356:
100:
Once that initial inventory is conducted, the CIPAV slips into the background and silently monitors all outbound communication, logging every IP address to which the computer connects, and time and date stamping each.
401:
263:
647:
612:
880:
533:
371:
391:
642:
515:
264:
https://web.archive.org/web/20090422204155/http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9131778&source=NLT_AM
109:
935:
624:
505:
116:
618:
561:
423:
406:
386:
498:
381:
205:
727:
692:
538:
525:
895:
70:, whereas it is unknown to the operator that the software has been installed and is monitoring and reporting on their activities.
488:
634:
309:
158:
59:
30:
104:
The CIPAV made headlines in July, 2007, when its use was exposed in open court during an investigation of a teen who had made
737:
493:
300:
901:
757:
697:
480:
428:
762:
722:
418:
335:
786:
273:
742:
702:
510:
445:
340:
173:
601:
317:
153:
268:
864:
712:
677:
396:
330:
325:
94:
806:
707:
687:
566:
458:
148:
916:
345:
945:
940:
791:
717:
747:
596:
463:
133:
128:
752:
732:
413:
37:
435:
258:
848:
818:
293:
231:
209:
950:
86:
82:
828:
545:
929:
885:
796:
652:
168:
890:
843:
838:
823:
586:
286:
63:
278:
274:
http://www.infosecurity-magazine.com/view/33825/did-the-fbi-use-cipav-against-tor/
223:
833:
813:
591:
453:
178:
105:
90:
78:
770:
682:
470:
163:
74:
25:
269:
https://www.eff.org/deeplinks/2011/04/new-fbi-documents-show-depth-government
235:
801:
143:
62:(FBI) uses to track and gather location data on suspects under electronic
89:
and installed application registration and version information, default
66:. The software operates on the target computer much like other forms of
138:
67:
42:
672:
402:
Child
Abduction and Serial Murder Investigative Resources Center
282:
259:
http://blog.wired.com/27bstroke6/2009/04/fbi-spyware-pro.html
206:"FBI's Secret Spyware Tracks Down Teen Who Made Bomb Threats"
73:
The CIPAV captures location-related information, such as:
224:"FBI's Sought Approval for Custom Spyware in FISA Court"
613:
Integrated
Automated Fingerprint Identification System
200:
198:
196:
194:
119:
to use CIPAV in terrorism or spying investigations.
911:
873:
857:
779:
661:
633:
579:
554:
524:
479:
444:
370:
363:
316:
36:
24:
392:National Center for the Analysis of Violent Crime
608:Computer and Internet Protocol Address Verifier
52:Computer and Internet Protocol Address Verifier
20:Computer and Internet Protocol Address Verifier
534:Criminal Justice Information Services Division
294:
8:
208:. Wired Magazine. 2007-07-18. Archived from
19:
367:
301:
287:
279:
18:
625:National Incident-Based Reporting System
516:Weapons of Mass Destruction Directorate
506:High-Value Detainee Interrogation Group
190:
117:Foreign Intelligence Surveillance Court
619:Law Enforcement National Data Exchange
115:The FBI also sought approval from the
16:Data gathering tool created by the FBI
407:Violent Criminal Apprehension Program
7:
58:) is a data gathering tool that the
499:Communications Exploitation Section
728:FBI Victims Identification Project
693:Rod Blagojevich corruption charges
14:
562:Information and Technology Branch
539:National Crime Information Center
424:Special Weapons and Tactics Teams
387:Critical Incident Response Group
354:
936:Federal Bureau of Investigation
382:Criminal Investigative Division
310:Federal Bureau of Investigation
159:Network Investigative Technique
60:Federal Bureau of Investigation
31:Federal Bureau of Investigation
738:High-Value Interrogation Group
1:
526:Science and Technology Branch
902:FBI Law Enforcement Bulletin
896:FBI–Apple encryption dispute
758:Special Intelligence Service
698:FBI files on Michael Jackson
489:Counterintelligence Division
723:FBI Special Advisor Program
967:
743:Joint Terrorism Task Force
703:FBI files on Elvis Presley
511:Terrorist Screening Center
372:Criminal, Cyber, Response,
174:Tailored Access Operations
764:U.S. v. Scheinberg et al.
602:Combined DNA Index System
494:Counterterrorism Division
352:
154:MiniPanzer and MegaPanzer
713:FBI search of Mar-a-Lago
481:National Security Branch
429:Hazardous Devices School
397:Behavioral Analysis Unit
149:Magic Lantern (software)
688:FBI method of profiling
459:Behavioral Science Unit
419:Crisis Negotiation Unit
881:FBI portrayal in media
446:Human Resources Branch
110:Timberline High School
792:Delf A. 'Jelly' Bryce
718:FBI Silvermaster File
112:in Washington State.
787:Harry "Skip" Brandon
748:Lindbergh kidnapping
134:Carnivore (software)
129:Backdoor (computing)
85:, running programs,
753:Ruby Ridge standoff
678:Bridgman Convention
567:Intelligence Branch
546:Laboratory Division
414:Hostage Rescue Team
374:and Services Branch
93:, and last visited
21:
708:FBI Miami shootout
26:Original author(s)
923:
922:
849:Joseph D. Pistone
819:Joseph L. Gormley
575:
574:
48:
47:
958:
865:FBI Headquarters
464:National Academy
368:
358:
357:
303:
296:
289:
280:
246:
245:
243:
242:
220:
214:
213:
212:on May 16, 2008.
