FBI Carnivore????

Discussion in 'Port Explorer' started by Priavate Pete C. Ports, May 26, 2003.

Thread Status:
Not open for further replies.
  1. Anyway Port Explorer (or TDS) can detect traces or clues of the FBI infamous CARNIVOREo_O If so, what would be the clues? Is it possible for CARNIWHORE (Chuckle) to spread other trojans into your system undetected? Just a thought...
  2. Jooske

    Jooske Registered Member

    Feb 12, 2002
    Netherlands, EU near the sea
    Detected, sniped out, spied on, deleted, blocked, options to communicate with and change all packets, all within the laws of the country where you reside of course.
    Of course beside TDS/WG/PE it's imperative to have the AutostartViewer and APM and the coming AutostartGuard to avoid changes in your registry (the followup for RegProt) , encryption tools .. check back on the site and forums frequently for new joys.
    And dont forget the spyware scanners!
  3. Patrice

    Patrice Registered Member

    Apr 15, 2003
    Hi Private Pete C. Ports,

    Carnivore isn't such powerful as often believed. If you are interested into the details check out these reports:


    They were able to test it thoroughly, actually very interesting reports.

    Best regards,

  4. Jason_DiamondCS

    Jason_DiamondCS Former DCS Moderator

    Nov 11, 2002
    Perth, Western Australia
    Since these sorts of filtering programs are run at your ISP there is no way to tell if such a filtering system is installed unless it actually FILTERS data out that you can test for. I would guess also that in some cases (or some laws) that the data would actually need to reach your PC for whatever your doing to be illegal (apparently the reason they have the program there), hence they wouldn't want to filter out the data, but this is just some speculation.

Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.