Skip to content
Naked Security Naked Security

Judge tosses evidence obtained by FBI malware planted on dark website

Although civil libertarians have praised the judge's ruling, it doesn't inhibit the FBI's authority to plant malware on a defendant's computer.

A US federal judge has thrown out evidence in a child abuse imagery case obtained by the FBI’s use of a hacking tool.

Although civil libertarians have praised the judge’s ruling to suppress the evidence, the ruling doesn’t inhibit the FBI’s ability to use so-called “network investigative techniques” (NIT) to plant code (i.e., malware) on a suspect’s computer.

Instead, the judge ruled that the FBI’s NIT warrant was improperly granted by a federal magistrate judge for a case outside her jurisdiction.

The case involves a defendant, Alex Levin of Massachusetts, who allegedly visited a child abuse imagery website on the dark web in early March 2015.

The FBI had taken control of the website in February 2015 and, in an effort to identify users of the website, hosted the website from a server in Virginia for two weeks, according to the judge’s ruling:

Rather than immediately shutting it down, agents opted to run the site out of a government facility in the Eastern District of Virginia for two weeks in order to identify – and ultimately, to prosecute – users of Website A.

The FBI then obtained a warrant from a magistrate judge in Virginia granting the FBI to use an NIT to “covertly transmit code” to the defendant’s computer.

The NIT captured information from the defendant’s computer, including his IP address, allowing the FBI to pursue a warrant to search the defendant’s home and computers.

Judge William G. Young, of the US District Court of Massachusetts, ruled that the NIT warrant was granted without proper jurisdiction, and therefore the evidence seized by the FBI should be suppressed and can not be used at trial.

Christopher Soghoian, a senior technologist at the ACLU, told Motherboard that this is “the first time a court has ever suppressed anything from a government hacking operation.”

Soghoian also tweeted that the ruling could imperil the federal government’s use of evidence obtained from the use of the dark website as a “watering hole” in prosecuting a total of 1300 cases.

https://twitter.com/csoghoian/status/722914804118065152?ref_src=twsrc%5Etfw

However, as noted by USA Today investigative reporter Brad Heath, the judge’s ruling hinged not on the legality of government hacking, but rather the type of judge granting the NIT warrant.

According to Judge Young, the FBI’s use of hacking techniques is “legitimate,” although it raises ethical and legal concerns.

In a sense, Judge Young wrote, when the FBI took control and hosted the child abuse imagery website for a period of two weeks, the government was itself distributing the imagery, “continuing harm to the victims of this hideous form of child abuse.”

Unlike other government stings, such as in drug cases where government agents buy drugs to catch the dealers, here the government was acting as the dealer, Judge Young wrote:

… here the government disseminated the child obscenity to catch the purchasers – something akin to the government itself selling drugs to make the sting.

The government’s use of NIT warrants has been challenged in other cases.

In 2013, a judge denied the government’s request for such a warrant to plant malware on a suspect’s computer because the FBI’s techniques could have ensnared innocent users of a public or shared computer.


Image of computer virus courtesy of Shutterstock.com.

6 Comments

The U.S. “government” is now hosting kiddie porn. Add this to the long list of Felonies the “government” commits daily with no repercussions. Long live U.S. corruption!!!

Reply

The system worked as it should. If the government gets out of hand the judicial branch does what it is supposed to . Police, under judicial supervision, need these types of tools to do what we pay them to do. Privacy advocates must learn to accept the checks and balances in place in the constitution.

Reply

As a retired officer, I am appalled that anyone would think it’s ok to do more than the criminals are doing in the name of Justice? There is no proof (?) that these people were distributing it… as the Government was clearly doing. Even with a court order these warrants need to have a more detailed list than the ‘computer(s)’ and should include an end date when the person can be advised of the intrusion (if they didn’t know). Someones whole life is there, this NIT stuff needs to be stopped.. Probably will when people get used to putting up with encryption..

Reply

Wouldn’t a cop selling drugs to someone then arresting them be entrapment? Why is it different here?

The government hosting child abuse images crosses the line by a mile. They need to target distributors and creators. This is like police hanging outside of high drug trafficking areas and arresting the addicts buying drugs.

Not trying to make excuses for people downloading child pornography but the evidence that arresting them protects children is weak (because the research hasn’t been done). At best this seems like a waste of resources.

At worst how many people do you think the government distributed child pornography to for every one that got arrested? Justice!

He who fights monsters and whatnot…

Reply

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to get the latest updates in your inbox.
Which categories are you interested in?
You’re now subscribed!