Carnivore PPT

27
Carnivore: Internet Wiretapping

Transcript of Carnivore PPT

Page 1: Carnivore PPT

Carnivore:Internet Wiretapping

Page 2: Carnivore PPT

MADHAVI MISHRA

PRIYANKA VIKRAMADITHYAN

MANSI SINGH

PRESENTED BY

Page 3: Carnivore PPT

Introduction

• Needs of the Law enforcement agencies

• Individual's privacy concerns

• Emerging technology

Page 4: Carnivore PPT

Goals

• To inform about the current technical, government, and public opinion state of U.S. Internet wiretapping policy through a case study of the FBI’s Carnivore system

• To discuss concerns about the current state of U.S. Internet wiretapping policy

• To propose changes to improve the U.S. system of Internet wiretapping

Page 5: Carnivore PPT

Executive Background

When does the FBI use Carnivore?• The ISP cannot narrow sufficiently the

information retrieved to comply with the court order

• The ISP cannot receive sufficient information• The FBI does not want to disclose information to

the ISP, as in a sensitive national security investigation.

Page 6: Carnivore PPT

Executive Background

Full mode wiretap

• Case agent consults with the Chief Division Counsel, and a Technically Trained Agent.

Pen mode wiretap

• Case agent writes up a request with a justification for necessity

Page 7: Carnivore PPT

Executive Background

• FBI shows a judge the relevance of the information

• FBI shows a judge why traditional enforcement methods are insufficient

• FBI submits a request with information such as target ISP, e-mail address, etc.

• FBI waits 4-6 months

Page 8: Carnivore PPT

Hardware Architecture

• A one-way tap into an Ethernet data stream• A general purpose computer to filter and

collect data• One or more additional general purpose

computers to control the collection and examine the data

• A ‘locked’ telephone link to connect the computers

Page 9: Carnivore PPT

Hardware Architecture

CarnivoreHub

RemoteHub

Tap

Ethernet Switch

Other NetworkSegments

The Internet

Target

Bystander

Page 10: Carnivore PPT

Software Architecture

Functionality

• Filtering

• Filter Precedence

• Output

• Analysis

Page 11: Carnivore PPT

Software Architecture

Page 12: Carnivore PPT

Software Architecture• FilteringFixed IP Can choose a range of IP addresses.

Dynamic IP If not in fixed IP mode, one can choose to include packets from in either Radius or DHCP mode.

Protocol Filtering One can choose to include packets from TCP, UDP, and/or ICMP in either Full mode, Pen mode, or none.

Text Filtering One can include packets that contain arbitrary text.

Port Filtering One can select particular ports to include (i.e 25 (SMTP), 80 (HTTP), 110 (POP3)).

E-mail address Filtering

One can select to include packets that contain a particular e-mail address in the to or from fields of an e-mail.

Page 13: Carnivore PPT

Software Architecture

• Filter Precedence• Output

– .vor– .output– .error

• Analysis– Packeteer– CoolMiner

Page 14: Carnivore PPT

Software Architecture

• TapNDIS (written in C) is a kernal-mode driver which captures Ethernet packets as they are received, and applies some filtering.

• TapAPI.dll (written in C++) provides the API for accessing the TapNDIS driver functionality from other applications.

• Carnivore.dll (written in C++) provides functionality for controlling the intercept of raw data.

• Carnivore.exe (written in Visual Basic) is the GUI for Carnivore.

Page 15: Carnivore PPT

CONTROVERSIES

• Pen mode collection– Not strictly defined.– Low standard for obtaining a court order for the

interception of this information.– Reporting of pen mode interceptions is

minimal.

Page 16: Carnivore PPT

CONTROVERSIES

• Minimization of interception:– No formal definition of minimization of search

requirements.– The minimization process only has optional

judicial review.– No requirements on who conducts the

minimization.

Page 17: Carnivore PPT

CONTROVERSIES

• FISA interceptions:– No notification requirement, unless information

from the intercept will be used in a criminal trial.

– Completely confidential, the only information reported annually is the number of applications and the number of orders granted.

Page 18: Carnivore PPT

DISADVANTAGES

• Trust

• Ease of access

• Loss of ISP control

• Procedural

Page 19: Carnivore PPT

ANTIVORE

Antidote to Carnivore. Developed by Chain Mail Inc.-

software firm, Virginia,US. To secure corporate data. Used to encrypt users e-mail messages.

Page 20: Carnivore PPT

Technical Concerns

• Problems– Wrong goals– Bad implementation

• Hidden functionality

Page 21: Carnivore PPT

Technical Problems: Wrong Goals

• No structured development process

• No audit trails

• Limited security of data

Page 22: Carnivore PPT

Technical Problems: Bad Implementation

• Problems with high throughput

• Standard Ethernet v. Full Duplex

• Security of remote computer

• Thwarted by crypto

• RADIUS (analysis omitted from Illinois Report)

Page 23: Carnivore PPT

Hidden Functionality

• TapAPI provides 45 entry points callable from Carnivore.dll, only 22 are used.

• Commented out code: more sophisticated filters, real-time viewer, case tracking

Page 24: Carnivore PPT

Public Policy Proposals

• Trust

• Ease of access

• ISP control

• Public awareness

Page 25: Carnivore PPT

Technical Proposals

• Get goals right

• Open source code

• Tamper-proof the local data

• Provide secure remote configuration

• Auto-post logs to website

Page 26: Carnivore PPT

Conclusion

“If you’re talking to someone in the next bathroom stall, the government shouldn’t have to be able to listen in.”

– Robert Ellis Smith

Publisher, Privacy Journal

Page 27: Carnivore PPT

THANK YOU!!THANK YOU!!