Browse Wiki & Semantic Web

Jump to: navigation, search
Http://dbpedia.org/resource/Computer and Internet Protocol Address Verifier
  This page has no properties.
hide properties that link here 
  No properties link to this page.
 
http://dbpedia.org/resource/Computer_and_Internet_Protocol_Address_Verifier
http://dbpedia.org/ontology/abstract The Computer and Internet Protocol AddressThe Computer and Internet Protocol Address Verifier (CIPAV) is a data gathering tool that the Federal Bureau of Investigation (FBI) uses to track and gather location data on suspects under electronic surveillance. The software operates on the target computer much like other forms of spyware, whereas it is unknown to the operator that the software has been installed and is monitoring and reporting on their activities. The CIPAV captures location-related information, such as: IP address, MAC address, open ports, running programs, operating system and installed application registration and version information, default web browser, and last visited URL. Once that initial inventory is conducted, the CIPAV slips into the background and silently monitors all outbound communication, logging every IP address to which the computer connects, and time and date stamping each. The CIPAV made headlines in July, 2007, when its use was exposed in open court during an investigation of a teen who had made bomb threats against Timberline High School in Washington State. The FBI also sought approval from the Foreign Intelligence Surveillance Court to use CIPAV in terrorism or spying investigations.PAV in terrorism or spying investigations. , CIPAV (Computer and Internet Protocol AddrCIPAV (Computer and Internet Protocol Address Verifier) ist eine Windows-basierte Spionagesoftware, welche vom FBI verwendet wird, um PCs von Verdächtigen zu durchsuchen. Im Gegensatz zum sogenannten Bundestrojaner wird es vom FBI nur mit einem richterlichen Durchsuchungsbefehl eingesetzt.Nach der Installation sendet die Software Daten über Festplatteninhalte, benutzte und installierte Programme, Informationen über den Browser und Betriebssystem, sowohl Seriennummer, als auch sämtlichen Benutzerinformationen aus der Windows-Registry. Die übermittelten Aktivitäten im Internet setzen sich aus den besuchten URL und sämtlichen angesteuerten IP-Adressen zusammen.lichen angesteuerten IP-Adressen zusammen.
http://dbpedia.org/ontology/author http://dbpedia.org/resource/Federal_Bureau_of_Investigation +
http://dbpedia.org/ontology/genre http://dbpedia.org/resource/Spyware +
http://dbpedia.org/ontology/wikiPageExternalLink http://blog.wired.com/27bstroke6/2009/04/fbi-spyware-pro.html + , http://www.infosecurity-magazine.com/view/33825/did-the-fbi-use-cipav-against-tor/ + , https://web.archive.org/web/20090422204155/http:/www.computerworld.com/action/article.do%3Fcommand=viewArticleBasic&articleId=9131778&source=NLT_AM + , https://www.eff.org/deeplinks/2011/04/new-fbi-documents-show-depth-government +
http://dbpedia.org/ontology/wikiPageID 12309995
http://dbpedia.org/ontology/wikiPageLength 3847
http://dbpedia.org/ontology/wikiPageRevisionID 1113380733
http://dbpedia.org/ontology/wikiPageWikiLink http://dbpedia.org/resource/Category:Spyware + , http://dbpedia.org/resource/Backdoor_%28computing%29 + , http://dbpedia.org/resource/Category:Surveillance + , http://dbpedia.org/resource/Bomb_threat + , http://dbpedia.org/resource/FinFisher + , http://dbpedia.org/resource/Surveillance + , http://dbpedia.org/resource/Policeware + , http://dbpedia.org/resource/Federal_Bureau_of_Investigation + , http://dbpedia.org/resource/Foreign_Intelligence_Surveillance_Court + , http://dbpedia.org/resource/Tailored_Access_Operations + , http://dbpedia.org/resource/Operating_system + , http://dbpedia.org/resource/Wiretapping + , http://dbpedia.org/resource/Timberline_High_School_%28Lacey%2C_Washington%29 + , http://dbpedia.org/resource/Web_browser + , http://dbpedia.org/resource/Carnivore_%28software%29 + , http://dbpedia.org/resource/Category:Computer_law + , http://dbpedia.org/resource/Spyware + , http://dbpedia.org/resource/ECHELON + , http://dbpedia.org/resource/Network_Investigative_Technique + , http://dbpedia.org/resource/Category:Federal_Bureau_of_Investigation + , http://dbpedia.org/resource/TCP_and_UDP_port + , http://dbpedia.org/resource/MAC_address + , http://dbpedia.org/resource/Magic_Lantern_%28software%29 + , http://dbpedia.org/resource/R2D2_%28trojan%29 + , http://dbpedia.org/resource/IP_address + , http://dbpedia.org/resource/MiniPanzer_and_MegaPanzer + , http://dbpedia.org/resource/Uniform_Resource_Locator +
