Knowledge (XXG)

ComputerCop

Source đź“ť

555: 103:, and consists of two software components; a content scanner, and a key logger. The scanner can be run directly off the CD, and performs a scan of the system's hard drive for files containing objectionable content, and a user's web browsing history for objectionable websites. While it can scan the content of file names and documents for keywords relating to such content, it cannot scan the content of images themselves. 277:
In September 2016, the Treasury Department completed an investigation, confirming that the distributors had "altered the 2001 letter from TEOAF and made it appear to be blanket permission for all law enforcement agencies to use equitable sharing funds to purchase the software", but that it cannot be
175:
due to a number of major design flaws—particularly within its key logging system. The EFF condemned the 245 agencies that, according to public records and other materials obtained by the foundation, distributed ComputerCop, for using knowingly using public funding to purchase and distribute insecure
247:
issued a warning advising against using the key logging features of the ComputerCop software; however, District Attorney Bonnie Dumanis (who endorsed the software) still stated that "the benefits of this software in protecting children from predators and bullies online and providing parents with an
90:
due to a number of security flaws, including the storage and transmission of key logging output in a non-encrypted format. The reports resulted in varying responses from agencies who planned to, or had distributed the software, although they continued to endorse the software for its public safety
211:
software. ComputerCop head Stephen DelGiorno denied any major problems with the software, stating that their software "doesn't give sexual predators or identity thieves more access to children's computers", as it "works with the existing email and Internet access services that computer user has
263:
sheriff Mike Blakely defended the software and disputed the Electronic Frontier Foundation's actions, describing the group as a non-credible "ultra-liberal" organization that is "more interested in protecting predators and pedophiles than in protecting our children." He also argued that the
143:. Its packaging can be branded with an agency's logo, and an introductory video featuring an official from the agency can be played upon insertion of the disc—either provided by the agency itself, or filmed by ComputerCop Software. The software is purchased in 227:
funds. DelGiorno claimed that the letter, which was undated, was from 2001, but that certain elements (such as the letterhead, which was re-created) were modified for presentation purposes. The EFF attempted to request an original copy of the letter from the
232:, but the department was unable to locate it. Shortly afterward, the Treasury Department issued a fraud alert believing that the document was falsified. Promotional material for ComputerCop was also found to contain endorsements by the 155:. Its developers also touted that offering the software could help provide an agency with "positive media attention", and that it was also an "election and fundraising tool". The software is not marketed directly to consumers, although 274:, Blakely stated that proper use of the software was "something we whole-heartedly endorse", but that "if you're of the persuasion of the people of the EFF who would rather not do anything, then that's something that I can't help." 110:
services; when installed on the computer, it scans and logs keyboard input by the computer's user, searching for and logging the use of strings related to objectionable content and user-specified keywords. It can also provide
202:
and other sensitive information. It was also found that an insecure connection was used to transmit the log data to a third-party server to generate e-mail notifications; log data could easily be intercepted over a public
191:, along with an inability to distinguish between application data files and user files, or scan the contents of image files themselves. More significantly, the key logger was criticized for storing logged data in non- 34:-based company ComputerCop Software. The software offers the ability for users to scan content on a computer (such as files, images, video, and web browser history) for objectionable content, along with a 376: 219:
