Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Monday January 09 2017, @12:58AM   Printer-friendly
from the something-to-hide? dept.

In a surprising and worrying move, the FBI has dropped its case against a man accused of downloading child sex abuse images, rather than reveal details about how they caught him.

Jay Michaud, a middle school teacher in Vancouver, Washington, was arrested in July last year after visiting the Playpen, a dark web meeting place tens of thousands of perverts used to swap mountains of vile underage porn.

Unbeknown to him at the time, the FBI were, for about a fortnight, running the site after taking over its servers, and managed to install a network investigative technique (NIT) on his computer to get his real public IP address and MAC address. The Playpen was hidden in the Tor anonymizing network, and the spyware was needed to unmask suspects – about 1,300 public IP addresses were collected by agents during the operation.

According to the prosecution, a police raid on his home revealed a substantial hoard of pictures and video of child sex abuse on computer equipment. But now, guilty or not, he's now off the hook after the FBI filed a motion to dismiss its own case [PDF] late last month.

Why? Because Michaud's lawyer insisted that the FBI hand over a sample of the NIT code so it could be checked to ensure that it didn't breach the terms of the warrant the FBI obtained to install the malware, and to check that it wouldn't throw up any false positives.

US District Judge Robert Bryan agreed, saying that unless the prosecution turned over the code, he'd have to dismiss the charges. The FBI has since been arguing against that, but has now decided that it's better to drop the case than reveal its techniques.

-- submitted from IRC


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: -1, Troll) by Anonymous Coward on Monday January 09 2017, @01:13AM

    by Anonymous Coward on Monday January 09 2017, @01:13AM (#451262)

    I see you want to ignore the abundant evidence against this pedophile because you are also a pedophile.

    Starting Score:    0  points
    Moderation   -1  
       Troll=2, Underrated=1, Total=3
    Extra 'Troll' Modifier   0  

    Total Score:   -1  
  • (Score: -1, Troll) by Anonymous Coward on Monday January 09 2017, @01:22AM

    by Anonymous Coward on Monday January 09 2017, @01:22AM (#451269)

    Children are easy to rape because they're small and weak and can't run fast on those little legs.

  • (Score: 5, Insightful) by zeigerpuppy on Monday January 09 2017, @02:19AM

    by zeigerpuppy (1298) on Monday January 09 2017, @02:19AM (#451284)

    A NIT is essentially malware that gets installed on a target's computer.
    If you can install a NIT, it's trivial to plant incriminating material too.

    I'm not saying he's innocent but there's a pretty good argument from his defence that the images may have been tampered.
    The problem with using intrusion techniques is that the evidence itself may well be tainted.
    But of course, law enforcement would never stoop so low as to plant evidence, and police actions are never politically motivated.

    • (Score: 1) by tftp on Monday January 09 2017, @05:10AM

      by tftp (806) on Monday January 09 2017, @05:10AM (#451331) Homepage

      If you can install a NIT, it's trivial to plant incriminating material too.

      Probably one can claim that as soon as the NIT got loaded, the accused lost control over his PC and cannot be held responsible for the content. Even if the NIT code has no obvious downloader, it may create a hole for another tool that does the download and sets the access date/time.

      If this defense is successful, then the TLAs will be less enthusiastic about planting bugs onto people's computers because they cannot be used in court.

      • (Score: 0) by Anonymous Coward on Thursday January 12 2017, @08:39PM

        by Anonymous Coward on Thursday January 12 2017, @08:39PM (#453052)

        If this defense is successful, then the TLAs will be less enthusiastic about planting bugs onto people's computers because they cannot be used in court.

        Not in the slightest. The TLAs will be more enthusiastic than ever about using them. They'll just be ever so much more careful in assuring a parallel construction such that there is never a chance that the penetrations will come forward in court nor offered in disclosure.

  • (Score: 0) by Anonymous Coward on Monday January 09 2017, @04:16PM

    by Anonymous Coward on Monday January 09 2017, @04:16PM (#451492)

    If catching a pedo is that important - which it is - then why not do your fucking job and do it properly, follow all procedures and check all requirement boxes the right way; that way, your evidence will be admissible in court.

    • (Score: 3, Insightful) by Anal Pumpernickel on Monday January 09 2017, @09:25PM

      by Anal Pumpernickel (776) on Monday January 09 2017, @09:25PM (#451650)

      If catching a pedo is that important - which it is

      It really isn't. Merely being a pedophile (i.e. someone who is sexually attracted to prepubescent children) isn't actually illegal, and even if someone has child porn of some sort, the mere act of possessing it does not actually inflict harm upon anyone. There's no guarantee it was paid for, either. It's a waste of time going after these people. Resources are limited, so they should focus on going after the ones who actually create the child porn in the first place.

      • (Score: 0) by Anonymous Coward on Wednesday January 11 2017, @06:05AM

        by Anonymous Coward on Wednesday January 11 2017, @06:05AM (#452378)
        Sharing movies kills the movie industry, so we should share child porn to kill the child porn industry :).