Stories
Slash Boxes
Comments

SoylentNews is people

posted by takyon on Wednesday April 15 2015, @10:20AM   Printer-friendly
from the surveillance-stick dept.

ArsTechnica reports that Matt Campbell, a North Little Rock attorney who represents police department whistleblowers supplied an external hard drive to the Fort Smith Police Department for them to copy emails and other evidence. When it was returned, he discovered that it contained three well-known trojan viruses:

According to court documents filed last week in the case, Campbell provided police officials with an external hard drive for them to load with e-mail and other data responding to his discovery request. When he got it back, he found something he didn't request. In a subfolder titled D:\Bales Court Order, a computer security consultant for Campbell allegedly found three well-known trojans, including:

  • Win32:Zbot-AVH[Trj], a password logger and backdoor
  • NSIS:Downloader-CC[Trj], a program that connects to attacker-controlled servers and downloads and installs additional programs, and
  • Two instances of Win32Cycbot-NF[Trj], a backdoor

All three trojans are usually easily detected by antivirus software. In an affidavit filed in the whistle-blower case, Campbell's security consultant said it's unlikely the files were copied to the hard drive by accident, given claims by Fort Smith police that department systems ran real-time AV protection.

"Additionally, the placement of these trojans, all in the same sub-folder and not in the root directory, means that [t]he trojans were not already on the external hard drive that was sent to Mr. Campbell, and were more likely placed in that folder intentionally with the goal of taking command of Mr. Campbell's computer while also stealing passwords to his accounts."

Will the Fort Smith Police Department be held accountable? Place your bets...

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Insightful) by tathra on Wednesday April 15 2015, @05:45PM

    by tathra (3367) on Wednesday April 15 2015, @05:45PM (#171078)

    Of course there is a tiny problem in this case - they targeted a lawyer, and they are not supposed to be able to "investigate" stuff that is attorney-client privileged...

    this would be a good time for lawyers to attack parallel construction. [wikipedia.org] the cops don't care that they couldn't use the evidence "legally" because they were simply going to create a 'legitimate' source for the evidence. once they laundered the illegally-obtained evidence such that it could be used to get a warrant, they would then use the warrant to get all the rest of the evidence that they already had so they could use it in the courts.

    the DEA, in their never-ending quest to destroy America and the constitution, has managed to completely destroy any trust that remained in the legal system by consistently using illegal and unconstitutional methods to enforce unconstitutional laws. thanks to their pride and joy, parallel construction, it must be assumed that all evidence was obtained illegally and then laundered, because law enforcement has every incentive to do it and zero reasons not to, and no punishments for it even if they get caught.

    Starting Score:    1  point
    Moderation   +3  
       Insightful=2, Interesting=1, Total=3
    Extra 'Insightful' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 2, Insightful) by Anonymous Coward on Thursday April 16 2015, @12:56AM

    by Anonymous Coward on Thursday April 16 2015, @12:56AM (#171269)

    I'm disappointed that the lawyers didn't load the trojans onto a honeypot system and then use it to access 'bait' privileged information on extensively logged servers. Then they'd have a devastating civil case, and the threat of state or federal criminal charges as leverage.