CARNIVORE And Other Computer Spy Programs. What is Carnivore? Carnivore helps the FBI conduct ‘wiretaps’ on Internet connections. Carnivore is a computer-based.

Slides:



Advertisements
Similar presentations
Hardware Lesson 3 Inside your computer.
Advertisements

Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Computer Basics 1 Computer Basic 1 includes two lessons:
What Is a Computer and What Does It Do?
A computer is a machine that is used to store and process data electronically Computer Definition.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Why do we need to learn about computers? Hardware & Software Windows95 Desktop - GUI? Mice? Internet Explorer & Netscape Microsoft Applications: –Excel.
Using Technology in the FL Classroom: An Introduction By Sandy Dugan.
COMPUTER SYSTEM COMPONENTS ACTIVITY
COEN 252: Computer Forensics Router Investigation.
Introduction to Computers Essential Understanding of Computers and Computer Operations.
Operating Systems.
System Software, functions of an operating system
Parts of a Computer.
Hardware and Software Basics. Computer Hardware  Central Processing Unit - also called “The Chip”, a CPU, a processor, or a microprocessor  Memory (RAM)
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
What is Computer Hardware
AN INTRODUCTION TO LINUX OPERATING SYSTEM Zihui Han.
Instant Messaging Security Flaws By: Shadow404 Southern Poly University.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Teaching and Learning with Technology  Allyn and Bacon 2002 Networks and the Internet Chapter 7 Technology in Teaching and Learning.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Introduction to Computers Personal Computing 10. What is a computer? Electronic device Performs instructions in a program Performs four functions –Accepts.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
Lesson 2 — The Internet and the World Wide Web
What is FORENSICS? Why do we need Network Forensics?
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
CPU (CENTRAL PROCESSING UNIT): processor chip (computer’s brain) found on the motherboard.
BASIC COMPUTER CONCEPTS What is a computer? An electronic device, operating under the control of instructions stored in its own memory unit, that can.
What does a Computer Do?. What is a Computer? A computer is an electronic device, operating under the control of instructions stored in its own memory,
COEN 252 Computer Forensics Collecting Network-based Evidence.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Introduction to Computers
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Inside your computer. Hardware Review Motherboard Processor / CPU Bus Bios chip Memory Hard drive Video Card Sound Card Monitor/printer Ports.
Jump to first page Carnivore The Electronic Surveillance Tool Pedro E. Cusinga CIS450 Strayer University.
Introduction to Computer and Computer Networking: Part I Xiangming Mu 9/16/2004.
1 After completing this lesson, you will know: What computers need to operate—basic hardware and peripheral devices Why and how to protect your computer.
Computer Basics & Terminology Study Guide Test 5 6 th grade MSBCS-BCSI-1 Students will identify computer system components.
1 Course Title: IT IN BUSINESS Course Instructor: ADEEL ANJUM Chapter No: 04 1 BY ADEEL ANJUM (MCS, CCNA,WEB DEVELOPER)
MSBCS-BCSI-1 Students will identify computer system components MSBCS-BCSIII-8 Students will examine basics of networking Computer Basics & Terminology.
Getting To Know Computers COMPUTER BASICS. WHAT IS A COMPUTER? A computer is an electronic device that manipulates information, or “data.” It has the.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Business Technology Applications Computer Basics Vocab.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Parts of a Computer Created by Carmen Garzes. An electronic device that manipulates information or data. It can store, retrieve or process data. There.
Computer Basics CHAPTER 1. What is a computer?  A computer is a machine that changes information from one form into another by performing four basic.
Introduction To Computer Programming – 1A Computer Parts, Words, and Definition Herriman High School.
PCs ENVIRONMENT and PERIPHERALS Lecture 3. operating system and other system software that control the usage of the computer equipment application programs.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
Information Technology (IT). Information Technology – technology used to create, store, exchange, and use information in its various forms (business data,
Web Browser presentation Name/ Hassan AL-Abdulmohsen
Port Knocking Benjamin DiYanni.
Discovering Computers 2012: Chapter 8
Power Point Vocabulary
Objectives Describe the difference between RAM and ROM
What is keystroke logging?
What is an operating system An operating system is the most important software that runs on a computer. It manages the computer's memory and processes,
Presentation transcript:

CARNIVORE And Other Computer Spy Programs

What is Carnivore? Carnivore helps the FBI conduct ‘wiretaps’ on Internet connections. Carnivore is a computer-based system that is designed to allow the FBI, in cooperation with an Internet. Service Providers (ISPs), have to comply with court orders requiring the collection of certain information about s or other electronic communications to or from a specific user targeted in an investigation.

The “Packet Sniffer” All Internet traffic is broken down into bundles called "packets". Carnivore eavesdrops on these packets watching them go by, then saves a copy of the packets which meet certain criteria, that are of interest.

Carnivore Continued Hardware is plugged directly into the network at a central location. It’s the electronic equivalent of listening to everybody's phone calls to see if it’s the phone call you should be monitoring.

The Carnivore Box The Carnivore Box is a COTS (Commercial Off The Shelf) Windows NT (or Windows 2000) computer system with 128-megabytes of RAM, a Pentium III, 4-18 gigabytes of disk space, and a 2G Jaz drive where evidence is saved. The software is written in C++. The box has no TCP/IP protocol use (so it cannot get hacked into). A hardware authentication device is used to control access to the box (preventing ISP personnel from accessing the device without leaving visible signs of damage).

The Carnivore Box Continued Use of a "network isolation device", which is probably a Shomiti or NetOptics tap, this prevents the box from transmitting even if a hacker where able to break in somehow. COTS "communications software“ which means possible use of a commercial off-the-shelf application to send the data to the FBI. Some units are rumored to have dial-in modem ports, but it seems that the standard procedure is to have an FBI agent come in daily to exchange the Jaz disk for a fresh one.

Spy Hardware for the Consumer KeyGhost - A small device that records every keystroke typed on any PC computer Over 500,000 keystrokes can be stored with a STRONG 128 bit encryption in non- volatile flash memory. (does not need batteries to retain storage)

KeyGhost Unlike software keystroke recorders, KeyGhost records every keystroke including those used to modify the BIOS before bootup Impossible to detect or disable using software Costs between 200 and 400 dollars

iOpus Starr Surveillance Software Software that allows the user to access virtually everything that was done on the computer

iOpus Highlights Visual logging ( screenshots) Text logging Web Spy- Records all URL’s of visited sites Chat Spy- Records both sides of a chat conversation ( works with AOLIM, ICQ, Microsoft messenger and Yahoo chat

iOpus Highlights Continued AOL spy- Records IM conversations, s and other content inside AOL Sends reports directly to as a password protected compressed zip file Runs invisibly and maintenance free Cost- $69.95