Feeds

Carnivore review team rudely unmasked

DoJ censorship backfires

  • alert
  • submit to reddit

Security for virtualized datacentres

When the US Department of Justice (DoJ) released the winning Carnivore review proposal in Adobe .pdf format, they apparently failed to mask the names and other details of the review team adequately.

According to Cryptome, the details can be unmasked by copying and pasting the .pdf text or by using an Adobe plug-in, such as Pitstop, to remove overwriting.

"This cloaking is weaker than a similar technique used by the New York Times for cropping text of the secret CIA report on Iranian Premier Mossadeq's 1953 overthrow," Cryptome scoffs.

These are the people who would protect the privacy of all who fall into Carnivore's jaws.

The 'hidden' information shows that the review team at the Illinois Institute of Technology's Research Institute includes a large number of White House insiders, including a former Clinton information policy advisor, and a former DoJ official. Other team members have backgrounds in the dreaded National Security Agency (NSA), the Department of Defence, and the Department of the Treasury.

Cryptome's version with DoJ overwriting removed is located here. The DoJ's original, redacted version is located here, for those who might wish to verify Cryptome's changes for themselves. ®

Related Coverage

Carnivore reviewer chosen

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.