Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

FBI's Secret Cyber-Monitor
CBS News ^ | Nov. 21, 2001 | unknown

Posted on 11/21/2001 7:04:24 PM PST by Jewels1091

The FBI is going to new lengths to eavesdrop, building software to monitor computer use and urging phone companies to help make wiretaps more reliable.

The FBI's "Magic Lantern" technology would allow investigators, via the Internet, to secretly install powerful software that records every keystroke on a person's computer, according to people familiar with the effort. The software is similar to "Trojan horse" programs already used by some hackers and corporate spies.

The FBI envisions using Magic Lantern, part of a broad FBI project called "Cyber Knight," to record the secret key a person might use to encrypt messages or computer files.

The bureau has been largely frustrated in efforts to break open such messages by trying random combinations, and officials are increasingly concerned about their inability to read encrypted messages in criminal or terrorist investigations.

The FBI said in a statement Wednesday that it cannot discuss details of its technical surveillance efforts, though it noted that "encryption can pose potentially insurmountable challenges to law enforcement when used in conjunction with communication or plans for executing serious terrorist and criminal acts."

The FBI added that its research is "always mindful of constitutional, privacy and commercial equities," and that its use of new technology can be challenged in court and in Congress.

The FBI's existing monitoring technology, called the "Key Logger System," has required investigators to sneak into a target's home or business and attach the device to a computer.

Magic Lantern could be installed over the Internet by tricking a person into opening an e-mail attachment or by exploiting the same weaknesses in popular software that allow hackers to break into computers. It's unclear whether Magic Lantern would transmit the keystrokes it records back to the FBI over the Internet or store the information to be seized later in a raid.

The existence of Magic Lantern was first disclosed by MSNBC television.

"If they are using this kind of program, it would be a highly effective way to bypass any encryption problems," said James E. Gordon, who heads the information technology practice for Pinkerton Consulting and Investigations Inc. "Once they have the keys to the kingdom, they have complete access to anything that individual is doing."

People familiar with the project, who spoke only on condition of anonymity, said the package is being developed at the FBI's electronic tools laboratory, the same outfit that built the bureau's "Carnivore" Internet surveillance technology.

The former head of the lab, Donald M. Kerr, became head of the CIA's science and technology unit in August.

Some experts said Magic Lantern raises important legal questions, such as whether the FBI would need a wiretap order from a judge to use it. The government has previously argued that the FBI can capture a person's computer keystrokes under the authority of a traditional search warrant, which involves less oversight by the courts.

"It's an open question whether the covert installation of something on a computer without a physical entry requires a search warrant," said David Sobel, a lawyer with the Washington-based Electronic Privacy Information Center, a civil liberties group.

Earlier this month the FBI urged some of the nation's largest telephone companies to change their networks so that investigators can reliably eavesdrop on conversations using new data technology.

At a conference Nov. 6 in Tucson, Arizona — and in a 32-page follow-up letter sent about two weeks ago — the FBI told leading telecommunications officials that increasing use of Internet-style data technology to transmit voice calls is frustrating FBI wiretap efforts. Although Carnivore can be used to capture electronic messages, it can't record voice messages sent over data networks for a variety of technical reasons.

The bureau's access to voice calls using traditional technology is guaranteed under the 1994 Communications Assistance to Law Enforcement Act, but it exempted "information services." The FBI said Wednesday it is not seeking to broaden the 1994 law to cover modern data technology; industry officials say the changes being sought by the FBI could take years to make.

The FBI told companies that it will need access to voice calls sent over data networks "within a few hours" in some emergency situations, and that any interference caused by a wiretap "should not be perceptible" to avoid tipping off a person that his calls might be monitored.


TOPICS: News/Current Events
KEYWORDS:
I'm not real sure that this is a good idea.
1 posted on 11/21/2001 7:04:25 PM PST by Jewels1091
[ Post Reply | Private Reply | View Replies]

To: Jewels1091
Ya ta hey!

Wol la chee na hash ched, toish’ jeh lahcha eh’ tsa e donnin ee, k’ ba ah neditinin dibeh yazzie. Ne ahs jah’ dah nes-tsa keh di glini din neh’ ih. Che chil be tah besh legai.

