echelon - carnivore terminado

Upload: jose-rosero

Post on 05-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 Echelon - Carnivore Terminado

    1/4

    Pgina 1 de 4

    8th Semester Jos Rosero

    UNIVERSITY OF GUAYAQUIL

    INDUSTRIAL ENGINEERING FACULTY

    TELEMATIC SCIENCES SCHOOL

    Name: Jos Rosero

    Date: 16/04/2012

    Teacher: Msc. Dlogewes Diaz

    ESSAY:

    What is ECHELON?

    A highly automated global system monitoring network to process data

    retrieved through the interception of communication traffic around the

    world. In the days of the Cold War, ECHELON's primary purpose was to keep

    an eye / ear in the USSR In the wake of the collapse of the USSR ECHELON is

    officially being used to combat terrorism offenses ann, but it seems clear the

    main focus is on political and economic espionage.ECHELON there were rumors that in development since 1947, the result of

    the UKUSA treaty signed by the governments of the United States, the United

    Kingdom, Canada, Australia and New Zealand.

    Coordination

    It is coordinated by the NSA, the CIA involvement, the USAF, the NuclearSuppliers Group, GCHQ, DSD, CSE, GCSB. It appears that the NSA is the only

    "contractor" who has access to all information, while other participants have

    only a small portion of comparingly of information.

  • 7/31/2019 Echelon - Carnivore Terminado

    2/4

    Pgina 2 de 4

    8th Semester Jos Rosero

    ECHELON system headquarters

    ECHELON system headquarters is at Fort Meade in Maryland, which is the

    General NSA. The NSA operates many interception stations around the world,with or without the knowledge of the host country.

    ECHELON functions.

    Each station of the ECHELON network has computers that automatically

    search through millions of intercepted data to contain pre-programmed

    keywords or fax, telex and e-mail addresses. Every word of every message is

    automatically searched. Computers that can search for keywords have

    existed at least since the 1970s, but the ECHELON system is designed to

    interconnect all the computers and allow the stations to function as

    components of an integrated whole.

    The scale of the collection system was described by the former director of

    the NSA, Vice Admiral William Studeman, in 1992 At that time the NSA

    system, the collection of generating about 2 million intercepted messages

    per hour. Of these, all but about 13,000 an hour were discarded. Of these

    about 2,000 met the criteria for issuing, of which about 20 are selected by

    analysts, who write 2 reports for subsequent distribucin.Por Therefore, in

    1992 MenwithHillSation intercept 17.5 million messages a year. Of these

    some 17.5 million may have been considered for analysis.

    ECHELON obviousely justify billions of dollars of expenditure. But there are

    no detailed figures are available yet.

  • 7/31/2019 Echelon - Carnivore Terminado

    3/4

    Pgina 3 de 4

    8th Semester Jos Rosero

    CARNIVORE

    Carnivore can read virtually all.

    WHAT IS CARNIVORE?

    Carnivore was a system implemented by the Federal Bureau of

    Investigation that was designed to monitor email and electronic

    communications. It used a customizable packet sniffer that can monitorall of a target user's Internet traffic. Carnivore was implemented in

    October 1997. By 2005 it had been replaced with improved commercialsoftware such as NarusInsight.

    Configuration

    The Carnivore system was a Microsoft Windows-based workstation with packet-sniffing software and a removable diskdrive.[2]This computer must be physically installed at an Internet

    service provider(ISP) or other location where it can "sniff" traffic ona LAN segment to look for email messages in transit. The technologyitself was not highly advanced it used a standard packet sniffer and

    straightforward filtering. The critical components of the operation were

    the filtering criteria. To accurately match the appropriate subject, an

    elaborate content model was developed

    Placement

    The Carnivore system could be installed on a system either throughthe cooperation of the system owner, or by use of a court order. Once

    in place, the system was restricted by U.S. Federal law[citation needed] to

    only monitor specific persons. Under the current regulations, publiclyacknowledged government personnel are required to get a warrant or

    court order naming specific people or email addresses that may bemonitored. When an email passes through that matches the filtering

    criteria mandated by the warrant, the message is logged along with

    information on the date, time, origin and destination. This logging wasbelieved to be relayed in real time to the FBI. All other traffic would

    presumably be dropped without logging or capture

    http://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Workstationhttp://en.wikipedia.org/wiki/Carnivore_(software)#cite_note-1http://en.wikipedia.org/wiki/Carnivore_(software)#cite_note-1http://en.wikipedia.org/wiki/Carnivore_(software)#cite_note-1http://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Carnivore_(software)#cite_note-1http://en.wikipedia.org/wiki/Workstationhttp://en.wikipedia.org/wiki/Microsoft_Windows
  • 7/31/2019 Echelon - Carnivore Terminado

    4/4

    Pgina 4 de 4

    8th Semester Jos Rosero

    Controversy

    Several groups expressed concern regarding the implementation,

    usage, and possible abuses of Carnivore. In July 2000, the Electronic

    Frontier Foundation submitted a statement to the Subcommittee on the

    Constitution of the Committee on the Judiciary United States House ofRepresentatives detailing the dangers of such a system. The Electronic

    Privacy Information Center also made several releases dealing with it.

    The FBI countered these concerns with statements highlighting the

    target-able nature of Carnivore. Assistant FBI Director Donald Kerr wasquoted as saying:

    The Carnivore device works much like commercial "sniffers" and other

    network diagnostic tools used by ISPs every day, except that it

    provides the FBI with a unique ability to distinguish betweencommunications which may be lawfully intercepted and those which

    may not. For example, if a court order provides for the lawful

    interception of one type of communication (e.g., e-mail), but excludes

    all other communications (e.g., online shopping) the Carnivore tool can

    be configured to intercept only those e-mails being transmitted either to

    or from the named subject.

    After prolonged negative coverage in the press, the FBI changed the

    name of its system from "Carnivore" to the more benign-sounding"DCS1000." DCS is reported to stand for "Digital Collection System";

    the system has the same functions as before. TheAssociated

    Pressreported in mid-January 2005 that the FBI essentially

    abandoned the use of Carnivore in 2001, in favor of commercially

    available software, such as NarusInsight (a mass surveillance system).

    http://en.wikipedia.org/wiki/Electronic_Frontier_Foundationhttp://en.wikipedia.org/wiki/Electronic_Frontier_Foundationhttp://en.wikipedia.org/wiki/Electronic_Privacy_Information_Centerhttp://en.wikipedia.org/wiki/Electronic_Privacy_Information_Centerhttp://en.wikipedia.org/wiki/Donald_Kerrhttp://en.wikipedia.org/wiki/Associated_Presshttp://en.wikipedia.org/wiki/Associated_Presshttp://en.wikipedia.org/wiki/Associated_Presshttp://en.wikipedia.org/wiki/Associated_Presshttp://en.wikipedia.org/wiki/NarusInsighthttp://en.wikipedia.org/wiki/NarusInsighthttp://en.wikipedia.org/wiki/Associated_Presshttp://en.wikipedia.org/wiki/Associated_Presshttp://en.wikipedia.org/wiki/Donald_Kerrhttp://en.wikipedia.org/wiki/Electronic_Privacy_Information_Centerhttp://en.wikipedia.org/wiki/Electronic_Privacy_Information_Centerhttp://en.wikipedia.org/wiki/Electronic_Frontier_Foundationhttp://en.wikipedia.org/wiki/Electronic_Frontier_Foundation