Return-Path: <sentto-279987-4498-1014010102-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sun, 17 Feb 2002 21:29:09 -0800 (PST) Received: (qmail 1779 invoked by uid 510); 18 Feb 2002 05:28:31 -0000 Received: from n5.groups.yahoo.com (216.115.96.55) by all.net with SMTP; 18 Feb 2002 05:28:31 -0000 X-eGroups-Return: sentto-279987-4498-1014010102-fc=all.net@returns.groups.yahoo.com Received: from [216.115.97.166] by n5.groups.yahoo.com with NNFMP; 18 Feb 2002 05:28:22 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_2); 18 Feb 2002 05:28:21 -0000 Received: (qmail 74791 invoked from network); 18 Feb 2002 05:28:21 -0000 Received: from unknown (216.115.97.167) by m12.grp.snv.yahoo.com with QMQP; 18 Feb 2002 05:28:21 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.snv.yahoo.com with SMTP; 18 Feb 2002 05:28:20 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g1I5SNE28544 for iwar@onelist.com; Sun, 17 Feb 2002 21:28:23 -0800 Message-Id: <200202180528.g1I5SNE28544@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sun, 17 Feb 2002 21:28:22 -0800 (PST) Subject: [iwar] [fc:Software.Snags.Crooks,.Sneaking.Spouses,.but.Alarms.Privacy.Advocates] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Software Snags Crooks, Sneaking Spouses, but Alarms Privacy Advocates By Allison Linn The Associated Press Published: Feb 17, 2002 SEATTLE (AP) - Right now, your boss, your spouse or the government could secretly be reading all your typed words - even the ones you deleted - while surreptitiously snapping your picture. Sound alarming? The man who makes it possible is the first to agree. "It's horrifying!" said Richard Eaton, who develops, markets and even answers the technical help line for WinWhatWhere Corp. software. "I'm Mr. Guard-My-Privacy, so it's kind of ironic," said Eaton, a lanky 48-year-old with a diamond stud earring. "Every time I add a feature into it, usually it's something that I've fought for a long time." His qualms haven't stopped him from selling the product, though - more than 200,000 copies of it, to everyone from suspicious spouses to the FBI. And Eaton is building ever-more-detailed monitoring tricks into his Investigator software. The latest version, released this month, can snap pictures from a WebCam, save screen shots and read keystrokes in multiple languages. Investigator already can read every e-mail, instant message and document you send and receive, even if you delete - or never even saved - what you typed. The $99 downloadable program runs "hidden in plain sight." It changes names every so often, and files containing the information it gathers are given arbitrary old dates to make them difficult to find. The monitor can choose to have a user's every move sent to an e-mail address, or the program can be instructed to look for keywords like "boss," "pornography" or "terrorist" and only send records when it finds those prompts. Software like Investigator was virtually unknown two years ago. Now it's become a lucrative niche market, attracting plenty of competitors and at least one product that aims to track down the snooping software itself. Federal investigators in Seattle used Investigator to snag suspected Russian computer hackers, one of whom was recently convicted on 20 counts including conspiracy, various computer crimes and fraud. Another, similar product was used in the FBI's investigation of alleged mobster Nicodemo Scarfo Jr. A Maywood, N.J., security firm called Corporate Defense Strategies used Investigator at an import/export firm to snare two employees who were selling company merchandise and pocketing the cash. CDS President Jeff Prusan has since used it to help clients catch employees who send out resumes, download pornography or spend their shifts playing games. "It's unfortunate that it has come to this, but I've always believed that it's better to know what's going on than not," Prusan said. Miki Compson, a computer consultant and mother of four in Severn, Md., used Investigator to track computer correspondence from a suspicious person who she said ended up stalking her daughter. She's recommended it to other parents whose kids were corresponding with adults and defends the practice as a safety measure. Eaton says he wouldn't likely use it on his own two children - "I'd talk to them!" - but he also doesn't feel comfortable telling people what to do with his invention. And although he hates to hear tales of deception in the fast-growing market of spouse tracking online, he wouldn't tell people not to do it. "I'm selling a hammer," he said. "They can beat nails with it, or their dog." If someone calls with proof the software is being used nefariously, Eaton said he'll show the person how to remove it. Ari Schwartz, associate director for the Center for Democracy and Technology, said there are legitimate uses for the product, such as catching employees engaging in fraud or child pornography. But Schwartz recommends that employers inform their staffs if monitoring for certain activities is occurring. He also urges spouses and parents to think about the repercussions before using such software at home. "If your relationship is at the point where you feel that you need to spy on your spouse, is this the best way to repair your relationship or perhaps (should) you be going to therapy?" he said. In most cases, Schwartz said, snooping software is not illegal. But "we think morally there are some very large issues with (employers) tracking the personal habits of their employees." A self-taught programmer who says he barely graduated from high school, Eaton stumbled on the idea for Investigator when he wrote a tracker program to help him find and repair software bugs. He started selling it as a snooper product around 1997. Eaton still runs the company much like he did five years ago - from his home in the eastern Washington town of Kennewick. His wife handles the bookkeeping while he burns the CDs, answers the help line and runs the Web site. Occasionally, Eaton also checks his own Investigator logs - and is always disturbed by the amount of time he spends online. "When I look at my logs during the day, I think I need to fire myself," he said. ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST