Knowledge (XXG)

Computer and Internet Protocol Address Verifier

Source 📝

356: 100:
Once that initial inventory is conducted, the CIPAV slips into the background and silently monitors all outbound communication, logging every IP address to which the computer connects, and time and date stamping each.
401: 263: 647: 612: 880: 533: 371: 391: 642: 515: 264:
https://web.archive.org/web/20090422204155/http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9131778&source=NLT_AM
109: 935: 624: 505: 116: 618: 561: 423: 406: 386: 498: 381: 205: 727: 692: 538: 525: 895: 70:, whereas it is unknown to the operator that the software has been installed and is monitoring and reporting on their activities. 488: 634: 309: 158: 59: 30: 104:
The CIPAV made headlines in July, 2007, when its use was exposed in open court during an investigation of a teen who had made
737: 493: 300: 901: 757: 697: 480: 428: 762: 722: 418: 335: 786: 273: 742: 702: 510: 445: 340: 173: 601: 317: 153: 268: 864: 712: 677: 396: 330: 325: 94: 806: 707: 687: 566: 458: 148: 916: 345: 945: 940: 791: 717: 747: 596: 463: 133: 128: 752: 732: 413: 37: 435: 258: 848: 818: 293: 231: 209: 950: 86: 82: 828: 545: 929: 885: 796: 652: 168: 890: 843: 838: 823: 586: 286: 63: 278: 274:
http://www.infosecurity-magazine.com/view/33825/did-the-fbi-use-cipav-against-tor/
223: 833: 813: 591: 453: 178: 105: 90: 78: 770: 682: 470: 163: 74: 25: 269:
https://www.eff.org/deeplinks/2011/04/new-fbi-documents-show-depth-government
235: 801: 143: 62:(FBI) uses to track and gather location data on suspects under electronic 89:
and installed application registration and version information, default
66:. The software operates on the target computer much like other forms of 138: 67: 42: 672: 402:
Child Abduction and Serial Murder Investigative Resources Center
282: 259:
http://blog.wired.com/27bstroke6/2009/04/fbi-spyware-pro.html
206:"FBI's Secret Spyware Tracks Down Teen Who Made Bomb Threats" 73:
The CIPAV captures location-related information, such as:
224:"FBI's Sought Approval for Custom Spyware in FISA Court" 613:
Integrated Automated Fingerprint Identification System
200: 198: 196: 194: 119:
to use CIPAV in terrorism or spying investigations.
911: 873: 857: 779: 661: 633: 579: 554: 524: 479: 444: 370: 363: 316: 36: 24: 392:National Center for the Analysis of Violent Crime 608:Computer and Internet Protocol Address Verifier 52:Computer and Internet Protocol Address Verifier 20:Computer and Internet Protocol Address Verifier 534:Criminal Justice Information Services Division 294: 8: 208:. Wired Magazine. 2007-07-18. Archived from 19: 367: 301: 287: 279: 18: 625:National Incident-Based Reporting System 516:Weapons of Mass Destruction Directorate 506:High-Value Detainee Interrogation Group 190: 117:Foreign Intelligence Surveillance Court 619:Law Enforcement National Data Exchange 115:The FBI also sought approval from the 16:Data gathering tool created by the FBI 407:Violent Criminal Apprehension Program 7: 58:) is a data gathering tool that the 499:Communications Exploitation Section 728:FBI Victims Identification Project 693:Rod Blagojevich corruption charges 14: 562:Information and Technology Branch 539:National