ComputerCop
   HOME

TheInfoList



OR:

ComputerCop (stylized ComputerCOP) is
content control software An Internet filter is software that restricts or controls the content an Internet user is capable to access, especially when utilized to restrict material delivered over the Internet via the Web, Email, or other means. Content-control software dete ...
developed by the
Bohemia, New York Bohemia is a hamlet (and census-designated place) in Suffolk County, New York, United States. The population was 10,180 at the 2010 census. It is situated along the South Shore of Long Island in the Town of Islip, approximately 50 miles from N ...
-based company ComputerCop Software. The software offers the ability for users to scan content on a computer (such as files, images, video, and web browser history) for objectionable content, along with a key logging component that allows parents to be notified if certain words are being typed. Upon its original release, the software was endorsed by
NYPD The New York City Police Department (NYPD), officially the City of New York Police Department, established on May 23, 1845, is the primary municipal law enforcement agency within the City of New York, the largest and one of the oldest in ...
detective
Bo Dietl Richard A. "Bo" Dietl (born December 4, 1950) is an American retired police detective, a media personality and actor. Dietl is the founder and CEO of Beau Dietl & Associates and Beau Dietl Consulting Services. Early life and police career Bo D ...
, and was originally branded as Bo Dietl's One Tough Computer Cop (in reference to his autobiographal film ''
One Tough Cop ''One Tough Cop'' is a 1998 American action crime film. It was directed by Bruno Barreto and written by Jeremy Iacone. The movie stars Stephen Baldwin as the protagonist and first-person narrator Bo Dietl, a real-life New York City detective who ...
''). It initially only contained scanning software; later versions dropped Dietl's endorsement and branding, but also added a keylogger. The software, which is intended to promote children's
internet safety Internet safety or online safety or cyber safety and E-Safety is trying to be safe on the internet and is the act of maximizing a user's awareness of personal safety and security risks to private information and property associated with using the i ...
, is not generally sold to the public, but is sold directly to local
law enforcement agencies A law enforcement agency (LEA) is any government agency responsible for the enforcement of the laws. Jurisdiction LEAs which have their ability to apply their powers restricted in some way are said to operate within a jurisdiction. LEAs ...
and
police department The police are a constituted body of persons empowered by a state, with the aim to enforce the law, to ensure the safety, health and possessions of citizens, and to prevent crime and civil disorder. Their lawful powers include arrest and ...
s in bulk with custom branding and endorsements, and then distributed to the public at no charge as a form of
outreach Outreach is the activity of providing services to any population that might not otherwise have access to those services. A key component of outreach is that the group providing it is not stationary, but mobile; in other words, it involves meetin ...
. The software gained infamy in October 2014 following the release of a report by the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ci ...
, a non-profit
digital rights Digital rights are those human rights and legal rights that allow individuals to access, use, create, and publish digital media or to access and use computers, other electronic devices, and telecommunications networks. The concept is particular ...
group, which alleged that ComputerCop was privacy-invasive due to a number of security flaws, including the storage and transmission of key logging output in a non-encrypted format. The reports resulted in varying responses from agencies who planned to, or had distributed the software, although they continued to endorse the software for its public safety benefits.


Operation

ComputerCop is distributed on a
CD-ROM A CD-ROM (, compact disc read-only memory) is a type of read-only memory consisting of a pre-pressed optical compact disc that contains data. Computers can read—but not write or erase—CD-ROMs. Some CDs, called enhanced CDs, hold both comput ...
, and consists of two software components; a content scanner, and a key logger. The scanner can be run directly off the CD, and performs a scan of the system's hard drive for files containing objectionable content, and a user's web browsing history for objectionable websites. While it can scan the content of file names and documents for keywords relating to such content, it cannot scan the content of images themselves. The software comes with a second component known as "KeyAlert", which is designed to monitor the use of websites and
online chat Online chat may refer to any kind of communication over the Internet that offers a real-time text, real-time transmission of text-based, text messages from sender to receiver. Chat messages are generally short in order to enable other participa ...
services; when installed on the computer, it scans and logs keyboard input by the computer's user, searching for and logging the use of strings related to objectionable content and user-specified keywords. It can also provide
e-mail Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" meant ...
notifications whenever such activity is detected. Logged data is stored on the computer's hard drive; on the
Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for serv ...
version, it is stored as unencrypted
plain text In computing, plain text is a loose term for data (e.g. file contents) that represent only characters of readable material but not its graphical representation nor other objects (floating-point numbers, images, etc.). It may also include a limit ...
. The
OS X macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac computers. Within the market of desktop and lapt ...
version does encrypt logging data with a password.


