LT   EN   RU  
2024 г. март 29 д., пятница Straipsniai.lt - Информационный портал
  
  Компьютеры > Компьютерные технологии > Хакеры
Lankomumo reitingas Версия для печати Spausdinti
Security officials to spy on chat rooms

The CIA is quietly funding federal research into surveillance of Internet chat rooms as part of an effort to identify possible terrorists, newly released documents reveal.
In April 2003, the CIA agreed to fund a series of research projects that the documents indicate were intended to create "new capabilities to combat terrorism through advanced technology." One of those projects is research at the Rensselaer Polytechnic Institute in Troy, N.Y., devoted to automated monitoring and profiling of the behavior of chat-room users.

Even though the money ostensibly comes from the National Science Foundation, CIA officials were involved in selecting recipients for the research grants, according to a contract between the two agencies obtained by the Electronic Privacy Information Center (EPIC) and reviewed by CNET News.com.

NSF program director Leland Jameson said Wednesday the two-year agreement probably will not be renewed for the 2005 fiscal year. "Probably we won't be working with the CIA anymore at all," Jameson said. "I think that people have moved on to other things."

The NSF grant for chat-room surveillance was reported earlier this year, but without disclosure of the CIA's role in the project. The NSF-CIA memorandum of understanding says that while the Sept. 11, 2001 attacks and the fight against terrorism presented U.S. spy agencies with surveillance challenges, existing spy "capabilities can be significantly enhanced with advanced technology."

EPIC director Marc Rotenberg, whose nonprofit group obtained the documents through the Freedom of Information Act, said the CIA's clandestine involvement was worrisome. "The intelligence community is changing the priorities of scientific research in the U.S.," Rotenberg said. "You have to be careful that the National Science Foundation doesn't become the National Spy Foundation."

A CIA representative would not answer questions, saying the agency's policy is never to talk about funding. The two Rensselaer Polytechnic Institute researchers involved, Bulent Yener and Mukkai Krishnamoorthy, did not respond to interview requests.

Their proposal, also disclosed under the Freedom of Information Act, received $157,673 from the CIA and NSF. It says: "We propose a system to be deployed in the background of any chat room as a silent listener for eavesdropping...The proposed system could aid the intelligence community to discover hidden communities and communication patterns in chat rooms without human intervention."

Yener and Krishnamoorthy, both associate professors of computer science, wrote that their research would involve writing a program for "silently listening" to an Internet Relay Chat (IRC) channel and "logging all the messages." One of the oldest and most popular methods for chatting online, IRC attracts hundreds of thousands of users every day. A history written by IRC creator Jarkko Oikarinen said the concept grew out of chat technology for modem-based bulletin boards in the 1980s.

The Yener and Krishnamoorthy proposal says their research will begin Jan. 1, 2005 but does not say which IRC servers will be monitored.

The Yener and Krishnamoorthy proposal says their research will begin Jan. 1, 2005 but does not say which IRC servers will be monitored.

A June 2004 paper they published, also funded by the NSF, described a project that quietly monitored users of the popular Undernet network, which has about 144,000 users and 50,000 channels. In the paper, Yener and Krishnamoorthy predicted their work "could aid (the) intelligence community to eavesdrop in chat rooms, profile chatters and identify hidden groups of chatters in a cost-effective way" and that their future research will focus on identifying "topic-based information."

Al Teich, director of science and policy programs at the American Association for the Advancement of Science, said he does not object to the CIA funding terrorism-related research in general.

"I don't know about chat-room surveillance, but doing research on issues related to terrorism is certainly legitimate," Teich said. "Whether the CIA ought to be funding research in universities in a clandestine manner is a different issue."

         

Lankomumo reitingas

Oбсудить на форуме - Oбсудить на форуме

Версия для печати - Версия для печати

Назад


Случайные теги:    Криптография (17)    Психология (27)    Фото (11)    Процессоры (7)    География (4)    Мобильная связь (5)    Поэты (3)    Наркопсихотерапия (2)    Прогр. обеспечение (15)    Шахматы (2)    Гостья из будущего (35)    Безопасность (43)    Скейборды (2)    Linux/Unix (5)    Общение (322)    Буддизм (3)    Мотоциклы (2)    Авиация (2)    Кино (45)    Анна Ахматова (3)    Саентология (10)    Мама и ребенок (19)    Кормление грудью (5)    Астрология (13)    Математика (2)    Язычество (3)    Сельское хозяйство (19)    Пиво (29)    Архитектура (3)    Открытый код (2)    Туризм (25)    Садоводство (12)    Образование (101)    Алкохольные напитки (29)    Фильмы (10)    Археология (3)    Путешествия (2)    Помощ и превенция (2)    Страны (22)    Аквариумы (10)    Медицина (84)    Египет (5)    Дельфины (4)    Наука (90)    Фэншуй (4)    Религия (32)    Люди (94)    Память (2)    Операционные системы (8)    Азербайджан (7)
1. Марокканские хакеры воюют с Израилем
2. Банкам предложена система защиты от онлайн-грабежей
3. Турецкие хакеры взломали французский сайт Microsoft
4. Шотландский университет начинает готовить дипломированных хакеров
5. Microsoft выпускает защитные программы под новым брендом
6. Венесуэлец украл телефонного трафика на 1 млн долларов
7. Швеция расследует атаку на правительственный сайт
8. Российский бэкдор распространяется через сайт американской торговой сети
9. Microsoft рекомендует использовать Word в безопасном режиме
10. В университете Огайо в течение года не замечали взлома сервера
1. Wi-Fi побеждает Ethernet в домашних сетях
2. Foundstone выпустила SiteDigger - программу для поиска уязвимостей на сайтах
3. iWork против Microsoft Office
4. Обход каталога в phpBB Attachment Mod
5. Новый хакерский инструмент: шоколадка
6. Билл Гейтс и другие коммунисты
7. Toshiba вводит в практику квантовую криптографию
8. Кто сказал, что безопасность должна оставаться несбыточной мечтой?
9. Корпорации беззащитны перед внутренними угрозами
10. P2P-пираты - полезные члены сообщества
Map