From owner-imap@chumbly.math.missouri.edu Sun Oct 6 10:30:12 2002
Date: Sat, 5 Oct 2002 06:10:23 -0500 (CDT)
From: Mark Graffis
<mgraffis@vitelcom.net>
Subject: Is Bugbear really Magic Lantern
?
Article: 145655
To: undisclosed-recipients:;
http://news.zdnet.co.uk/story/0,,t269-s2099692,00.html
US law enforcement agencies are reportedly developing tools to install surveillance systems—based on technology commonly used by hackers
A new tool reportedly being developed by law enforcement
agencies to remotely install surveillance programs on a suspect's
computer is little more than three-year-old hacking technology,
security experts said on Wednesday. On Tuesday, MSNBC reported that
the FBI was working on a computer virus
to install key-logging
programs and other surveillance software onto a suspect's
computer. Yet if the details of the report are correct, the technique
doesn't use a virus, but a Trojan horse, a program that acts
without the person's knowledge.
The technology has been around a bit,
said Vincent Gullotto,
director of Network Associates' antivirus emergency response
team. It seems like the FBI is just trying to see if they can come
up with different options and ways that electronic surveillance can be
done.
Calling the technology Magic Lantern,
the report
stated that the intent of such software would be to remotely install a
system that logs all keystrokes sent to a PC to obtain data and
passwords. The idea is old hat, said Fred Cohen, a security
practitioner in residence for the University of New Haven. It's
not a very clever or novel thing,
he said.
FBI representatives could not be reached for comment. Cohen has taught
law enforcement and industry security professionals many ways of
collecting digital evidence. When such evidence is encrypted, the
officer needs to work around the crypto system, not try to break the
keys with computational muscle, he said. You want to go after the
keystrokes,
he said. By capturing the keys typed by a person, then
law enforcement can learn the password used to unlock encrypted
documents. If they tried to use computational firepower instead,
cracking the code could theoretically take years, if not
centuries. For that reason, Cohen suggests that hacking tools be
used. In my class, I teach how they could use a Trojan horse to go
after the keystrokes,
he said.
Several hacking tools, the two most popular being Back Orifice and SubSeven, allow full control over a remote PC infected by the program, including keystroke logging and even recording a conversation if a microphone is connected to the PC. Both programs have been incorporated into Trojan horses and are several years old. In fact, the FBI has already used similar, if more limited, surveillance software in at least one high-profile case to obtain a secret code to unlock encrypted files on the computer of Nicodemo S. Scarfo, a suspected mobster in the Gambino crime family. In details unveiled by an affidavit in the case, the FBI installed a key-logging system on Scarfo's computer during a search of his office.
US Representative Richard Armey, a Texas Republican, sees such
techniques—and their remote installation—as a better deal for
citizens than Carnivore, the FBI's controversial email
surveillance system. The way we look at it, this may be better than
other available tools,
said Armey spokesman Richard Diamond. Where
the Carnivore system—renamed the DCS 1000—has access to an
entire data stream and could potentially spy any traffic on that
network, the so-called Magic Lantern
technology would only be
installed on a single PC. If Magic Lantern is as described, then it
is a rifle-shot attack on a suspect,
Diamond said, compared with
Carnivore's shotgun blast.
One danger is that evidence-gathering tools such as Magic Lantern are
not well defined in law. The technique could lead to unsupervised
surveillance by law enforcement, because it's unclear whether any
laws requiring oversight apply to the situation, said David Sobel,
general counsel for the Electronic Privacy Information Center, a
Washington D.C. policy think tank. This is more problematic than a
traditional wiretap, because suddenly you are removing the
communications provider from the equation,
Sobel said. A wiretap
order has to be presented to the phone company to connect to their
network and snoop an individual's line. Even the Carnivore system
requires the help of the Internet service provider to install
it. While Armey successfully added an amendment to the USA Patriot
Act—a far-reaching package of surveillance laws passed last
month—to provide oversight of the use of Carnivore by the FBI,
it would not apply to Magic Lantern, Sobel warned. We don't
know what this is capable of and whether it is being used
properly,
he said. There may be no way to stop this from being
installed on a computer.
Who's watching you? Get the latest on spy networks such as Echelon and Carnivore, as well as privacy issues for companies and individuals alike, at ZDNet UK's Surveillance News Section. Have your say instantly, and see what others have said. Click on the TalkBack button and go to the ZDNet news forum. Let the editors know what you think in the Mailroom. And read other letters.