Please use this identifier to cite or link to this item:
|Title:||Going for the throat: Carnivore in an Echelon World - Part II||Contributor(s):||Nabbali, Talitha (author); Perry, Mark (author)||Publication Date:||2004||Early Online Version:||2004-03-08||DOI:||10.1016/S0267-3649(04)00018-4||Handle Link:||https://hdl.handle.net/1959.11/27285||Abstract:||Carnivore is a surveillance technology, a software program housed in a computer unit, which is installed by properly authorized FBI agents on a particular Internet Service Provider's (ISP) network. The Carnivore software system is used together with a tap on the ISP's network to “intercept, filter, seize and decipher digital communications on the Internet”. The system is described as a “specialized network analyzer” that works by “sniffing” a network and copying and storing a warranted subset of its traffic. In the FBI's own words “Carnivore chews on all data on the network, but it only actually eats the information authorized by a court order”. This article, in two parts, provides an overview of the FBI's Carnivore electronic surveillance system.||Publication Type:||Journal Article||Source of Publication:||Computer Law & Security Review, 20(2), p. 84-97||Publisher:||Elsevier Advanced Technology||Place of Publication:||United Kingdom||ISSN:||2212-473X
|Field of Research (FOR):||180122 Legal Theory, Jurisprudence and Legal Interpretation||Socio-Economic Outcome Codes:||949999 Law, Politics and Community Services not elsewhere classified||Peer Reviewed:||Yes||HERDC Category Description:||C1 Refereed Article in a Scholarly Journal|
|Appears in Collections:||Journal Article|
School of Law
Files in This Item:
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.