Reefa Posted April 21, 2016 Share Posted April 21, 2016 A Massachusetts judge has thrown out evidence obtained using malware created by the FBI in a case involving the agency’s seizure of a Dark Web site that distributed images of child sexual abuse, reports Motherboard. According to Christopher Soghoian, principal technologist at the American Civil Liberties Union (ACLU), it’s the first time a court has ever suppressed evidence from a government hacking operation. The investigation saw the FBI hack the aforementioned site, known as Playpen, and host its illegal content on its own servers for nearly two weeks in 2015. The agency did so in order to collect the IP addresses of visitors and inject malware into their systems to gather more information about those people. The FBI’s use of a network investigative technique (NIT) allowed it to obtain information about more than 1,000 US-based Playpen users and at least 3,000 more abroad. In response to a motion to suppress from the lawyers of Alex Levin, who was arrested in the Playpen investigation, Judge William G. Young said: Quote Based on the foregoing analysis, the Court concludes that the NIT warrant was issued without jurisdiction and thus was void ab initio. It follows that the resulting search was conducted as though there were no warrant at all. Since warrantless searches are presumptively unreasonable, and the good-faith exception is inapplicable, the evidence must be excluded. The 1,300 unique IP addresses that were tracked in the US led to only 137 of Playpen’s 215,000 users being charged. Judge Young’s decision in this case could set an important precedent for future cases in which law enforcement has to resort to invasive measures to gather evidence. source Link to comment Share on other sites More sharing options...
straycat19 Posted April 21, 2016 Share Posted April 21, 2016 Judge Young's decision will be overturned. Too many judges rule against the FBI because of their own prejudices and biases and a wrongful interpretation of the law. These state judges have always been overturned in the Federal Appeals Court. Regardless of how the information was obtained, 137 perverts are not going to get to walk away. Link to comment Share on other sites More sharing options...
steven36 Posted April 21, 2016 Share Posted April 21, 2016 1 hour ago, straycat19 said: Judge Young's decision will be overturned. Too many judges rule against the FBI because of their own prejudices and biases and a wrongful interpretation of the law. These state judges have always been overturned in the Federal Appeals Court. Regardless of how the information was obtained, 137 perverts are not going to get to walk away. You're wrong this was the 1st time ever they threw out evidence because they used malware. Quote For the first time, a judge has thrown out evidence obtained via a piece of FBI malware. http://motherboard.vice.com/read/in-a-first-judge-throws-out-evidence-obtained-from-fbi-malware I told everyone that these pedos were downloading files from fbi and they injected malware that told them who they were outside there browser they done it without breaking encryption . If they cant do there work legally without using malware and getting the proper warrants there in for a shit load of trouble with them breaking the law themselves to fight crime is a waste of tax payers money and the apple case has shattered the FBI rep in court i bet Hover is rolling over in his grave. Back in Hovers day no one messed with the FBI not even the president would dare too.. he would of just brought out his files on the Judge or the Judges wife and showed them to the Judge and the FBI would have not had any problems . Seems things have changed and there not as powerful as they once was .Seems technology has weakened them. Link to comment Share on other sites More sharing options...
vibranium Posted April 21, 2016 Share Posted April 21, 2016 Honeypot = legal. Hmmm. Malware = not legal. At least for now? Link to comment Share on other sites More sharing options...
Reefa Posted April 21, 2016 Author Share Posted April 21, 2016 This Technicality Could Spoil the FBI’s Dark Web Hacking Operations Quote Last year, the FBI and its international police partners hacked at least 4,000 suspected child pornographers in an unprecedented sting on a dark web child pornography website called Playpen. It was the largest police hacking operation to date, and a blueprint for future criminal investigations against tech savvy criminals who use encryption and anonymizing technologies to hide their activities and traces. But a recent decision by a judge in Massachusetts, who threw out evidence obtained with the fed’s malware, might have dealt a blow to the future of the FBI’s hacking operations and subsequent criminal cases, all because of a technicality: a procedural rule known as Rule 41. Rule 41 of the Federal Rules of Criminal Procedure stipulates when, and under what circumstances, judges can issue warrants for searches and seizures. Rule 41 is relevant in hacking operations because it mandates that a warrant must be issued within the judicial district where the criminal activity is occurring. “You have to know where, with some certainty, the target of the search is,” Brian Owsley, an assistant professor of law at the University of North Texas, who wrote a paper about Rule 41 and how it applies to hacking cases, told Motherboard. But what happens when cops or federal agents don’t know where the computer, and thus the criminal, they want to hack actually is? That’s exactly the problem when investigating cases, such as the Playpen, where criminals used the anonymizing software Tor. If you don’t know where computer is, according to Rule 41, then you can’t legally hack it. “Rule 41 simply does not permit a magistrate judge in Virginia to authorize the search of the defendant's computer located in Massachusetts,” argued the lawyer of one of the alleged child pornographer, questioning the legitimacy of the evidence gathered with a single warrant issued by a district judge hundreds of miles away. The judge agreed, saying the warrant was originally issued without jurisdiction, invalidating the evidence gathered by the FBI’s network investigative technique, or NIT—the feds’ euphemism for hacking. This is the first time that a judge has thrown out evidence gathered during a hacking operation because of jurisdictional issues, according to experts. But the US government saw this coming. In 2014, the Department of Justice, using an administrative procedure, proposed changes to Rule 41 specifically addressing this issue. The DOJ proposed that in cases where feds need to hack into computers whose location has been “concealed through technological means”—that is proxies or Tor—judges could still issue warrants without worrying about the jurisdiction. The proposed changes irked digital rights activists, legal experts, and even Google, who argued the changes were too broad and they should be discussed by Congress after public discussions, and not by an administrative body. For Ahmed Ghappour, a professor at UC Hastings College of the Law and an expert in computer crime law, the proposed changes were “the broadest expansion of extraterritorial surveillance power since the FBI’s inception.” If the changes were to be approved, critics warned, the FBI suddenly would have power to hack anyone, not only in the United States, but anywhere in the world with a warrant. The decision by the court in Massachusetts might complicate the current prosecutions arising from hacking Playpen visitors, but it gives the DOJ new ammunition to push and ask for support to its proposed changes. “We are disappointed with the court’s decision and are reviewing our options,” Peter Carr, a spokesperson for the Department of Justice, told Motherboard in a statement. “The decision highlights why the government supports the clarification of the rules of procedure currently pending before the Supreme Court to ensure that criminals using sophisticated anonymizing technologies to conceal their identities while they engage in crime over the Internet are able to be identified and apprehended.” In other words, there could be a silver lining for DOJ, as this decision could actually pave the way for the expansion of power the FBI had been longing for. “They lose this one case but they’ll win the war,” Owsley told me. The proposed rule changes have already gone through a long drafting process. Now, they’re in front of the Supreme Court, which has to weigh in on them. If the changes get approved, Congress has 180 days to weigh in on the changes, or let them be. For Nathan White, the senior legislative manager at digital rights group Access Now, this unprecedented decision in Massachusetts might give the issue enough publicity to force Congress to act. “This shouldn’t be done in secret, and it shouldn’t be done with just barely any attention to them as though they were some simple rule change that won’t affect anything, because this really does change the way law enforcement operates in the 21st century,” White told me. “Will Congress finally understand what is happening here and get involved?” SOURCE Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.