555:
103:, and consists of two software components; a content scanner, and a key logger. The scanner can be run directly off the CD, and performs a scan of the system's hard drive for files containing objectionable content, and a user's web browsing history for objectionable websites. While it can scan the content of file names and documents for keywords relating to such content, it cannot scan the content of images themselves.
277:
In
September 2016, the Treasury Department completed an investigation, confirming that the distributors had "altered the 2001 letter from TEOAF and made it appear to be blanket permission for all law enforcement agencies to use equitable sharing funds to purchase the software", but that it cannot be
175:
due to a number of major design flaws—particularly within its key logging system. The EFF condemned the 245 agencies that, according to public records and other materials obtained by the foundation, distributed
ComputerCop, for using knowingly using public funding to purchase and distribute insecure
247:
issued a warning advising against using the key logging features of the
ComputerCop software; however, District Attorney Bonnie Dumanis (who endorsed the software) still stated that "the benefits of this software in protecting children from predators and bullies online and providing parents with an
90:
due to a number of security flaws, including the storage and transmission of key logging output in a non-encrypted format. The reports resulted in varying responses from agencies who planned to, or had distributed the software, although they continued to endorse the software for its public safety
211:
software. ComputerCop head
Stephen DelGiorno denied any major problems with the software, stating that their software "doesn't give sexual predators or identity thieves more access to children's computers", as it "works with the existing email and Internet access services that computer user has
263:
sheriff Mike
Blakely defended the software and disputed the Electronic Frontier Foundation's actions, describing the group as a non-credible "ultra-liberal" organization that is "more interested in protecting predators and pedophiles than in protecting our children." He also argued that the
143:. Its packaging can be branded with an agency's logo, and an introductory video featuring an official from the agency can be played upon insertion of the disc—either provided by the agency itself, or filmed by ComputerCop Software. The software is purchased in
227:
funds. DelGiorno claimed that the letter, which was undated, was from 2001, but that certain elements (such as the letterhead, which was re-created) were modified for presentation purposes. The EFF attempted to request an original copy of the letter from the
232:, but the department was unable to locate it. Shortly afterward, the Treasury Department issued a fraud alert believing that the document was falsified. Promotional material for ComputerCop was also found to contain endorsements by the
155:. Its developers also touted that offering the software could help provide an agency with "positive media attention", and that it was also an "election and fundraising tool". The software is not marketed directly to consumers, although
274:, Blakely stated that proper use of the software was "something we whole-heartedly endorse", but that "if you're of the persuasion of the people of the EFF who would rather not do anything, then that's something that I can't help."
110:
services; when installed on the computer, it scans and logs keyboard input by the computer's user, searching for and logging the use of strings related to objectionable content and user-specified keywords. It can also provide
202:
and other sensitive information. It was also found that an insecure connection was used to transmit the log data to a third-party server to generate e-mail notifications; log data could easily be intercepted over a public
191:, along with an inability to distinguish between application data files and user files, or scan the contents of image files themselves. More significantly, the key logger was criticized for storing logged data in non-
34:-based company ComputerCop Software. The software offers the ability for users to scan content on a computer (such as files, images, video, and web browser history) for objectionable content, along with a
376:
219:
The EFF also noted several questionable claims made by
ComputerCop's distributors in promotional material; the company had distributed a letter by Raymond M. Dineen, former director of the
240:. The ACLU denied that it had endorsed the software, while the NCME stated that in 1998, it gave permission for ComputerCop to include its endorsement, but only for a year.
237:
220:
248:
effective oversight tool outweigh the limited security concerns about the product, which can be fixed." Steve Moawad, the Senior Deputy
District Attorney of
431:
492:
384:
518:
229:
354:
460:
312:
223:, which endorsed the software as a "valid crime protection tool", and specified that purchase of the software was an acceptable use of
56:). It initially only contained scanning software; later versions dropped Dietl's endorsement and branding, but also added a keylogger.
