[iwar] [fc:Software.Snags.Crooks,.Sneaking.Spouses,.but.Alarms.Privacy.Advocates]

From: Fred Cohen (fc@all.net)
Date: 2002-02-17 21:28:22


Return-Path: <sentto-279987-4498-1014010102-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sun, 17 Feb 2002 21:29:09 -0800 (PST)
Received: (qmail 1779 invoked by uid 510); 18 Feb 2002 05:28:31 -0000
Received: from n5.groups.yahoo.com (216.115.96.55) by all.net with SMTP; 18 Feb 2002 05:28:31 -0000
X-eGroups-Return: sentto-279987-4498-1014010102-fc=all.net@returns.groups.yahoo.com
Received: from [216.115.97.166] by n5.groups.yahoo.com with NNFMP; 18 Feb 2002 05:28:22 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_2); 18 Feb 2002 05:28:21 -0000
Received: (qmail 74791 invoked from network); 18 Feb 2002 05:28:21 -0000
Received: from unknown (216.115.97.167) by m12.grp.snv.yahoo.com with QMQP; 18 Feb 2002 05:28:21 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.snv.yahoo.com with SMTP; 18 Feb 2002 05:28:20 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g1I5SNE28544 for iwar@onelist.com; Sun, 17 Feb 2002 21:28:23 -0800
Message-Id: <200202180528.g1I5SNE28544@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sun, 17 Feb 2002 21:28:22 -0800 (PST)
Subject: [iwar] [fc:Software.Snags.Crooks,.Sneaking.Spouses,.but.Alarms.Privacy.Advocates]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Software Snags Crooks, Sneaking Spouses, but Alarms Privacy Advocates
By Allison Linn The Associated Press
Published: Feb 17, 2002

SEATTLE (AP) - Right now, your boss, your spouse or the government could
secretly be reading all your typed words - even the ones you deleted - while
surreptitiously snapping your picture.

Sound alarming? The man who makes it possible is the first to agree.

"It's horrifying!" said Richard Eaton, who develops, markets and even
answers the technical help line for WinWhatWhere Corp. software.

"I'm Mr. Guard-My-Privacy, so it's kind of ironic," said Eaton, a lanky
48-year-old with a diamond stud earring. "Every time I add a feature into
it, usually it's something that I've fought for a long time."

His qualms haven't stopped him from selling the product, though - more than
200,000 copies of it, to everyone from suspicious spouses to the FBI.

And Eaton is building ever-more-detailed monitoring tricks into his
Investigator software. The latest version, released this month, can snap
pictures from a WebCam, save screen shots and read keystrokes in multiple
languages. 

Investigator already can read every e-mail, instant message and document you
send and receive, even if you delete - or never even saved - what you typed.

The $99 downloadable program runs "hidden in plain sight." It changes names
every so often, and files containing the information it gathers are given
arbitrary old dates to make them difficult to find.

The monitor can choose to have a user's every move sent to an e-mail
address, or the program can be instructed to look for keywords like "boss,"
"pornography" or "terrorist" and only send records when it finds those
prompts. 

Software like Investigator was virtually unknown two years ago. Now it's
become a lucrative niche market, attracting plenty of competitors and at
least one product that aims to track down the snooping software itself.

Federal investigators in Seattle used Investigator to snag suspected Russian
computer hackers, one of whom was recently convicted on 20 counts including
conspiracy, various computer crimes and fraud.

Another, similar product was used in the FBI's investigation of alleged
mobster Nicodemo Scarfo Jr.

A Maywood, N.J., security firm called Corporate Defense Strategies used
Investigator at an import/export firm to snare two employees who were
selling company merchandise and pocketing the cash.

CDS President Jeff Prusan has since used it to help clients catch employees
who send out resumes, download pornography or spend their shifts playing
games. 

"It's unfortunate that it has come to this, but I've always believed that
it's better to know what's going on than not," Prusan said.

Miki Compson, a computer consultant and mother of four in Severn, Md., used
Investigator to track computer correspondence from a suspicious person who
she said ended up stalking her daughter.

She's recommended it to other parents whose kids were corresponding with
adults and defends the practice as a safety measure.

Eaton says he wouldn't likely use it on his own two children - "I'd talk to
them!" - but he also doesn't feel comfortable telling people what to do with
his invention. 

And although he hates to hear tales of deception in the fast-growing market
of spouse tracking online, he wouldn't tell people not to do it.

"I'm selling a hammer," he said. "They can beat nails with it, or their
dog." 

If someone calls with proof the software is being used nefariously, Eaton
said he'll show the person how to remove it.

Ari Schwartz, associate director for the Center for Democracy and
Technology, said there are legitimate uses for the product, such as catching
employees engaging in fraud or child pornography.

But Schwartz recommends that employers inform their staffs if monitoring for
certain activities is occurring. He also urges spouses and parents to think
about the repercussions before using such software at home.

"If your relationship is at the point where you feel that you need to spy on
your spouse, is this the best way to repair your relationship or perhaps
(should) you be going to therapy?" he said.

In most cases, Schwartz said, snooping software is not illegal. But "we
think morally there are some very large issues with (employers) tracking the
personal habits of their employees."

A self-taught programmer who says he barely graduated from high school,
Eaton stumbled on the idea for Investigator when he wrote a tracker program
to help him find and repair software bugs.

He started selling it as a snooper product around 1997.

Eaton still runs the company much like he did five years ago - from his home
in the eastern Washington town of Kennewick. His wife handles the
bookkeeping while he burns the CDs, answers the help line and runs the Web
site. 

Occasionally, Eaton also checks his own Investigator logs - and is always
disturbed by the amount of time he spends online.

"When I look at my logs during the day, I think I need to fire myself," he
said.

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST