<span class="articleContent">
Carnivore, the most recent example of FBI snooping software, is
reported to be able to scoop up all of targeted individuals'
Internet traffic, including e-mail. Carnivore is only one
project aimed at destroying America's privacy. In fact, the FBI
under the Clinton administration developed an entire series of
hardware and software devices intended to monitor U.S. citizens.<br><br>OLD NEWS BUT : <a href="http://www.newsmax.com/archives/articles/2001/3/5/220402.shtml">http://www.newsmax.com/archives/articles/2001/3/5/220402.shtml
</a><br><br><br>AND wiki explains it better <br><br></span><p>Assistant FBI Director <a href="http://en.wikipedia.org/w/index.php?title=Donald_Kerr&action=edit" class="new" title="Donald Kerr">Donald Kerr</a> has been quoted as saying:
</p>
<blockquote>
<p>The Carnivore device works much like commercial "sniffers" and other
network diagnostic tools used by ISPs every day, except that it
provides the FBI with a unique ability to distinguish between
communications which may be lawfully intercepted and those which may
not. For example, if a court order provides for the lawful interception
of one type of communication (e.g., e-mail), but excludes all other
communications (e.g., online shopping) the Carnivore tool can be
configured to intercept only those e-mails being transmitted either to
or from the named subject. ... [it] is a very specialized network
analyzer or "sniffer" which runs as an application program on a normal
personal computer under the Microsoft Windows operating system. It
works by "sniffing" the proper portions of network packets and copying
and storing only those packets which match a finely defined filter set
programmed in conformity with the court order. This filter set can be
extremely complex, and this provides the FBI with an ability to collect
transmissions which comply with pen register court orders, trap &
trace court orders, Title III interception orders, etc.... ...It is
important to distinguish now what is meant by "sniffing." The problem
of discriminating between users' messages on the Internet is a complex
one. However, this is exactly what Carnivore does. It does NOT search
through the contents of every message and collect those that contain
certain key words like "bomb" or "drugs." It selects messages based on
criteria expressly set out in the court order, for example, messages
transmitted to or from a particular account or to or from a particular
user.<a href="http://cryptome.org/carnivore-rf.htm" class="external text" title="http://cryptome.org/carnivore-rf.htm">cryptome.org</a></p> Source: <a href="http://en.wikipedia.org/wiki/Carnivore_(FBI)">http://en.wikipedia.org/wiki/Carnivore_(FBI)
</a><br>"""""""""""""""""""""""""""""""""<br><br>so it could be possible i assume as i remember seeing an rtp packet sniffer on this list a while back..
<br><br>as well as we do have voice recognition servers here so i guess ill try it for the heck of it.. ill ask a tech if one avail here to do a lab on that ;) darn ill ask the boss to put it as R&D for Homeland Sec ;)
<br><br>basically ill just have one of our guys read a text from a magazine and then make them use voice rec to filter and trigger on certain words. and see what comes up.<br><br><br><br><p><br></p><br><p><br></p><p><br>
</p>
</blockquote><span class="articleContent"><br><br><br></span><br><div><span class="gmail_quote">On 6/13/06, <b class="gmail_sendername">Frank</b> <<a href="mailto:bureau@inmte.com">bureau@inmte.com</a>> wrote:</span>
<blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">Refer to google carnivore project.<br><br>Basically they monitor all convos , then they archive in case of need as in
<br>Intelligence gathering . Like who did that guy call in last 60 days.<br>They can do voice comparisons on the tapes and find approx matches then<br>manually discard false positives.<br><br>They can also do realtime switching as in say a specific word or more and
<br>then it gets filtered by a machine to a level 2 system that also filters..<br><br><br>Carnivore project sends 1 call ever million to a nsa agent.<br>Meaning 1 out of a 1000 gets sent to the agency realtime.<br>1 out of that 1000 is live monitored.
<br><br>Consider it like a 'I got a bo...b' phrase in an airport.<br><br>They trigger on specs and then the software does the rest.<br><br>That does need affiliation with major players but carnivore is unix based<br>and acts like comview in a way that it sniffs the packets on the lan
<br><br>The guy that worked with fbi ,nsa on this is the guy that works on the<br>recognition paterns ( I think it was dragon dictate) or similar products.<br><br><br><br>-----Original Message-----<br>From: <a href="mailto:asterisk-biz-bounces@lists.digium.com">
asterisk-biz-bounces@lists.digium.com</a><br>[mailto:<a href="mailto:asterisk-biz-bounces@lists.digium.com">asterisk-biz-bounces@lists.digium.com</a>] On Behalf Of trixter aka Bret<br>McDanel<br>Sent: Tuesday, June 13, 2006 9:47 AM
<br>To: Commercial and Business-Oriented Asterisk Discussion<br>Subject: Re: [asterisk-biz] FCC ruling that requires all VoIP<br>providerstomakewiretapping<br><br>On Tue, 2006-06-13 at 09:25 -0400, William Piper wrote:<br>
> Can anyone tell me what is involved in a wire tap on a VoIP line?<br>> Wouldn't the monitor command in the manager API work, or is it more<br>> involved than that?<br>><br><br>it should be automated on a per person basis. The patriot act opened it
<br>from a singular number to a person, so they have to tell you the<br>numbers, you dont have to guess but they can come to you and tell you<br>that anything 'this guy' sends you have to monitor.<br><br>The monitor command will be sufficient. I have seen CDs of FBI and DEA
<br>wiretaps that were either CD audio or mp3s, wav should be fine as well<br>(PCM format - standard MS). There isnt a legally defined standard as to<br>what format the audio needs to be in, although generally companies work
<br>with the government on this and provide it in standard formats.<br><br>The title III warrant (what is needed for a wiretap, CDR records only<br>need a subpoena however as they are business records) get renewed every<br>
30 days. They have to be presented before any calls get monitored, etc.<br><br>Now if the government was listening to everyones calls like the claims<br>go, why do they need this? Kinda makes you think they arent doing what
<br>is claimed.<br><br><br>><br>--<br>Trixter <a href="http://www.0xdecafbad.com">http://www.0xdecafbad.com</a> Bret McDanel<br>Belfast IE +44 28 9099 6461 DE +49 801 777 555 3402<br>Utrecht NL +31 306 553058 US WA +1 360 207 0479
<br>US NY +1 516 687 5200 FreeWorldDialup: 635378<br><a href="http://www.trxtel.com">http://www.trxtel.com</a> we pay you to terminate calls with us!<br><br>_______________________________________________<br>--Bandwidth and Colocation provided by
<a href="http://Easynews.com">Easynews.com</a> --<br><br>asterisk-biz mailing list<br>To UNSUBSCRIBE or update options visit:<br> <a href="http://lists.digium.com/mailman/listinfo/asterisk-biz">http://lists.digium.com/mailman/listinfo/asterisk-biz
</a><br></blockquote></div><br><br clear="all"><br>-- <br>Mike<br>Sales Manager<br><a href="http://www.theclubvoip.com">http://www.theclubvoip.com</a><br>Making it happen<br>1.888.470.7253