Home page logo
/

isn logo Information Security News mailing list archives

FBI Using High-Tech Gadgets
From: InfoSec News <isn () c4i org>
Date: Tue, 31 Jul 2001 02:34:12 -0500 (CDT)

http://www.washingtonpost.com/wp-srv/aponline/20010728/aponline122313_000.htm

By D. Ian Hopper
AP Technology Writer
Saturday, July 28, 2001; 12:23 p.m. EDT

WASHINGTON By bugging a keyboard or using special software, FBI agents
can remotely capture a computer user's every keystroke.

With a black box, they can intercept e-mail from miles away.

In a van parked outside, they secretly can recreate the pictures on a
computer screen from its electromagnetic energy.

The legal limits for these new investigative tools will get a test
Monday when a federal court in New Jersey examines a mob case in which
agents, without a wiretap order, recorded a suspect's computer
keystrokes.

Privacy experts are watching the case of Nicodemo S. Scarfo Jr. with
great interest because it could bring major changes to investigative
tactics in the online age.

"It's the idea of secret government surveillance technology being
installed with very little oversight or accountability," David Sobel
of the Washington-based Electronic Privacy Information Center said.
"It gets about as close to the common perception of Big Brother as
anything I could really imagine."

Armed only with a search warrant, the FBI broke into Scarfo's business
and put either a program on his computer or an electronic bug in his
keyboard officials will not say which and recorded everything typed by
the son of the jailed former boss of the Philadelphia mob.

The FBI says it needed a password in order to decrypt coded files that
allegedly contained records of illegal gambling and loan-sharking
operations.

Scarfo used the software PGP Pretty Good Privacy to encode his
records. PGP is a strong, free encryption program that can be used for
e-mail or individual files. The FBI tried to break the encryption
without the password, but failed. So agents surreptitiously bugged the
computer to capture it from Scarfo himself.

Scarfo's lawyer wants a Newark, N.J., federal court to suppress the
evidence and make the FBI say how the bug worked. The lawyer says that
because the FBI recorded everything Scarfo typed, they got private
e-mails that were not part of the investigation.

U.S. Attorney Robert J. Cleary has told the court that the
surveillance device is a "highly sensitive law enforcement search and
seizure technique" and should not be made public.

Mark Rasch, former head of the Justice Department's computer crimes
section, said that if the device transmitted the captured keystrokes
back to the police via e-mail, or emitted them through radio signals,
then it might be considered a wiretap.

"You really need to understand at what point it captured things, and
how it got it back to the government, in order to figure out what the
Fourth Amendment concerns are," Rasch said.

Authorities have to meet a much higher standard for a full wiretap,
which includes filtering out nonrelevant communications and having
stronger proof that a crime is taking place.

The government argues it only needed a search warrant for Scarfo's
computer because the captured keystrokes were not immediately being
transmitted on the phone line or on the Internet, and should not be
considered the products of a wiretap.

There are many tools the FBI can use for secretly capturing computer
information.

Earlier this year, the FBI used a keystroke bug to nab two Russians
suspected of hacking into U.S. Internet companies. The Russians have
not yet gone to trial.

In addition to the keystroke logger, technicians can sneak in a
program that will take intermittent snapshots of the monitor, or
install a hidden camera pointed at the computer.

There is even a system called TEMPEST that detects electromagnetic
emanations from a computer monitor. Agents in a van parked outside can
then reconstruct the desktop.

The FBI also has received widespread attention for a device formerly
known as Carnivore and now called DCS 1000 that can follow suspects'
Web browsing, e-mail and instant messages.

"If they can find a way to read your mail or peek in your bedroom and
find a way for a judge to authorize them to do it, they will do it,"
Rasch said.

The Supreme Court recently reined in one high-tech tactic when it
ruled police needed a warrant to use a special heat-sensing device to
discover that a man was growing marijuana in his home.

However the Scarfo case ends, Sobel said, the high-tech crime
landscape is bound to change.

"I think it has significant implications for future law enforcement
investigations," he said. "This type of investigation is the wave of
the future."

-=-

On the Net: 

PGP: http://www.pgp.com 
Federal Bureau of Investigation: http://www.fbi.gov 
Electronic Privacy Information Center: http://www.epic.org 




-
ISN is currently hosted by Attrition.org

To unsubscribe email majordomo () attrition org with 'unsubscribe isn' in the BODY
of the mail.


  By Date           By Thread  

Current thread:
  • FBI Using High-Tech Gadgets InfoSec News (Jul 31)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]