The EFF also noted several questionable claims made by ComputerCop's distributors in promotional material; the company had distributed a letter by Raymond M. Dineen, former director of the
240:. The ACLU denied that it had endorsed the software, while the NCME stated that in 1998, it gave permission for ComputerCop to include its endorsement, but only for a year. 237: 220: 248:
effective oversight tool outweigh the limited security concerns about the product, which can be fixed." Steve Moawad, the Senior Deputy District Attorney of
431: 492: 384: 518: 229: 354: 460: 312: 223:, which endorsed the software as a "valid crime protection tool", and specified that purchase of the software was an acceptable use of 56:). It initially only contained scanning software; later versions dropped Dietl's endorsement and branding, but also added a keylogger. 38:
component that allows parents to be notified if certain words are being typed. Upon its original release, the software was endorsed by
244: 575: 301: 296: 249: 265: 259:
After having announced the purchase and distribution of 5,000 copies of ComputerCop only a few days prior to the EFF report,
233: 168: 79: 106:
The software comes with a second component known as "KeyAlert", which is designed to monitor the use of websites and
406: 355:"ComputerCOP: The Dubious 'Internet Safety Software' That Hundreds of Police Agencies Have Distributed to Families" 179:
The EFF did not consider the scanning portion of the software to be adequately effective due to a large number of
260: 87: 580: 64: 27: 115:
notifications whenever such activity is detected. Logged data is stored on the computer's hard drive; on the
306: 71:
in bulk with custom branding and endorsements, and then distributed to the public at no charge as a form of
252:, similarly noted that the EFF had "overstat the risk" of ComputerCop, and that there had not yet been any 279: 188: 140: 519:"Treasury Department Concludes Fraud Investigation into ComputerCOP "Internet Safety" Software" 291: 224: 184: 136: 116: 68: 31: 585: 147:
by the agency, who can then distribute the software for free to members of the public as an
560: 439: 208: 192: 152: 144: 60: 554: 253: 213: 180: 83: 569: 377:"ComputerCOP: internet safety software distributed by police turns out to be spyware" 204: 156: 52: 78:
The software gained infamy in October 2014 following the release of a report by the
470: 270: 107: 35: 195: 120: 465: 432:"Free 'ComputerCOP' software put personal data at risk, digital group says" 493:"Alabama Sheriff says ComputerCOP keylogger could have stopped Columbine" 199: 148: 72: 43: 172: 461:"Limestone Sheriff clashes with activist group over computer program" 112: 100: 63:, is not generally sold to the public, but is sold directly to local 264:
technology provided by ComputerCop could have helped prevent the
124: 39: 171:
released a report considering the ComputerCop software to be
548: 212:
already engaged", but noted that they would update their
216:
to indicate that they did not store user information.
59:
The software, which is intended to promote children's
127:version does encrypt logging data with a password. 349: 268:. In further statements to the technology website 238:National Center for Missing and Exploited Children 347: 345: 343: 341: 339: 337: 335: 333: 331: 329: 135:The ComputerCop software is marketed directly to 183:, a lack of support for web browsers other than 561:How to remove ComputerCOP from Windows and Mac 357:. Electronic Frontier Foundation. October 2014 221:Treasury Executive Office for Asset Forfeiture 176:surveillance software to the general public. 8: 245:San Diego County District Attorney's Office 553: 86:group, which alleged that ComputerCop was 50:(in reference to his autobiographal film 325: 139:and law enforcement agencies as a semi- 256:cases in connection to the software. 