http://dbpedia.org/property/author http://dbpedia.org/resource/Federal_Bureau_of_Investigation +
http://dbpedia.org/property/genre http://dbpedia.org/resource/Spyware +
http://dbpedia.org/property/name Computer and Internet Protocol Address Verifier
http://dbpedia.org/property/wikiPageUsesTemplate http://dbpedia.org/resource/Template:FBI + , http://dbpedia.org/resource/Template:Short_description + , http://dbpedia.org/resource/Template:Reflist + , http://dbpedia.org/resource/Template:Infobox_Software +
http://purl.org/dc/terms/subject http://dbpedia.org/resource/Category:Computer_law + , http://dbpedia.org/resource/Category:Federal_Bureau_of_Investigation + , http://dbpedia.org/resource/Category:Spyware + , http://dbpedia.org/resource/Category:Surveillance +
http://purl.org/linguistics/gold/hypernym http://dbpedia.org/resource/Tool +
http://www.w3.org/ns/prov#wasDerivedFrom http://en.wikipedia.org/wiki/Computer_and_Internet_Protocol_Address_Verifier?oldid=1113380733&ns=0 +
http://xmlns.com/foaf/0.1/isPrimaryTopicOf http://en.wikipedia.org/wiki/Computer_and_Internet_Protocol_Address_Verifier +
http://xmlns.com/foaf/0.1/name Computer and Internet Protocol Address Verifier
owl:sameAs http://dbpedia.org/resource/Computer_and_Internet_Protocol_Address_Verifier + , http://rdf.freebase.com/ns/m.02vzw3h + , https://global.dbpedia.org/id/BYtn + , http://www.wikidata.org/entity/Q1122348 + , http://fi.dbpedia.org/resource/Computer_and_Internet_Protocol_Address_Verifier + , http://de.dbpedia.org/resource/Computer_and_Internet_Protocol_Address_Verifier +
rdf:type http://dbpedia.org/ontology/Software + , http://www.wikidata.org/entity/Q7397 + , http://umbel.org/umbel/rc/SoftwareObject + , http://dbpedia.org/ontology/Work + , http://schema.org/CreativeWork + , http://www.wikidata.org/entity/Q386724 +
rdfs:comment The Computer and Internet Protocol AddressThe Computer and Internet Protocol Address Verifier (CIPAV) is a data gathering tool that the Federal Bureau of Investigation (FBI) uses to track and gather location data on suspects under electronic surveillance. The software operates on the target computer much like other forms of spyware, whereas it is unknown to the operator that the software has been installed and is monitoring and reporting on their activities. The FBI also sought approval from the Foreign Intelligence Surveillance Court to use CIPAV in terrorism or spying investigations.PAV in terrorism or spying investigations. , CIPAV (Computer and Internet Protocol AddrCIPAV (Computer and Internet Protocol Address Verifier) ist eine Windows-basierte Spionagesoftware, welche vom FBI verwendet wird, um PCs von Verdächtigen zu durchsuchen. Im Gegensatz zum sogenannten Bundestrojaner wird es vom FBI nur mit einem richterlichen Durchsuchungsbefehl eingesetzt.Nach der Installation sendet die Software Daten über Festplatteninhalte, benutzte und installierte Programme, Informationen über den Browser und Betriebssystem, sowohl Seriennummer, als auch sämtlichen Benutzerinformationen aus der Windows-Registry. Die übermittelten Aktivitäten im Internet setzen sich aus den besuchten URL und sämtlichen angesteuerten IP-Adressen zusammen.lichen angesteuerten IP-Adressen zusammen.
rdfs:label Computer and Internet Protocol Address Verifier
hide properties that link here 
http://dbpedia.org/resource/Computer_and_Internet_protocol_address_verifier + , http://dbpedia.org/resource/Computer_and_internet_protocol_address_verifier + , http://dbpedia.org/resource/Cipav + , http://dbpedia.org/resource/CIPAV + http://dbpedia.org/ontology/wikiPageRedirects
http://dbpedia.org/resource/Network_Investigative_Technique + , http://dbpedia.org/resource/Magic_Lantern_%28software%29 + , http://dbpedia.org/resource/Computer_and_Internet_protocol_address_verifier + , http://dbpedia.org/resource/Computer_and_internet_protocol_address_verifier + , http://dbpedia.org/resource/Cipav + , http://dbpedia.org/resource/CIPAV + , http://dbpedia.org/resource/Censorship_in_the_United_States + , http://dbpedia.org/resource/Computer_and_network_surveillance + http://dbpedia.org/ontology/wikiPageWikiLink
http://en.wikipedia.org/wiki/Computer_and_Internet_Protocol_Address_Verifier + http://xmlns.com/foaf/0.1/primaryTopic
http://dbpedia.org/resource/Computer_and_Internet_Protocol_Address_Verifier + owl:sameAs
 

 

Enter the name of the page to start semantic browsing from.