Who Let the Carnivores Out?
Imagine this scenario. At your local post office, investigators are busily opening and glancing at the contents of every first-class letter, resulting in significant delays for postal patrons. When asked why they're doing this, the investigators affirm that they have a legally valid warrant to read the mail of an individual who's under criminal investigation. Sure, they're opening everyone's mail, but they're only reading the mail involving the investigation's target. Would you believe them?
To the extent that such an investigation would involve first-class snail mail, it would be highly illegal under U.S. law (and, indeed that of most countries)--and rightfully so. An abundance of experience worldwide proves that citizens are all but bound to suffer political persecution and loss of liberty when their governments willfully monitor the activities of law-abiding citizens (Banisar 1995). However, such monitoring isn't so clearly illegal in cyberspace, where the letters in question are conveyed via e-mail.
Alarmingly, the post office scenario accurately describes what the U.S. Federal Bureau of Investigation (FBI) could be doing with its notorious Carnivore system. This system--essentially a dedicated PC running specially designed software--is installed on the premises of Internet service providers (ISP) when investigators have obtained a legal warrant to scrutinize e-mail and other electronic communications that pass through the ISP's computers. In this article, you'll learn why Carnivore poses a far more dangerous threat to law-abiding citizens than it does to criminals, and why should you start encrypting all of your electronic communications, if you haven't already.
Carnivore (Graham 2000, FBI 2000) derives its name from its voracious appetite; it "chews" all the e-mail messages routed through an ISP to which it is connected, even though--according to the FBI--it only "eats" the mail of those who are legally targeted (by means of a warrant) for an investigation. The result slows down mail servers to the point that at least one major ISP, EarthLink, has refused to cooperate with a Carnivore installation (Hayes 2000). The broader issue, of course, is whether the system provides investigators with too much power to intercept the e-mail conversations of private, law-abiding individuals who are not the target of an investigation.
According to the FBI's critics, such conversations are already intercepted far too frequently; the American Civil Liberties Union (ACLU) charted in Congressional testimony that nearly two million innocent conversations per year are illegally intercepted by law enforcement wiretaps (ACLU 1995). Reacting to the increasing threat of terrorist activity within the U.S., judges are approving significantly more wiretaps; the total number of approved wiretaps annually grew by 38 percent from 1994 to 1998 (Willing 1998). Worldwide, government use of legal and illegal wiretapping is exploding and is often used to monitor the activities of human rights groups, labor unions and political dissenters instead of fighting crime (Banisar 1995). Despite repeated assurances to the contrary, U.S. investigative agencies are known to have used illegal wiretaps and other surveillance measures to monitor law-abiding citizens who espouse political beliefs with which the government disagrees, sometimes ruining their lives in the process.
At the core of concerns about systems such as Carnivore is that they routinely monitors a "great deal of Internet traffic", including the communications of "users who are not targeted for surveillance and not named in any court authorization" (Electronic Privacy Information Center 2000). An independent review of the Carnivore system noted it is "capable of broad sweeps", and that, improperly configured, it can "record all traffic it monitors" (Bellovin et al., 2000).
If you tend to get paranoid over such things, don't worry too much about Carnivore tracking your e-mail--at least, not yet. Carnivore isn't a massive, nationwide monitoring system; only some 20 Carnivore systems are believed to be in existence, and they are not permanently installed. According to the FBI, the longest Carnivore installation lasted 45 days. The FBI claims that the system has been used only a few dozen times to monitor terrorists, hackers and drug traffickers. But there's every reason to suspect that use of Carnivore-like systems will grow by leaps and bounds, perhaps to the point, years or decades down the road, that virtually all e-mail will be routinely scrutinized. Will basic Constitutional guarantees against reasonable search and seizure be protected?
Free DevOps eBooks, Videos, and more!
Regardless of where you are in your DevOps process, Linux Journal can help!
We offer here the DEFINITIVE DevOps for Dummies, a mobile Application Development Primer, and advice & help from the expert sources like:
- Linux Journal
- Be a Mechanic...with Android and Linux!
- New Products
- Users, Permissions and Multitenant Sites
- Flexible Access Control with Squid Proxy
- Security in Three Ds: Detect, Decide and Deny
- High-Availability Storage with HA-LVM
- Tighten Up SSH
- DevOps: Everything You Need to Know
- Solving ODEs on Linux
- Non-Linux FOSS: MenuMeters