119:version, it is stored as unencrypted 7: 407:"DA warns about software she pushed" 198:on the user's hard drive, including 313:State of Connecticut v. Julie Amero 14: 48:Bo Dietl's One Tough Computer Cop 302:Comparison of antivirus software 297:List of content-control software 99:ComputerCop is distributed on a 46:, and was originally branded as 250:Contra Costa County, California 523:Electronic Frontier Foundation 266:Columbine High School massacre 234:American Civil Liberties Union 169:Electronic Frontier Foundation 159:copies exist for sale online. 80:Electronic Frontier Foundation 1: 243:Following these reports, the 602: 576:Content-control software 167:On October 1, 2014, the 151:campaign for children's 65:law enforcement agencies 28:content control software 16:Content control software 307:Comparison of firewalls 280:statute of limitations 230:Treasury Department 141:white-label product 436:Contra Costa Times 278:prosecuted due to 137:district attorneys 69:police departments 387:on 3 October 2014 292:Internet security 225:equitable sharing 185:Internet Explorer 32:Bohemia, New York 30:developed by the 593: 557: 552: 551: 549:Official website 534: 533: 531: 530: 515: 509: 508: 506: 504: 499:. 4 October 2014 489: 483: 482: 480: 478: 473:. 1 October 2014 457: 451: 450: 448: 446: 428: 422: 421: 419: 417: 403: 397: 396: 394: 392: 383:. Archived from 373: 367: 366: 364: 362: 351: 261:Limestone County 88:privacy-invasive 601: 600: 596: 595: 594: 592: 591: 590: 581:Internet safety 566: 565: 547: 546: 543: 538: 537: 528: 526: 517: 516: 512: 502: 500: 491: 490: 486: 476: 474: 459: 458: 454: 444: 442: 440:MediaNews Group 430: 429: 425: 415: 413: 405: 404: 400: 390: 388: 375: 374: 370: 360: 358: 353: 352: 327: 322: 288: 209:packet analyzer 181:false positives 165: 153:internet safety 133: 97: 82:, a non-profit 61:internet safety 17: 12: 11: 5: 599: 597: 589: 588: 583: 578: 568: 567: 564: 563: 558: 542: 541:External links 539: 536: 535: 510: 484: 452: 423: 398: 368: 324: 323: 321: 318: 317: 316: 309: 304: 299: 294: 287: 284: 254:identity theft 214:privacy policy 164: 161: 132: 129: 96: 93: 84:digital rights 15: 13: 10: 9: 6: 4: 3: 2: 598: 587: 584: 582: 579: 577: 574: 573: 571: 562: 559: 556: 550: 545: 544: 540: 524: 520: 514: 511: 498: 494: 488: 485: 472: 468: 467: 462: 456: 453: 441: 437: 433: 427: 424: 412: 411:U-T San Diego 408: 402: 399: 386: 382: 378: 372: 369: 356: 350: 348: 346: 344: 342: 340: 338: 336: 334: 332: 330: 326: 319: 315: 314: 310: 308: 305: 303: 300: 298: 295: 293: 290: 289: 285: 283: 281: 275: 273: 272: 267: 262: 257: 255: 251: 246: 241: 239: 235: 231: 226: 222: 217: 215: 210: 206: 205:Wi-Fi hotspot 201: 197: 194: 190: 186: 182: 177: 174: 170: 162: 160: 158: 154: 150: 146: 142: 138: 130: 128: 126: 122: 118: 114: 109: 104: 102: 94: 92: 89: 85: 81: 76: 74: 70: 66: 62: 57: 55: 54: 53:One Tough Cop 49: 45: 41: 37: 33: 29: 25: 21: 527:. Retrieved 525:. 2017-11-21 522: 513: 501:. Retrieved 497:Ars Technica 496: 487: 475:. Retrieved 471:Raycom Media 464: 455: 443:. Retrieved 435: 426: 414:. Retrieved 410: 401: 389:. Retrieved 385:the original 380: 371: 359:. Retrieved 311: 276: 271:Ars Technica 269: 258: 242: 218: 178: 166: 134: 131:Distribution 105: 98: 77: 58: 51: 47: 23: 19: 18: 108:online chat 36:key logging 24:ComputerCOP 20:ComputerCop 570:Categories 529:2017-11-27 320:References 196:plain text 121:plain text 91:benefits. 42:detective 22:(stylized 503:6 October 477:2 October 445:6 October 416:2 October 391:2 October 361:2 October 200:passwords 193:encrypted 163:Reception 95:Operation 466:WAFF.com 381:Geek.com 286:See also 236:and the 149:outreach 73:outreach 44:Bo Dietl 586:Spyware 173:spyware 157:surplus 117:Windows 207:using 189:Safari 123:. The 113:e-mail 101:CD-ROM 26:) is 505:2014 479:2014 447:2014 418:2014 393:2014 363:2014 187:and 145:bulk 125:OS X 67:and 40:NYPD 572:: 521:. 495:. 469:. 463:. 438:. 434:. 409:. 379:. 328:^ 282:. 75:. 532:. 507:. 481:. 449:. 420:. 395:. 365:.

Index

content control software
Bohemia, New York
key logging
NYPD
Bo Dietl
One Tough Cop
internet safety
law enforcement agencies
police departments
outreach
Electronic Frontier Foundation
digital rights
privacy-invasive
CD-ROM
online chat
e-mail
Windows
plain text
OS X
district attorneys
white-label product
bulk
outreach
internet safety
surplus
Electronic Frontier Foundation
spyware
false positives
Internet Explorer
Safari

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