Crime Information Center 424:Special Weapons and Tactics Teams 387:Critical Incident Response Group 354: 936:Federal Bureau of Investigation 382:Criminal Investigative Division 310:Federal Bureau of Investigation 159:Network Investigative Technique 60:Federal Bureau of Investigation 31:Federal Bureau of Investigation 738:High-Value Interrogation Group 1: 526:Science and Technology Branch 902:FBI Law Enforcement Bulletin 896:FBI–Apple encryption dispute 758:Special Intelligence Service 698:FBI files on Michael Jackson 489:Counterintelligence Division 723:FBI Special Advisor Program 967: 743:Joint Terrorism Task Force 703:FBI files on Elvis Presley 511:Terrorist Screening Center 372:Criminal, Cyber, Response, 174:Tailored Access Operations 764:U.S. v. Scheinberg et al. 602:Combined DNA Index System 494:Counterterrorism Division 352: 154:MiniPanzer and MegaPanzer 713:FBI search of Mar-a-Lago 481:National Security Branch 429:Hazardous Devices School 397:Behavioral Analysis Unit 149:Magic Lantern (software) 688:FBI method of profiling 459:Behavioral Science Unit 419:Crisis Negotiation Unit 881:FBI portrayal in media 446:Human Resources Branch 110:Timberline High School 792:Delf A. 'Jelly' Bryce 718:FBI Silvermaster File 112:in Washington State. 787:Harry "Skip" Brandon 748:Lindbergh kidnapping 134:Carnivore (software) 129:Backdoor (computing) 85:, running programs, 753:Ruby Ridge standoff 678:Bridgman Convention 567:Intelligence Branch 546:Laboratory Division 414:Hostage Rescue Team 374:and Services Branch 93:, and last visited 21: 708:FBI Miami shootout 26:Original author(s) 923: 922: 849:Joseph D. Pistone 819:Joseph L. Gormley 575: 574: 48: 47: 958: 865:FBI Headquarters 464:National Academy 368: 358: 357: 303: 296: 289: 280: 246: 245: 243: 242: 220: 214: 213: 212:on May 16, 2008. 202: 87:operating system 22: 966: 965: 961: 960: 959: 957: 956: 955: 926: 925: 924: 919: 907: 869: 853: 829:J. Edgar Hoover 775: 666: 664: 657: 648:Deputy Director 629: 571: 550: 520: 475: 440: 373: 359: 355: 350: 312: 307: 255: 250: 249: 240: 238: 222: 221: 217: 204: 203: 192: 187: 125: 17: 12: 11: 5: 964: 962: 954: 953: 948: 943: 938: 928: 927: 921: 920: 915: 913: 909: 908: 906: 905: 898: 893: 888: 883: 877: 875: 871: 870: 868: 867: 861: 859: 855: 854: 852: 851: 846: 841: 836: 831: 826: 821: 816: 811: 810: 809: 799: 794: 789: 783: 781: 777: 776: 774: 773: 768: 760: 755: 750: 745: 740: 735: 730: 725: 720: 715: 710: 705: 700: 695: 690: 685: 680: 675: 669: 667: 662: 659: 658: 656: 655: 650: 645: 639: 637: 631: 630: 628: 627: 622: 616: 610: 605: 599: 594: 589: 583: 581: 577: 576: 573: 572: 570: 569: 564: 558: 556: 555:Other branches 552: 551: 549: 548: 543: 542: 541: 530: 528: 522: 521: 519: 518: 513: 508: 503: 502: 501: 491: 485: 483: 477: 476: 474: 473: 468: 467: 466: 461: 450: 448: 442: 441: 439: 438: 436:Cyber Division 433: 432: 431: 426: 421: 416: 411: 410: 409: 404: 399: 384: 378: 376: 365: 361: 360: 353: 351: 349: 348: 343: 338: 333: 328: 322: 320: 314: 313: 308: 306: 305: 298: 291: 283: 277: 276: 271: 266: 261: 254: 253:External links 251: 248: 247: 215: 189: 188: 186: 183: 182: 181: 176: 171: 166: 161: 156: 151: 146: 141: 136: 131: 124: 121: 46: 45: 40: 34: 33: 28: 15: 