Distribution

The ComputerCop software is marketed directly to
district attorney In the United States, a district attorney (DA), county attorney, state's attorney, prosecuting attorney, commonwealth's attorney, or state attorney is the chief prosecutor and/or chief law enforcement officer representing a U.S. state in a l ...
s and law enforcement agencies as a semi-
white-label product A white-label product is a product or service produced by one company (the producer) that other companies (the marketers) rebrand to make it appear as if they had made it. The name derives from the image of a white label on the packaging that ca ...
. Its packaging can be branded with an agency's logo, and an introductory video featuring an official from the agency can be played upon insertion of the disc—either provided by the agency itself, or filmed by ComputerCop Software. The software is purchased in
bulk Bulk can refer to: Industry * Bulk cargo * Bulk liquids * Bulk mail * Bulk material handling * Bulk pack, packaged bulk materials/products * Bulk purchasing * Baking * Bulk fermentation, the period after mixing when dough is left alone to ferm ...
by the agency, who can then distribute the software for free to members of the public as an
outreach Outreach is the activity of providing services to any population that might not otherwise have access to those services. A key component of outreach is that the group providing it is not stationary, but mobile; in other words, it involves meetin ...
campaign for children's
internet safety Internet safety or online safety or cyber safety and E-Safety is trying to be safe on the internet and is the act of maximizing a user's awareness of personal safety and security risks to private information and property associated with using the i ...
. Its developers also touted that offering the software could help provide an agency with "positive media attention", and that it was also an "election and fundraising tool". The software is not marketed directly to consumers, although
surplus Surplus may refer to: * Economic surplus, one of various supplementary values * Excess supply, a situation in which the quantity of a good or service supplied is more than the quantity demanded, and the price is above the equilibrium level determ ...
copies exist for sale online.


