Graphic of a blue block spacer
Graphic of the FBI Seal and U.S. Flag  and link to FBI Homepage
Graphic link to FBI Priorities
Graphic link to About Us
Graphic link to Press Room
Graphic link to What We Investigate
Graphic link to Counterterrorism
Link to Intelligence Program
Graphic link to Most Wanted
Graphic link to Law Enforcement Services
Graphic link to Your Local FBI Office
Graphic link to Reports and Publications
Graphic link to FBI History
Graphic link to For the Family
Graphic link to Freedom Of Iinformation Act Library / Requests
Graphic link to Employment
Graphic link to How Do I..?
Graphic link to Search

Graphic link to  Home

 

Graphic link to Submit a Tip
Graphic link to Apply Today
Graphic link to Links
Graphic link to Contact Us
Graphic link to Site Map
Graphic link to Privacy Policy
Press Room
Congressional Statements


Letter from Assistant Director John Collingwood to Members of Congress
on
Carnivore Diagnostic Tool
August 16, 2000

Based upon the letters and calls we have received, your office undoubtedly has received many constituent inquiries about the "Carnivore" system. To help your staff respond to those inquiries, we are forwarding to you information about the legal requirements and technical aspects for using this court authorized technique. This seems especially important given the level of public misinformation and misunderstanding apparent from the inquiries we have received.

Law enforcement is experiencing what was inevitable. Just like everyone else, criminals and terrorists have turned to modern forms of computer communications to conduct their business and further their crimes. E-mail among criminals and terrorists is no longer unusual.

In 1968 and during the decades that followed, Congress carefully crafted a precise statutory scheme for intercepting communications. Essentially, law enforcement must demonstrate and a judge must conclude that there is probable cause to believe that a serious crime is being or has been committed; the communications (e-mails) sought are about or in furtherance of that crime; and that the interception is necessary to gather evidence about that crime. Intercepting the content of communications, even the "subject line" of e-mail, without meeting these standards and receiving an authorizing court order is itself a crime subject to severe criminal and civil sanctions.

The challenge then was how, when a court order is obtained, can FBI Agents or other officers intercept the content of e-mail going to or from a particular criminal when those communications are broken down into digital packets traveling with millions of other messages over the Internet.

That is what Carnivore does. When all the legal standards have been met and a judge authorizes, for example, the interception of e-mail from one drug dealer to another, this system, in conjunction with the necessary assistance of the appropriate Internet Service Provider (ISP), allows the interception of those particular e-mails to the exclusion of all others and all other types of computer traffic regardless of what it is or who sends or receives it.

Carnivore is only used in those small number of instances when an ISP cannot on its own deliver what the court order instructs and, for security and accountability reasons, the system has built in audit trails. The evidence produced by such court authorized intercepts traditionally is subject to vigorous challenge by defense lawyers and, of course, the process is supervised by the authorizing court.

In answer to the most common questions we are receiving, Carnivore is only used with the assistance of ISPs and is only connected while the authorizing order is in effect. It does not "snoop" through e-mail traveling through an ISP network by searching for key words or reading the "subject line" or any other content. That would be a crime. It only captures and then records the specific communications and/or addressing information specifically described in the order, e.g., e-mail between two criminals. It will be independently tested pursuant to a procedure established by the Department of Justice and we have shown the system to over 30 reporters and dozens on Capitol Hill. It unquestionably was ill-named.

Those of us in the law enforcement community appreciate the controversial nature of this subject and understand why it must receive careful and thoughtful scrutiny. Our primary concern remains that the public receive accurate information about Carnivore and its limited use by law enforcement to investigate, prosecute, and prevent very real risks to public safety and national security. Without capabilities like Carnivore, readily available technology can be easily employed by criminals and terrorists to defeat the ability of law enforcement to obtain crucial and timely evidence and to prevent serious crimes. We must continue to balance this crucial public safety need with the equally important need of preserving individual privacy. The FBI remains committed to helping maintain this balance.

If you or your staff need additional information, please do not hesitate to ask.

Sincerely yours,



John E. Collingwood
Assistant Director
Office of Public and
Congressional Affairs