Home » Carnivore is an Invasion to Privacy

Carnivore is an Invasion to Privacy

Carnivore is the FBI’s latest toy. All the time we hear about how it is an invasion to privacy, and while I do agree it does have serious problems it also has some moral dilemmas. For example who is subject to Carnivore and where is it located? How much and What kind of information is the FBI interested in getting? Lets start by looking at just what exactly Carnivore is.

Carnivore is an actual piece of hardware that the FBI connects to an internet backbone. According to Compnet. m; “For Carnivore to gain access to this much data, its hardware must be plugged directly into the network at a central location. Because most Internet based communications in the USA flow through large Internet Service Providers (ISPs), the FBI would typically install a Carnivore box inside an ISP data center. Controlled physical and network access improves the system’s overall security. ” Basically from the data center of the ISP Carnivore is able to acquire any information that it chooses to, or is assigned to.

Typically a search warrant is issued and the device set to acquire information about a subject. Any email, or other form of communications that the person being viewed is recorded for the FBI to view later. Any information is intercepted once the FBI is in they know all and see all. Which begs the question what if they are getting search warrants on anyone they choose? Who reports them? Who holds the people accountable for spying on people later found out to be innocent?

Because Carnivore is a “BLACK BOX” project a lot of information about the project is not being released to the public and if that is not scary enough for you, the people in charge of issuing the warrants and who the FBI labels and those that need to be “Watched” is also not readily available. Power corrupts and absolute power corrupts absolutely. Without an internal regulatory system for the FBI to control the use of carnivore it looks as though anyone anywhere can be tapped.

Cite This Work

To export a reference to this essay please select a referencing style below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Leave a Comment