OLD NEWS BUT : http://www.newsmax.com/archives/articles/2001/3/5/220402.shtml
AND wiki explains it better
Assistant FBI Director Donald Kerr has been quoted as saying:
The Carnivore device works much like commercial "sniffers" and other network diagnostic tools used by ISPs every day, except that it provides the FBI with a unique ability to distinguish between communications which may be lawfully intercepted and those which may not. For example, if a court order provides for the lawful interception of one type of communication (e.g., e-mail), but excludes all other communications (e.g., online shopping) the Carnivore tool can be configured to intercept only those e-mails being transmitted either to or from the named subject. ... [it] is a very specialized network analyzer or "sniffer" which runs as an application program on a normal personal computer under the Microsoft Windows operating system. It works by "sniffing" the proper portions of network packets and copying and storing only those packets which match a finely defined filter set programmed in conformity with the court order. This filter set can be extremely complex, and this provides the FBI with an ability to collect transmissions which comply with pen register court orders, trap & trace court orders, Title III interception orders, etc.... ...It is important to distinguish now what is meant by "sniffing." The problem of discriminating between users' messages on the Internet is a complex one. However, this is exactly what Carnivore does. It does NOT search through the contents of every message and collect those that contain certain key words like "bomb" or "drugs." It selects messages based on criteria expressly set out in the court order, for example, messages transmitted to or from a particular account or to or from a particular user.cryptome.org
Source: http://en.wikipedia.org/wiki/Carnivore_(FBI)
"""""""""""""""""""""""""""""""""
so it could be possible i assume as i remember seeing an rtp packet sniffer on this list a while back..
as well as we do have voice recognition servers here so i guess ill try it for the heck of it.. ill ask a tech if one avail here to do a lab on that ;) darn ill ask the boss to put it as R&D for Homeland Sec ;)
basically ill just have one of our guys read a text from a magazine and then make them use voice rec to filter and trigger on certain words. and see what comes up.
Refer to google carnivore project.
Basically they monitor all convos , then they archive in case of need as in
Intelligence gathering . Like who did that guy call in last 60 days.
They can do voice comparisons on the tapes and find approx matches then
manually discard false positives.
They can also do realtime switching as in say a specific word or more and
then it gets filtered by a machine to a level 2 system that also filters..
Carnivore project sends 1 call ever million to a nsa agent.
Meaning 1 out of a 1000 gets sent to the agency realtime.
1 out of that 1000 is live monitored.
Consider it like a 'I got a bo...b' phrase in an airport.
They trigger on specs and then the software does the rest.
That does need affiliation with major players but carnivore is unix based
and acts like comview in a way that it sniffs the packets on the lan
The guy that worked with fbi ,nsa on this is the guy that works on the
recognition paterns ( I think it was dragon dictate) or similar products.
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]] On Behalf Of trixter aka Bret
McDanel
Sent: Tuesday, June 13, 2006 9:47 AM
To: Commercial and Business-Oriented Asterisk Discussion
Subject: Re: [asterisk-biz] FCC ruling that requires all VoIP
providerstomakewiretapping
On Tue, 2006-06-13 at 09:25 -0400, William Piper wrote:
> Can anyone tell me what is involved in a wire tap on a VoIP line?
> Wouldn't the monitor command in the manager API work, or is it more
> involved than that?
>
it should be automated on a per person basis. The patriot act opened it
from a singular number to a person, so they have to tell you the
numbers, you dont have to guess but they can come to you and tell you
that anything 'this guy' sends you have to monitor.
The monitor command will be sufficient. I have seen CDs of FBI and DEA
wiretaps that were either CD audio or mp3s, wav should be fine as well
(PCM format - standard MS). There isnt a legally defined standard as to
what format the audio needs to be in, although generally companies work
with the government on this and provide it in standard formats.
The title III warrant (what is needed for a wiretap, CDR records only
need a subpoena however as they are business records) get renewed every
30 days. They have to be presented before any calls get monitored, etc.
Now if the government was listening to everyones calls like the claims
go, why do they need this? Kinda makes you think they arent doing what
is claimed.
>
--
Trixter http://www.0xdecafbad.com Bret McDanel
Belfast IE +44 28 9099 6461 DE +49 801 777 555 3402
Utrecht NL +31 306 553058 US WA +1 360 207 0479
US NY +1 516 687 5200 FreeWorldDialup: 635378
http://www.trxtel.com we pay you to terminate calls with us!
_______________________________________________
--Bandwidth and Colocation provided by Easynews.com --
asterisk-biz mailing list
To UNSUBSCRIBE or update options visit:
http://lists.digium.com/mailman/listinfo/asterisk-biz
--
Mike
Sales Manager
http://www.theclubvoip.com
Making it happen
1.888.470.7253
_______________________________________________ --Bandwidth and Colocation provided by Easynews.com --
asterisk-biz mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-biz