Reception

On October 1, 2014, the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ci ...
released a report considering the ComputerCop software to be
spyware Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privac ...
due to a number of major design flaws—particularly within its key logging system. The EFF condemned the 245 agencies that, according to public records and other materials obtained by the foundation, distributed ComputerCop, for using knowingly using public funding to purchase and distribute insecure surveillance software to the general public. The EFF did not consider the scanning portion of the software to be adequately effective due to a large number of
false positive A false positive is an error in binary classification in which a test result incorrectly indicates the presence of a condition (such as a disease when the disease is not present), while a false negative is the opposite error, where the test result ...
s, a lack of support for web browsers other than
Internet Explorer Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated IE or MSIE) is a series of graphical user interface, graphical web browsers developed by Microsoft which was used in the Microsoft Wind ...
and
Safari A safari (; ) is an overland journey to observe wild animals, especially in eastern or southern Africa. The so-called "Big Five" game animals of Africa – lion, leopard, rhinoceros, elephant, and Cape buffalo – particularly form an importa ...
, along with an inability to distinguish between application data files and user files, or scan the contents of image files themselves. More significantly, the key logger was criticized for storing logged data in non-
encrypted In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
plain text In computing, plain text is a loose term for data (e.g. file contents) that represent only characters of readable material but not its graphical representation nor other objects (floating-point numbers, images, etc.). It may also include a limit ...
on the user's hard drive, including
password A password, sometimes called a passcode (for example in Apple devices), is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of ...
s and other sensitive information. It was also found that an insecure connection was used to transmit the log data to a third-party server to generate e-mail notifications; log data could easily be intercepted over a public
Wi-Fi hotspot A hotspot is a physical location where people can obtain Internet access, typically using Wi-Fi technology, via a wireless local-area network (WLAN) using a router connected to an Internet service provider. Public hotspots may be created by ...
using
packet analyzer A packet analyzer, also known as packet sniffer, protocol analyzer, or network analyzer, is a computer program or computer hardware such as a packet capture appliance, that can intercept and log traffic that passes over a computer network or p ...
software. ComputerCop head Stephen DelGiorno denied any major problems with the software, stating that their software "doesn't give sexual predators or identity thieves more access to children's computers", as it "works with the existing email and Internet access services that computer user has already engaged", but noted that they would update their
privacy policy A privacy policy is a statement or legal document (in privacy law) that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. Personal information can be anything that can be used to identif ...
to indicate that they did not store user information. The EFF also noted several questionable claims made by ComputerCop's distributors in promotional material; the company had distributed a letter by Raymond M. Dineen, former director of the
Treasury Executive Office for Asset Forfeiture The Treasury Executive Office for Asset Forfeiture (TEOAF) is an agency of the United States federal government in the United States Department of the Treasury. TEOAF is responsible for administering the Treasury Forfeiture Fund (TFF). The TFF was e ...
, which endorsed the software as a "valid crime protection tool", and specified that purchase of the software was an acceptable use of
equitable sharing Equitable sharing refers to a United States program in which the proceeds of liquidated seized assets from asset forfeiture are shared between state and federal law enforcement authorities. The Comprehensive Crime Control Act of 1984 set up the ...
funds. DelGiorno claimed that the letter, which was undated, was from 2001, but that certain elements (such as the letterhead, which was re-created) were modified for presentation purposes. The EFF attempted to request an original copy of the letter from the Treasury Department, but the department was unable to locate it. Shortly afterward, the Treasury Department issued a fraud alert believing that the document was falsified. Promotional material for ComputerCop was also found to contain endorsements by the
American Civil Liberties Union The American Civil Liberties Union (ACLU) is a nonprofit organization founded in 1920 "to defend and preserve the individual rights and liberties guaranteed to every person in this country by the Constitution and laws of the United States". T ...
and the
National Center for Missing and Exploited Children The National Center for Missing & Exploited Children (NCMEC) is a private, nonprofit organization established in 1984 by the United States Congress. In September 2013, the United States House of Representatives, United States Senate, and the Pres ...
. The ACLU denied that it had endorsed the software, while the NCME stated that in 1998, it gave permission for ComputerCop to include its endorsement, but only for a year. Following these reports, the San Diego County District Attorney's Office issued a warning advising against using the key logging features of the ComputerCop software; however, District Attorney Bonnie Dumanis (who endorsed the software) still stated that "the benefits of this software in protecting children from predators and bullies online and providing parents with an effective oversight tool outweigh the limited security concerns about the product, which can be fixed." Steve Moawad, the Senior Deputy District Attorney of
Contra Costa County, California ) of the San Francisco Bay , subdivision_type = Country , subdivision_name = United States , subdivision_type1 = State , subdivision_name1 = California , subdivision_type2 ...
, similarly noted that the EFF had "overstat dthe risk" of ComputerCop, and that there had not yet been any
identity theft Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term ''identity theft'' was co ...
cases in connection to the software. After having announced the purchase and distribution of 5,000 copies of ComputerCop only a few days prior to the EFF report, Limestone County sheriff Mike Blakely defended the software and disputed the Electronic Frontier Foundation's actions, describing the group as a non-credible "ultra-liberal" organization that is "more interested in protecting predators and pedophiles than in protecting our children." He also argued that the technology provided by ComputerCop could have helped prevent the
Columbine High School massacre On April 20, 1999, a school shooting and attempted bombing occurred at Columbine High School in Columbine, Colorado, United States. The perpetrators, 12th grade students Eric Harris and Dylan Klebold, murdered 12 students and one teacher. ...
. In further statements to the technology website ''
Ars Technica ''Ars Technica'' is a website covering news and opinions in technology, science, politics, and society, created by Ken Fisher and Jon Stokes in 1998. It publishes news, reviews, and guides on issues such as computer hardware and software, sci ...
'', Blakely stated that proper use of the software was "something we whole-heartedly endorse", but that "if you're of the persuasion of the people of the EFF who would rather not do anything, then that's something that I can't help." In September 2016, the Treasury Department completed an investigation, confirming that the distributors had "altered the 2001 letter from TEOAF and made it appear to be blanket permission for all law enforcement agencies to use equitable sharing funds to purchase the software", but that it cannot be prosecuted due to
statute of limitations A statute of limitations, known in civil law systems as a prescriptive period, is a law passed by a legislative body to set the maximum time after an event within which legal proceedings may be initiated. ("Time for commencing proceedings") In m ...
.


See also

*
Internet security Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules a ...
*
List of content-control software This is a list of content-control software and services. The software is designed to control what content may or may not be viewed by a reader, especially when used to restrict material delivered over the Internet via the Web, e-mail, or other mea ...
*
Comparison of antivirus software This article compares notable antivirus products and services. It is Wikipedia list article rather than a deep analysis of the strengths and weaknesses of each. Legend The term "on-demand scan" refers to the possibility of performing a manual ...
*
Comparison of firewalls Comparison or comparing is the act of evaluating two or more things by determining the relevant, comparable characteristics of each thing, and then determining which characteristics of each are similar to the other, which are different, and t ...
* '' State of Connecticut v. Julie Amero''


References


External links

* {{Official website
How to remove ComputerCOP from Windows and Mac
Content-control software Internet safety Spyware