2 posted on 11/21/2001 7:08:15 PM PST by Fred25
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jewels1091
I think Microsoft XP has Magic Latern embedded in it...
3 posted on 11/21/2001 7:11:47 PM PST by stainlessbanner
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jewels1091
You know, its a shame some enterprising programmer doesn't come up with a way to transmit a destructive virus back to the point at which the keystrokes would be recorded.
4 posted on 11/21/2001 7:19:25 PM PST by Tench_Coxe
[ Post Reply | Private Reply | To 1 | View Replies]

To: Tench_Coxe
lol
5 posted on 11/21/2001 7:29:02 PM PST by hd5574
[ Post Reply | Private Reply | To 4 | View Replies]

To: Tench_Coxe
Maybe you've given some great mind an idea!!
6 posted on 11/21/2001 7:32:07 PM PST by Jewels1091
[ Post Reply | Private Reply | To 4 | View Replies]

To: Fred25
Ya ta hey!

Wol la chee na hash ched, toish’ jeh lahcha eh’ tsa e donnin ee, k’ ba ah neditinin dibeh yazzie. Ne ahs jah’ dah nes-tsa keh di glini din neh’ ih. Che chil be tah besh legai.

Understood.

Moo wan nah tuh tank'ah oh wa chi.

7 posted on 11/21/2001 7:53:03 PM PST by ImaGraftedBranch
[ Post Reply | Private Reply | To 2 | View Replies]

To: ImaGraftedBranch
kore wa enpitsu ja arimasen.
8 posted on 11/21/2001 7:54:10 PM PST by ImaGraftedBranch
[ Post Reply | Private Reply | To 7 | View Replies]

To: Jewels1091
On the whole, I don't care if the FBI reads my e-mail or not. But I fail to see how they can record every key-stroke on every computer in the country without rendering the entire internet as slow as mud. I sometimes wonder if bad days on the internet aren't due to some damn spy agency revving up their mainframes.
9 posted on 11/21/2001 8:04:41 PM PST by Cicero
[ Post Reply | Private Reply | To 1 | View Replies]

To: stainlessbanner
It probably does.

But how long will it take a pimple-faced in hacker in Norway to write a bit of code to identify and remove "Magic Lantern?" Not long would be my guess.

And what will be the reaction of the FBI then? Will they make it illegal to remove Magic Lantern? Will the presumption be that, in order to use a service that you pay for, you must assent to surveillance? Is that the outcome?

And if it is, how long do you suppose it will be until we all are required, by law, to run operating systems that are surveillance-friendly as opposed to secure?

10 posted on 11/21/2001 8:09:05 PM PST by Reactionary
[ Post Reply | Private Reply | To 3 | View Replies]

To: stainlessbanner
It probably does.

But how long will it take a pimple-faced in hacker in Norway to write a bit of code to identify and remove "Magic Lantern?" Not long would be my guess.

And what will be the reaction of the FBI then? Will they make it illegal to remove Magic Lantern? Will the presumption be that, in order to use a service that you pay for, you must assent to surveillance? Is that the outcome?

And if it is, how long do you suppose it will be until we all are required, by law, to run operating systems that are surveillance-friendly as opposed to secure?

11 posted on 11/21/2001 8:10:09 PM PST by Reactionary
[ Post Reply | Private Reply | To 3 | View Replies]

To: Reactionary
Let's see, it takes on average 30 years (so I've heard) for the public perception to catch up with the reality, viz a vi (sp) DARPA type technology, AREA 51, etc., such that private scientific advances are inevitably allowed to be disseminated for public use and consumption. That means the Feds are telling us, finally, what they were doing 30 years ago.

Heck I went to the local Senator's office a while back, so I could get ahold of his State office (ie they hadn't bothered to return calls) and well, "YA KNOW" I was very disappointed to hear the telltale "click, click, pause, click, pause, pause, click, pause, click, etc." that distinguishes a tapped phone line. And that's the facts Jack.

12 posted on 11/21/2001 9:18:58 PM PST by The Bolt
[ Post Reply | Private Reply | To 11 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson