FBI Spyware in a Nutshell
The full capabilities of the FBI's "computer and internet protocol address verifier" are closely guarded secrets, but here's some of the data the malware collects from a computer immediately after infiltrating it, according to a bureau affidavit acquired by Wired News.
• IP address
• MAC address of ethernet cards
• A list of open TCP and UDP ports
• A list of running programs
• The operating system type, version and serial number
• The default internet browser and version
• The registered user of the operating system, and registered company name, if any
• The current logged-in user name
• The last visited URL
Once that data is gathered, the CIPAV begins secretly monitoring the computer's internet use, logging every IP address to which the machine connects.
All that information is sent over the internet to an FBI computer in Virginia, likely located at the FBI's technical laboratory in Quantico.@ WIRED
The INJustice Dept. caught one teen making bomb threats to his school via the internets and in the process revealed the 'modus operandi'.
This revelation ought to be a wake up call for all internet users that 'Gonzo's Raiders' are lurking out there in the shadows monitoring, without search warrants, everything you and I do while surfing the net.
Granted it performs a useful purpose of catching perps but the temptation is there to amass information on individuals or group who's only crime is defiance of the authoritarians in charge.
It is a brave new world but ripe for the picking when it comes to power hungry bureaucrats.
Personal liberty is on it's way out being replaced by authoritarian rule, be ever vigilant.