Carnivore

Carnivore was an Internet surveillance system developed for the U.S. Federal Bureau of Investigation (FBI) so that they could monitor the electronic transmissions of criminal suspects. Critics, however, charged that Carnivore did not include appropriate safeguards to prevent misuse and might violate the constitutional rights of the individual. The Electronic Privacy Information Center (EPIC) reported in early 2005 that the FBI had replaced Carnivore with other unspecified surveillance software from commercial sources. Such software usually includes a packet sniffer.

Carnivore was an Internet surveillance system developed for the U.S. Federal Bureau of Investigation (FBI) so that they could monitor the electronic transmissions of criminal suspects. Critics, however, charged that Carnivore did not include appropriate safeguards to prevent misuse and might violate the constitutional rights of the individual. The Electronic Privacy Information Center (EPIC) reported in early 2005 that the FBI had replaced Carnivore with other, unspecified surveillance software from commercial sources. Such software usually includes a packet sniffer.

EPIC, a public interest group dedicated to emerging civil liberties issues, was the chief critic of Carnivore and continues to be concerned about violations of privacy rights. The group sued and got the FBI to release background information on the system, although the Bureau refused to turn over Carnivore's source code. A private study conducted by the Illinois Institute of Technology Research Institute, which was commissioned by the U.S. Justice Department, found several shortcomings in Carnivore. For example, the system did not keep track of individual users, so any operator defaulted to "administrator," leaving no audit trail. Also, the system lacked a feature that would require users to confirm that a court order was granted.

The U.S. Patriot Act of 2001 grants the Justice Department the right to examine routing information, but not message contents, without first establishing probable cause and getting a judge's permission.

This was first published in December 2005

Continue Reading About Carnivore

Dig deeper on Information Security Laws, Investigations and Ethics

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close