Home  |  Articles  |  Exclusives  |  About  |  Links   |  Search  |  Contact


FBI Spyware Called CIPAV

September 25. 2008

FBI Director Robert S. Mueller

The FBI is in possession of a spyware program called CIPAV, which accesses your computer without permission, monitors and captures its contents and all your internet activity, forwarding it to the Bureau. The program was originally designed to catch criminals, but the FBI, under George Bush, has extended its use to spy on innocent Americans, under the guise of national security, much like with the Patriot Act abuses

The fact of the matter is, without proper court approval, CIPAV has been used for partisan political gain as well, to spy on and mine targets computers, which is un-constitutional and very illegal. It is clear, under Robert Mueller, a man of very questionable character, America has become a surveillance state, with the government forgetting the laws upon which the nation is based.


FBI's Sought Approval for Custom Spyware in FISA Court

Cipav The FBI sought approval to use its CIPAV spyware program from the secretive Foreign Intelligence Surveillance Court in terrorism or foreign spying cases, THREAT LEVEL has learned. Officials processing a Freedom of Information Act request from Wired.com have turned up some 3,000 pages of FBI documents about the CIPAV, according to an FBI FOIA official. They date back to at least 2005. Some 60 - 75 percent of them are internal e-mails. Others are technical documents and legal filings. FISC hearings are closed and the decisions secret.


FBI remotely installs spyware to trace bomb threat

The FBI used a novel type of remotely installed spyware last month to investigate who was e-mailing bomb threats to a high school near Olympia, Wash. Federal agents obtained a court order on June 12 to send spyware called CIPAV to a MySpace account suspected of being used by the bomb threat hoaxster. Once implanted, the software was designed to report back to the FBI with the Internet Protocol address of the suspect's computer, other information found on the PC and, notably, an ongoing log of the user's outbound connections...

There have been hints in the past that the FBI has employed this technique. In 2004, an article in the Minneapolis Star Tribune reported that the bureau had used an "Internet Protocol Address Verifier" that was sent to a suspect via e-mail...




Copyright 2007 - 2014 Aisha. All Rights Reserved. Web site design by Aisha for Sonustar Interactive

Aisha | Aisha Blog | Aisha Blog Archive | Goodison Trust | Sonustar | Sonustar News | Judiciary Report | Sound Off Column | Celluloid Film Review | Consumer News Reviews | Compendius | United Peace Initiative | Justice And Truth