38:
component that allows parents to be notified if certain words are being typed. Upon its original release, the software was endorsed by
244:
575:
301:
296:
249:
265:
259:
After having announced the purchase and distribution of 5,000 copies of
ComputerCop only a few days prior to the EFF report,
233:
168:
79:
106:
The software comes with a second component known as "KeyAlert", which is designed to monitor the use of websites and
406:
355:"ComputerCOP: The Dubious 'Internet Safety Software' That Hundreds of Police Agencies Have Distributed to Families"
179:
The EFF did not consider the scanning portion of the software to be adequately effective due to a large number of
260:
87:
580:
64:
27:
115:
notifications whenever such activity is detected. Logged data is stored on the computer's hard drive; on the
306:
71:
in bulk with custom branding and endorsements, and then distributed to the public at no charge as a form of
252:, similarly noted that the EFF had "overstat the risk" of ComputerCop, and that there had not yet been any
279:
188:
140:
519:"Treasury Department Concludes Fraud Investigation into ComputerCOP "Internet Safety" Software"
291:
224:
184:
136:
116:
68:
31:
585:
147:
by the agency, who can then distribute the software for free to members of the public as an
560:
439:
208:
192:
152:
144:
60:
554:
253:
213:
180:
83:
569:
377:"ComputerCOP: internet safety software distributed by police turns out to be spyware"
204:
156:
52:
78:
The software gained infamy in
October 2014 following the release of a report by the
470:
270:
107:
35:
195:
120:
465:
432:"Free 'ComputerCOP' software put personal data at risk, digital group says"
493:"Alabama Sheriff says ComputerCOP keylogger could have stopped Columbine"
199:
148:
72:
43:
172:
461:"Limestone Sheriff clashes with activist group over computer program"
112:
100:
63:, is not generally sold to the public, but is sold directly to local
264:
technology provided by
ComputerCop could have helped prevent the
124:
39:
171:
released a report considering the ComputerCop software to be
548:
212:
already engaged", but noted that they would update their
216:
to indicate that they did not store user information.
59:
The software, which is intended to promote children's
127:version does encrypt logging data with a password.
349:
268:. In further statements to the technology website
238:National Center for Missing and Exploited Children
347:
345:
343:
341:
339:
337:
335:
333:
331:
329:
135:The ComputerCop software is marketed directly to
183:, a lack of support for web browsers other than
561:How to remove ComputerCOP from Windows and Mac
357:. Electronic Frontier Foundation. October 2014
221:Treasury Executive Office for Asset Forfeiture
176:surveillance software to the general public.
8:
245:San Diego County District Attorney's Office
553:
86:group, which alleged that ComputerCop was
50:(in reference to his autobiographal film
325:
139:and law enforcement agencies as a semi-
256:cases in connection to the software.
119:version, it is stored as unencrypted
7:
407:"DA warns about software she pushed"
198:on the user's hard drive, including
313:State of Connecticut v. Julie Amero
14:
48:Bo Dietl's One Tough Computer Cop
302:Comparison of antivirus software
297:List of content-control software
99:ComputerCop is distributed on a
46:, and was originally branded as
250:Contra Costa County, California
523:Electronic Frontier Foundation
266:Columbine High School massacre
234:American Civil Liberties Union
169:Electronic Frontier Foundation
159:copies exist for sale online.
80:Electronic Frontier Foundation
1:
243:Following these reports, the
602:
576:Content-control software
167:On October 1, 2014, the
151:campaign for children's
65:law enforcement agencies
28:content control software
16:Content control software
307:Comparison of firewalls
280:statute of limitations
230:Treasury Department
141:white-label product
436:Contra Costa Times
278:prosecuted due to
137:district attorneys
69:police departments
387:on 3 October 2014
292:Internet security
225:equitable sharing
185:Internet Explorer
32:Bohemia, New York
30:developed by the
593:
557:
552:
551:
549:Official website
534:
533:
531:
530:
515:
509:
508:
506:
504:
499:. 4 October 2014
489:
483:
482:
480:
478:
473:. 1 October 2014
457:
451:
450:
448:
446:
428:
422:
421:
419:
417:
403:
397:
396:
394:
392:
383:. Archived from
373:
367:
366:
364:
362:
351:
261:Limestone County
88:privacy-invasive
601:
600:
596:
595:
594:
592:
591:
590:
581:Internet safety
566:
565:
547:
546:
543:
538:
537:
528:
526:
517:
516:
512:
502:
500:
491:
490:
486:
476:
474:
459:
458:
454:
444:
442:
440:MediaNews Group
430:
429:
425:
415:
413:
405:
404:
400:
390:
388:
375:
374:
370:
360:
358:
353:
352:
327:
322:
288:
209:packet analyzer
181:false positives
165:
153:internet safety
133:
97:
82:, a non-profit
61:internet safety
17:
12:
11:
5:
599:
597:
589:
588:
583:
578:
568:
567:
564:
563:
558:
542:
541:External links
539:
536:
535:
510:
484:
452:
423:
398:
368:
324:
323:
321:
318:
317:
316:
309:
304:
299:
294:
287:
284:
254:identity theft
214:privacy policy
164:
161:
132:
129:
96:
93:
84:digital rights
15:
13:
10:
9:
6:
4:
3:
2:
598:
587:
584:
582:
579:
577:
574:
573:
571:
562:
559:
556:
550:
545:
544:
540:
524:
520:
514:
511:
498:
494:
488:
485:
472:
468:
467:
462:
456:
453:
441:
437:
433:
427:
424:
412:
411:U-T San Diego
408:
402:
399:
386:
382:
378:
372:
369:
356:
350:
348:
346:
344:
342:
340:
338:
336:
334:
332:
330:
326:
319:
315:
314:
310:
308:
305:
303:
300:
298:
295:
293:
290:
289:
285:
283:
281:
275:
273:
272:
267:
262:
257:
255:
251:
246:
241:
239:
235:
231:
226:
222:
217:
215:
210:
206:
205:Wi-Fi hotspot
201:
197:
194:
190:
186:
182:
177:
174:
170:
162:
160:
158:
154:
150:
146:
142:
138:
130:
128:
126:
122:
118:
114:
109:
104:
102:
94:
92:
89:
85:
81:
76:
74:
70:
66:
62:
57:
55:
54:
53:One Tough Cop
49:
45:
41:
37:
33:
29:
25:
21:
527:. Retrieved
525:. 2017-11-21
522:
513:
501:. Retrieved
497:Ars Technica
496:
487:
475:. Retrieved
471:Raycom Media
464:
455:
443:. Retrieved
435:
426:
414:. Retrieved
410:
401:
389:. Retrieved
385:the original
380:
371:
359:. Retrieved
311:
276:
271:Ars Technica
269:
258:
242:
218:
178:
166:
134:
131:Distribution
105:
98:
77:
58:
51:
47:
23:
19:
18:
108:online chat
36:key logging
24:ComputerCOP
20:ComputerCop
570:Categories
529:2017-11-27
320:References
196:plain text
121:plain text
91:benefits.
42:detective
22:(stylized
503:6 October
477:2 October
445:6 October
416:2 October
391:2 October
361:2 October
200:passwords
193:encrypted
163:Reception
95:Operation
466:WAFF.com
381:Geek.com
286:See also
236:and the
149:outreach
73:outreach
44:Bo Dietl
586:Spyware
173:spyware
157:surplus
117:Windows
207:using
189:Safari
123:. The
113:e-mail
101:CD-ROM
26:) is
505:2014
479:2014
447:2014
418:2014
393:2014
363:2014
187:and
145:bulk
125:OS X
67:and
40:NYPD
572::
521:.
495:.
469:.
463:.
438:.
434:.
409:.
379:.
328:^
282:.
75:.
532:.
507:.
481:.
449:.
420:.
395:.
365:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.