Feeds

Carnivore review due Friday

Janet Reno's whitewash crew produces

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

A controversial report on the FBI's "Carnivore" Internet surveillance tool by the Illinois Institute of Technology Research Institute (IITRI) is due at the US Department of Justice (DoJ) Friday, but its contents will remain secret until December.

The DoJ commissioned the analysis after advocacy groups and lawmakers voiced concerns this summer that Carnivore, supposedly designed to monitor the mail of criminal suspects, might violate the privacy of innocent Internet users.

The Department drew more criticism when it selected a review team staffed with high-clearance insiders with close government ties. House Majority Leader Dick Armey (Republican, Texas) charged at the time that the review was a "whitewash."

More Documents Released

Meanwhile, Thursday marked the FBI's release of an additional 362 pages of Carnivore documents to the Electronic Privacy Information Centre (EPIC), which had sued them under the Freedom of Information Act. The pages are the second release under a schedule that calls for the Bureau to make incremental releases every 45 days, to give the FBI time to painstakingly censor the portions it deems too sensitive for public disclosure.

With the latest release, the FBI notified EPIC that it would be finished handing over documents by 1 December -- a development that worries EPIC attorney David Sobel. "In two weeks they say they're going to be done," says Sobel. "That indicates that the vast majority of the pages are going to be withheld entirely, since there are 3000 pages, and we've received less than a thousand."

The release of about 600 pages in early October revealed previously unknown details about the system, including Carnivore's place in a trinity of programs -- alongside "Packeteer" and "Coolminer" -- known collectively as the "DragonWare suite."

The documents were heavily censored, and hundreds of pages were withheld entirely. Among other redactions, the formerly-classified documents had thick black lines covering portions of screen shot printouts showing Carnivore's user interface.

Notwithstanding it's sensitivity, that user interface was splashed onto a projection screen late last month at a public meeting of the North American Network Operators Group. Recording video of the meeting shows FBI agent Marcus Thomas, head of the Carnivore project, giving a demonstration of the system to an occasionally hostile group of hundreds of network technicians.

© 2000 SecurityFocus.com. All rights reserved.

Related Stories

Carnivore does more than previously thought
Carnivore reviewer chosen
Carnivore review team rudely unmasked

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Kaspersky backpedals on 'done nothing wrong, nothing to fear' blather
Founder (and internet passport fan) now says privacy is precious
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.