echelon - carnivore terminado
TRANSCRIPT
-
7/31/2019 Echelon - Carnivore Terminado
1/4
Pgina 1 de 4
8th Semester Jos Rosero
UNIVERSITY OF GUAYAQUIL
INDUSTRIAL ENGINEERING FACULTY
TELEMATIC SCIENCES SCHOOL
Name: Jos Rosero
Date: 16/04/2012
Teacher: Msc. Dlogewes Diaz
ESSAY:
What is ECHELON?
A highly automated global system monitoring network to process data
retrieved through the interception of communication traffic around the
world. In the days of the Cold War, ECHELON's primary purpose was to keep
an eye / ear in the USSR In the wake of the collapse of the USSR ECHELON is
officially being used to combat terrorism offenses ann, but it seems clear the
main focus is on political and economic espionage.ECHELON there were rumors that in development since 1947, the result of
the UKUSA treaty signed by the governments of the United States, the United
Kingdom, Canada, Australia and New Zealand.
Coordination
It is coordinated by the NSA, the CIA involvement, the USAF, the NuclearSuppliers Group, GCHQ, DSD, CSE, GCSB. It appears that the NSA is the only
"contractor" who has access to all information, while other participants have
only a small portion of comparingly of information.
-
7/31/2019 Echelon - Carnivore Terminado
2/4
Pgina 2 de 4
8th Semester Jos Rosero
ECHELON system headquarters
ECHELON system headquarters is at Fort Meade in Maryland, which is the
General NSA. The NSA operates many interception stations around the world,with or without the knowledge of the host country.
ECHELON functions.
Each station of the ECHELON network has computers that automatically
search through millions of intercepted data to contain pre-programmed
keywords or fax, telex and e-mail addresses. Every word of every message is
automatically searched. Computers that can search for keywords have
existed at least since the 1970s, but the ECHELON system is designed to
interconnect all the computers and allow the stations to function as
components of an integrated whole.
The scale of the collection system was described by the former director of
the NSA, Vice Admiral William Studeman, in 1992 At that time the NSA
system, the collection of generating about 2 million intercepted messages
per hour. Of these, all but about 13,000 an hour were discarded. Of these
about 2,000 met the criteria for issuing, of which about 20 are selected by
analysts, who write 2 reports for subsequent distribucin.Por Therefore, in
1992 MenwithHillSation intercept 17.5 million messages a year. Of these
some 17.5 million may have been considered for analysis.
ECHELON obviousely justify billions of dollars of expenditure. But there are
no detailed figures are available yet.
-
7/31/2019 Echelon - Carnivore Terminado
3/4
Pgina 3 de 4
8th Semester Jos Rosero
CARNIVORE
Carnivore can read virtually all.
WHAT IS CARNIVORE?
Carnivore was a system implemented by the Federal Bureau of
Investigation that was designed to monitor email and electronic
communications. It used a customizable packet sniffer that can monitorall of a target user's Internet traffic. Carnivore was implemented in
October 1997. By 2005 it had been replaced with improved commercialsoftware such as NarusInsight.
Configuration
The Carnivore system was a Microsoft Windows-based workstation with packet-sniffing software and a removable diskdrive.[2]This computer must be physically installed at an Internet
service provider(ISP) or other location where it can "sniff" traffic ona LAN segment to look for email messages in transit. The technologyitself was not highly advanced it used a standard packet sniffer and
straightforward filtering. The critical components of the operation were
the filtering criteria. To accurately match the appropriate subject, an
elaborate content model was developed
Placement
The Carnivore system could be installed on a system either throughthe cooperation of the system owner, or by use of a court order. Once
in place, the system was restricted by U.S. Federal law[citation needed] to
only monitor specific persons. Under the current regulations, publiclyacknowledged government personnel are required to get a warrant or
court order naming specific people or email addresses that may bemonitored. When an email passes through that matches the filtering
criteria mandated by the warrant, the message is logged along with
information on the date, time, origin and destination. This logging wasbelieved to be relayed in real time to the FBI. All other traffic would
presumably be dropped without logging or capture
http://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Workstationhttp://en.wikipedia.org/wiki/Carnivore_(software)#cite_note-1http://en.wikipedia.org/wiki/Carnivore_(software)#cite_note-1http://en.wikipedia.org/wiki/Carnivore_(software)#cite_note-1http://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Carnivore_(software)#cite_note-1http://en.wikipedia.org/wiki/Workstationhttp://en.wikipedia.org/wiki/Microsoft_Windows -
7/31/2019 Echelon - Carnivore Terminado
4/4
Pgina 4 de 4
8th Semester Jos Rosero
Controversy
Several groups expressed concern regarding the implementation,
usage, and possible abuses of Carnivore. In July 2000, the Electronic
Frontier Foundation submitted a statement to the Subcommittee on the
Constitution of the Committee on the Judiciary United States House ofRepresentatives detailing the dangers of such a system. The Electronic
Privacy Information Center also made several releases dealing with it.
The FBI countered these concerns with statements highlighting the
target-able nature of Carnivore. Assistant FBI Director Donald Kerr wasquoted as saying:
The Carnivore device works much like commercial "sniffers" and other
network diagnostic tools used by ISPs every day, except that it
provides the FBI with a unique ability to distinguish betweencommunications which may be lawfully intercepted and those which
may not. For example, if a court order provides for the lawful
interception of one type of communication (e.g., e-mail), but excludes
all other communications (e.g., online shopping) the Carnivore tool can
be configured to intercept only those e-mails being transmitted either to
or from the named subject.
After prolonged negative coverage in the press, the FBI changed the
name of its system from "Carnivore" to the more benign-sounding"DCS1000." DCS is reported to stand for "Digital Collection System";
the system has the same functions as before. TheAssociated
Pressreported in mid-January 2005 that the FBI essentially
abandoned the use of Carnivore in 2001, in favor of commercially
available software, such as NarusInsight (a mass surveillance system).
http://en.wikipedia.org/wiki/Electronic_Frontier_Foundationhttp://en.wikipedia.org/wiki/Electronic_Frontier_Foundationhttp://en.wikipedia.org/wiki/Electronic_Privacy_Information_Centerhttp://en.wikipedia.org/wiki/Electronic_Privacy_Information_Centerhttp://en.wikipedia.org/wiki/Donald_Kerrhttp://en.wikipedia.org/wiki/Associated_Presshttp://en.wikipedia.org/wiki/Associated_Presshttp://en.wikipedia.org/wiki/Associated_Presshttp://en.wikipedia.org/wiki/Associated_Presshttp://en.wikipedia.org/wiki/NarusInsighthttp://en.wikipedia.org/wiki/NarusInsighthttp://en.wikipedia.org/wiki/Associated_Presshttp://en.wikipedia.org/wiki/Associated_Presshttp://en.wikipedia.org/wiki/Donald_Kerrhttp://en.wikipedia.org/wiki/Electronic_Privacy_Information_Centerhttp://en.wikipedia.org/wiki/Electronic_Privacy_Information_Centerhttp://en.wikipedia.org/wiki/Electronic_Frontier_Foundationhttp://en.wikipedia.org/wiki/Electronic_Frontier_Foundation