Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Monday January 09 2017, @12:58AM   Printer-friendly
from the something-to-hide? dept.

In a surprising and worrying move, the FBI has dropped its case against a man accused of downloading child sex abuse images, rather than reveal details about how they caught him.

Jay Michaud, a middle school teacher in Vancouver, Washington, was arrested in July last year after visiting the Playpen, a dark web meeting place tens of thousands of perverts used to swap mountains of vile underage porn.

Unbeknown to him at the time, the FBI were, for about a fortnight, running the site after taking over its servers, and managed to install a network investigative technique (NIT) on his computer to get his real public IP address and MAC address. The Playpen was hidden in the Tor anonymizing network, and the spyware was needed to unmask suspects – about 1,300 public IP addresses were collected by agents during the operation.

According to the prosecution, a police raid on his home revealed a substantial hoard of pictures and video of child sex abuse on computer equipment. But now, guilty or not, he's now off the hook after the FBI filed a motion to dismiss its own case [PDF] late last month.

Why? Because Michaud's lawyer insisted that the FBI hand over a sample of the NIT code so it could be checked to ensure that it didn't breach the terms of the warrant the FBI obtained to install the malware, and to check that it wouldn't throw up any false positives.

US District Judge Robert Bryan agreed, saying that unless the prosecution turned over the code, he'd have to dismiss the charges. The FBI has since been arguing against that, but has now decided that it's better to drop the case than reveal its techniques.

-- submitted from IRC


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 1) by tftp on Monday January 09 2017, @05:10AM

    by tftp (806) on Monday January 09 2017, @05:10AM (#451331) Homepage

    If you can install a NIT, it's trivial to plant incriminating material too.

    Probably one can claim that as soon as the NIT got loaded, the accused lost control over his PC and cannot be held responsible for the content. Even if the NIT code has no obvious downloader, it may create a hole for another tool that does the download and sets the access date/time.

    If this defense is successful, then the TLAs will be less enthusiastic about planting bugs onto people's computers because they cannot be used in court.

  • (Score: 0) by Anonymous Coward on Thursday January 12 2017, @08:39PM

    by Anonymous Coward on Thursday January 12 2017, @08:39PM (#453052)

    If this defense is successful, then the TLAs will be less enthusiastic about planting bugs onto people's computers because they cannot be used in court.

    Not in the slightest. The TLAs will be more enthusiastic than ever about using them. They'll just be ever so much more careful in assuring a parallel construction such that there is never a chance that the penetrations will come forward in court nor offered in disclosure.