforcement agencies were developed the phone
tapping technology.
Using the technology we can find from where he is talking and can
record what he is talking without his knowledge. All of us well know that
to uncover the cricket match-fixing rocket
Central Bureau of Investigation (CBI) used this technology to tap the
South Africa’s cricket team captain Hansie Cronje’s cellphone.
WHAT IS CARNIVORE ?
TYPES OF MODES :
The pen mode or trap and trace mode almost looks Caller Line
Identification method (CLI), which is used in telephones. Using this CLI,
we can know the Caller number (calling person’s telephone number).
In the same way, Carnivore also finds from address the packet had come
and to whom it was addressed etc.,.
Apart from these details it can also find the IP addresses of the server
and also the details of the other servers that are participated in routing
mails. Using all this information we can find the details of the computers
that are participated in File Transfer Protocol (FTP) and Hyper Text
Transfer Protocol (HTTP) sessions. In general for scanning the E-mails
we use Pen Mode.
FULL-COLLECTION MODE :
Apart from the single word filtering method, Carnivore provides some
more methods. According to our needs we can set the Filtering Method,
which we want.
1. Fixed IP Filtering
2. Dynamic IP Filtering
3. Protocol Filtering
4. Fixed IP Filtering
5. Text Filtering
6. Port Filtering
7. E-mail Address Filtering
1. Fixed IP Filtering :
3. Protocol Filtering :
4.Text Filtering :
In this method, Carnivore filters the packets using the specified text
string. For example, if we have a doubt about a customer then setting his
user name as text string, we can save a part or complete conversation or
Addresses. In the same way giving some doubtful works to text string we
can filter the packets that contain these words.
5. Port Filtering :
Like this, using the Carnivore FBI is able to get any information in
Internet. Since this small application gives a wide authority to the FBI on
the Internet, people as well as organizations are afraid and are protesting
against the Carnivore.
All ISP
DATA
Traffic routed
by ISP to FBI
access point
Original Data
Copy of
Data
Required
Filter Data
In this way, the computer, which is in the ISP office, is connected to
the computer that is located in FBI’s office to the separate line. The
computer, which is in the FBI’s office, can only control the work of the
computer that is in the ISP’s office. In this computer they install the
software, carnivore.exe. . It is Graphical User Interface software. It works
as frontend system to pass parameters that are related to required data by
the users (FBI agents). With the help of TAP API driver, this computer
controls the software that is installed in the computer that is located in
ISP’s office. But, the TAP NDIS driver can filter the data completely.
They control this computer completely from the FBI’s office.
IS IT NEW TECHNOLOGY ?
In fact Carnivore is not a new technology. These types of several
sniffers are available in the market. The technology base behind the
claim that Carnivore can only intercept particular E-mail and other
legally permissible Internet stuff is corroborated by a system named
Etherpeek, developed by a US company A.G.Group Inc., a provider of
network management software.
ANTIVORE :
“Carnivore is the biggest step that the US has taken towards big
brother and we are determined to defeat it”. Other sides like
Hushmail.com. Anonymizer.com are also offering services that would
protect the Net traffic.
The first news of the existence of Carnivore came into the media glare
in April 2000,during the US congressional testimony by Washington
lawyer Robert Corn-revere, who represented an Internet service provider
who tried to resist attachment of the system. Under the freedom of
information act, the electronic privacy information center registered a case
against the Carnivore.
In various forums over the last few months the FBI tried to appease the
public at large by explaining the operational mechanisms of the Carnivore
system, but civil liberty groups and some software companies are not
treating the agency at face value.
As for the FBI’s definition the Carnivore software provides the agency
with a “surgical” ability to intercept and collect the communications that
are the subject of the lawful order while ignoring those
communicationswhich they are not authorized to intercept. This tool, as
the FBI claims, is necessary to meet the stringent requirements of the US
Federal Wiretapping Statures.
FBI officials argue that the Carnivore system has become necessary
because some smaller ISP’s do not have the capability to provide the data
that law enforcement bodies need quickly. They claim that even though
grabbing standard electronic mails is relatively simple, newer web-based
methods often offer challenge that only Carnivore can meet.
It can intercept all the streams of net traffic even of non-target people,
out of some “other “ expediency. And as the FBI has not explained the
exact functional mechanism the electronic surveillance system, people
ambivalence refuses to subside.
According to civil liberty groups arguments, Carnivore’s job is made
difficult by the fact that it must be at least somewhat general-purpose in
it’s design. It must be able to be configuring to operate reliably on a
variety of ISP networks under a large range of operational conditions.
“The bad news is that it’s a black box the government wants to insert
into the premises of an Internet ISP. Nobody knows what it dies,” said
James Dempsey, an analyst with theWashington based
Centre for Democracy and Technology. “Such a system could be used to
track dissidents and journalists online,” said Washington lawyer Robert
Corn-Revere.
CONCLUSION :