202:
87:operating system
22:
966:
965:
961:
960:
959:
957:
956:
955:
926:
925:
924:
919:
907:
869:
853:
829:J. Edgar Hoover
775:
666:
664:
657:
648:Deputy Director
629:
571:
550:
520:
475:
440:
373:
359:
355:
350:
312:
307:
255:
250:
249:
240:
238:
222:
221:
217:
204:
203:
192:
187:
125:
17:
12:
11:
5:
964:
962:
954:
953:
948:
943:
938:
928:
927:
921:
920:
915:
913:
909:
908:
906:
905:
898:
893:
888:
883:
877:
875:
871:
870:
868:
867:
861:
859:
855:
854:
852:
851:
846:
841:
836:
831:
826:
821:
816:
811:
810:
809:
799:
794:
789:
783:
781:
777:
776:
774:
773:
768:
760:
755:
750:
745:
740:
735:
730:
725:
720:
715:
710:
705:
700:
695:
690:
685:
680:
675:
669:
667:
662:
659:
658:
656:
655:
650:
645:
639:
637:
631:
630:
628:
627:
622:
616:
610:
605:
599:
594:
589:
583:
581:
577:
576:
573:
572:
570:
569:
564:
558:
556:
555:Other branches
552:
551:
549:
548:
543:
542:
541:
530:
528:
522:
521:
519:
518:
513:
508:
503:
502:
501:
491:
485:
483:
477:
476:
474:
473:
468:
467:
466:
461:
450:
448:
442:
441:
439:
438:
436:Cyber Division
433:
432:
431:
426:
421:
416:
411:
410:
409:
404:
399:
384:
378:
376:
365:
361:
360:
353:
351:
349:
348:
343:
338:
333:
328:
322:
320:
314:
313:
308:
306:
305:
298:
291:
283:
277:
276:
271:
266:
261:
254:
253:External links
251:
248:
247:
215:
189:
188:
186:
183:
182:
181:
176:
171:
166:
161:
156:
151:
146:
141:
136:
131:
124:
121:
46:
45:
40:
34:
33:
28:
15:
13:
10:
9:
6:
4:
3:
2:
963:
952:
949:
947:
944:
942:
939:
937:
934:
933:
931:
918:
917:Hogan's Alley
914:
910:
904:
903:
899:
897:
894:
892:
889:
887:
884:
882:
879:
878:
876:
872:
866:
863:
862:
860:
856:
850:
847:
845:
842:
840:
837:
835:
832:
830:
827:
825:
822:
820:
817:
815:
812:
808:
807:"Deep Throat"
805:
804:
803:
800:
798:
797:Sibel Edmonds
795:
793:
790:
788:
785:
784:
782:
778:
772:
769:
767:
765:
761:
759:
756:
754:
751:
749:
746:
744:
741:
739:
736:
734:
731:
729:
726:
724:
721:
719:
716:
714:
711:
709:
706:
704:
701:
699:
696:
694:
691:
689:
686:
684:
681:
679:
676:
674:
671:
670:
668:
660:
654:
653:Special agent
651:
649:
646:
644:
641:
640:
638:
636:
632:
626:
623:
620:
617:
614:
611:
609:
606:
603:
600:
598:
595:
593:
590:
588:
585:
584:
582:
578:
568:
565:
563:
560:
559:
557:
553:
547:
544:
540:
537:
536:
535:
532:
531:
529:
527:
523:
517:
514:
512:
509:
507:
504:
500:
497:
496:
495:
492:
490:
487:
486:
484:
482:
478:
472:
469:
465:
462:
460:
457:
456:
455:
452:
451:
449:
447:
443:
437:
434:
430:
427:
425:
422:
420:
417:
415:
412:
408:
405:
403:
400:
398:
395:
394:
393:
390:
389:
388:
385:
383:
380:
379:
377:
375:
369:
366:
362:
347:
344:
342:
339:
337:
334:
332:
329:
327:
324:
323:
321:
319:
318:Field offices
315:
311:
304:
299:
297:
292:
290:
285:
284:
281:
275:
272:
270:
267:
265:
262:
260:
257:
256:
252:
237:
233:
229:
225:
219:
216:
211:
207:
201:
199:
197:
195:
191:
184:
180:
177:
175:
172:
170:
169:R2D2 (trojan)
167:
165:
162:
160:
157:
155:
152:
150:
147:
145:
142:
140:
137:
135:
132:
130:
127:
126:
122:
120:
118:
113:
111:
107:
102:
98:
96:
92:
88:
84:
80:
76:
71:
69:
65:
61:
57:
53:
44:
41:
39:
35:
32:
29:
27:
23:
946:Surveillance
941:Computer law
900:
891:Junior G-Men
844:Clyde Tolson
839:Peter Strzok
824:Wesley Grapp
766:(10 Cr. 336)
763:
607:
364:Organization
239:. Retrieved
227:
218:
210:the original
114:
106:bomb threats
103:
99:
72:
64:surveillance
55:
51:
49:
834:David Icove
814:Helen Gandy
663:Methods and
592:Bureaupedia
179:Wiretapping
91:web browser
79:MAC address
930:Categories
771:Waco siege
683:COINTELPRO
665:activities
580:Technology
471:FBI Police
336:Cincinnati
241:2020-10-26
185:References
164:Policeware
75:IP address
858:Buildings
802:Mark Felt
597:Carnivore
341:Cleveland
236:1059-1028
144:FinFisher
733:Guardian
643:Director
123:See also
108:against
951:Spyware
874:Related
621:(N-DEx)
615:(IAFIS)
604:(CODIS)
454:Academy
331:Buffalo
326:Atlanta
139:ECHELON
81:, open
68:spyware
43:Spyware
780:People
673:Abscam
587:Airtel
234:
912:Other
886:G-Man
635:Ranks
346:Tampa
228:Wired
83:ports
56:CIPAV
232:ISSN
50:The
38:Type
95:URL
932::
230:.
226:.
193:^
97:.
77:,
302:e
295:t
288:v
244:.
54:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.