Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Norton Internet Security
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===FBI cooperation=== Symantec, in compliance with the [[Federal Bureau of Investigation]] (FBI), whitelisted [[Magic Lantern (spyware)|Magic Lantern]], an FBI [[Keystroke logging|keylogger]]. The purpose of Magic Lantern was to obtain passwords to encrypted e-mail as part of a criminal investigation. Magic Lantern was first reported on November 20, 2001.<ref>Ted Bridis. "FBI Develops Eavesdropping Tools," ''[[Washington Post]]'', November 22, 2001.</ref> Magic Lantern was deployed as an [[e-mail attachment]]. When the attachment was opened, a [[trojan horse (computing)|trojan horse]] was installed on the suspect's computer. The Trojan horse was activated when the suspect used [[Pretty Good Privacy|PGP]] encryption, often used to increase the security of sent e-mail messages. When activated, the trojan horse logged the PGP password, which allowed the FBI to decrypt user communications.<ref>{{cite web|url=http://usgovinfo.about.com/library/weekly/aa121401a.htm |title=FBI Has a Magic Lantern |publisher=Usgovinfo.about.com |access-date=2009-02-23}}</ref> Symantec and other major antivirus vendors whitelisted Magic Lantern. Concerns included uncertainties about Magic Lantern's full potential and whether hackers could subvert it for purposes outside the law.<ref>{{cite web|url=http://utopia.csis.pace.edu/dps/2007/jkile/2005%20-%20Spring/DCS823/Spyware/01016895.pdf |title=Invasive Software: Who's Inside Your Computer? |access-date=2009-03-12 |author=George Lawton |date=July 2002 |url-status=dead |archive-url=https://web.archive.org/web/20110720024630/http://utopia.csis.pace.edu/dps/2007/jkile/2005%20-%20Spring/DCS823/Spyware/01016895.pdf |archive-date=2011-07-20 }}</ref> Graham Cluley, a technology consultant from [[Sophos]], said, "We have no way of knowing if it was written by the FBI, and even if we did, we wouldn't know whether it was being used by the FBI or if it had been commandeered by a third party".<ref>{{cite web|last=Jackson |first=William |url=http://www.gcn.com/online/vol1_no1/17572-1.html |archive-url=https://archive.today/20120910214651/http://www.gcn.com/online/vol1_no1/17572-1.html |url-status=dead |archive-date=2012-09-10 |title=Antivirus vendors are wary of FBI's Magic Lantern |publisher=1105 Media, Inc. |date=2001-12-06 |access-date=2009-02-23 }}</ref> Another reaction came from Marc Maiffret, [[chief technical officer]] and cofounder of eEye Digital Security, "Our customers are paying us for a service, to protect them from all forms of malicious code. It is not up to us to do law enforcement's job for them so we do not, and will not, make any exceptions for law enforcement malware or other tools."<ref>{{cite web|last=McCullagh |first=Declan |author2=Broache, Anne | title=Will security firms detect police spyware? | url=http://news.cnet.com/2100-7348-6197020.html?tag=tb | publisher=CNET| date= July 17, 2007 | access-date=2009-03-27}}</ref> FBI spokesman Paul Bresson, in response to the question of whether Magic Lantern needed a court order to be deployed, said, "Like all technology projects or tools deployed by the FBI it would be used pursuant to the appropriate legal process."<ref>{{cite web|url=http://www.si.umich.edu/~rfrost/courses/SI110/readings/Privacy/Magic_Lantern.pdf |title=FBI Confirms 'Magic Lantern' Project Exists |access-date=2009-03-12 |author=Elinor Mills Abreu |publisher=At Home Corporation |date=December 31, 2001 |url-status=dead |archive-url=https://web.archive.org/web/20110720091820/http://rfrost.people.si.umich.edu/courses/SI110/readings/Privacy/Magic_Lantern.pdf |archive-date=July 20, 2011 }}</ref><ref>{{cite web|last=Woo |first=Christopher |author2=So, Miranda |title=The case for magic lantern: september 11 highlights the need for increased surveillance |url=http://jolt.law.harvard.edu/articles/pdf/v15/15HarvJLTech521.pdf |year=2002 |publisher=Harvard Journal of Law & Technology |access-date=2009-06-12}}</ref> Proponents of Magic Lantern argue the technology would allow law enforcement to efficiently and quickly decrypt messages protected by encryption schemes. Unlike a predecessor, [[Carnivore (software)|Carnivore]], implementing Magic Lantern does not require physical access to a suspect's computer, which would necessitate a court order.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)