Computer and Internet Protocol Address Verifier
Original author(s) | Federal Bureau of Investigation |
---|---|
Type | Spyware |
TheComputer and Internet Protocol Address Verifier(CIPAV) is a data gathering tool that theFederal Bureau of Investigation(FBI) uses to track and gather location data on suspects under electronicsurveillance.The software operates on the target computer much like other forms ofspyware,whereas it is unknown to the operator that the software has been installed and is monitoring and reporting on their activities.[1]
The CIPAV captures location-related information, such as:IP address,MAC address,openports,running programs,operating systemand installed application registration and version information, defaultweb browser,and last visitedURL.[1]
Once that initial inventory is conducted, the CIPAV slips into the background and silently monitors all outbound communication, logging every IP address to which the computer connects, and time and date stamping each.[1]
The CIPAV made headlines in July, 2007, when its use was exposed in open court during an investigation of a teen who had madebomb threatsagainstTimberline High Schoolin Washington State.[1]
The FBI also sought approval from theForeign Intelligence Surveillance Courtto use CIPAV in terrorism or spying investigations.[2]
See also
[edit]- Backdoor (computing)
- Carnivore (software)
- ECHELON
- FinFisher
- Magic Lantern (software)
- MiniPanzer and MegaPanzer
- Network Investigative Technique
- Policeware
- R2D2 (trojan)
- Tailored Access Operations
- Wiretapping
References
[edit]- ^abcd"FBI's Secret Spyware Tracks Down Teen Who Made Bomb Threats".Wired Magazine. 2007-07-18. Archived fromthe originalon May 16, 2008.
- ^"FBI's Sought Approval for Custom Spyware in FISA Court".Wired.ISSN1059-1028.Retrieved2020-10-26.
External links
[edit]- http://blog.wired /27bstroke6/2009/04/fbi-spyware-pro.html
- https://web.archive.org/web/20090422204155/http:// computerworld /action/article.do?command=viewArticleBasic&articleId=9131778&source=NLT_AM
- https:// eff.org/deeplinks/2011/04/new-fbi-documents-show-depth-government
- http:// infosecurity-magazine /view/33825/did-the-fbi-use-cipav-against-tor/