13: 10: 9: 6: 4: 3: 2: 963: 952: 949: 947: 944: 942: 939: 937: 934: 933: 931: 918: 917:Hogan's Alley 914: 910: 904: 903: 899: 897: 894: 892: 889: 887: 884: 882: 879: 878: 876: 872: 866: 863: 862: 860: 856: 850: 847: 845: 842: 840: 837: 835: 832: 830: 827: 825: 822: 820: 817: 815: 812: 808: 807:"Deep Throat" 805: 804: 803: 800: 798: 797:Sibel Edmonds 795: 793: 790: 788: 785: 784: 782: 778: 772: 769: 767: 765: 761: 759: 756: 754: 751: 749: 746: 744: 741: 739: 736: 734: 731: 729: 726: 724: 721: 719: 716: 714: 711: 709: 706: 704: 701: 699: 696: 694: 691: 689: 686: 684: 681: 679: 676: 674: 671: 670: 668: 660: 654: 653:Special agent 651: 649: 646: 644: 641: 640: 638: 636: 632: 626: 623: 620: 617: 614: 611: 609: 606: 603: 600: 598: 595: 593: 590: 588: 585: 584: 582: 578: 568: 565: 563: 560: 559: 557: 553: 547: 544: 540: 537: 536: 535: 532: 531: 529: 527: 523: 517: 514: 512: 509: 507: 504: 500: 497: 496: 495: 492: 490: 487: 486: 484: 482: 478: 472: 469: 465: 462: 460: 457: 456: 455: 452: 451: 449: 447: 443: 437: 434: 430: 427: 425: 422: 420: 417: 415: 412: 408: 405: 403: 400: 398: 395: 394: 393: 390: 389: 388: 385: 383: 380: 379: 377: 375: 369: 366: 362: 347: 344: 342: 339: 337: 334: 332: 329: 327: 324: 323: 321: 319: 318:Field offices 315: 311: 304: 299: 297: 292: 290: 285: 284: 281: 275: 272: 270: 267: 265: 262: 260: 257: 256: 252: 237: 233: 229: 225: 219: 216: 211: 207: 201: 199: 197: 195: 191: 184: 180: 177: 175: 172: 170: 169:R2D2 (trojan) 167: 165: 162: 160: 157: 155: 152: 150: 147: 145: 142: 140: 137: 135: 132: 130: 127: 126: 122: 120: 118: 113: 111: 107: 102: 98: 96: 92: 88: 84: 80: 76: 71: 69: 65: 61: 57: 53: 44: 41: 39: 35: 32: 29: 27: 23: 946:Surveillance 941:Computer law 900: 891:Junior G-Men 844:Clyde Tolson 839:Peter Strzok 824:Wesley Grapp 766:(10 Cr. 336) 763: 607: 364:Organization 239:. Retrieved 227: 218: 210:the original 114: 106:bomb threats 103: 99: 72: 64:surveillance 55: 51: 49: 834:David Icove 814:Helen Gandy 663:Methods and 592:Bureaupedia 179:Wiretapping 91:web browser 79:MAC address 930:Categories 771:Waco siege 683:COINTELPRO 665:activities 580:Technology 471:FBI Police 336:Cincinnati 241:2020-10-26 185:References 164:Policeware 75:IP address 858:Buildings 802:Mark Felt 597:Carnivore 341:Cleveland 236:1059-1028 144:FinFisher 733:Guardian 643:Director 123:See also 108:against 951:Spyware 874:Related 621:(N-DEx) 615:(IAFIS) 604:(CODIS) 454:Academy 331:Buffalo 326:Atlanta 139:ECHELON 81:, open 68:spyware 43:Spyware 780:People 673:Abscam 587:Airtel 234:  912:Other 886:G-Man 635:Ranks 346:Tampa 228:Wired 83:ports 56:CIPAV 232:ISSN 50:The 38:Type 95:URL 932:: 230:. 226:. 193:^ 97:. 77:, 302:e 295:t 288:v 244:. 54:(

Index

Original author(s)
Federal Bureau of Investigation
Type
Spyware
Federal Bureau of Investigation
surveillance
spyware
IP address
MAC address
ports
operating system
web browser
URL
bomb threats
Timberline High School
Foreign Intelligence Surveillance Court
Backdoor (computing)
Carnivore (software)
ECHELON
FinFisher
Magic Lantern (software)
MiniPanzer and MegaPanzer
Network Investigative Technique
Policeware
R2D2 (trojan)
Tailored Access Operations
Wiretapping


Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.