Article 1BVP2 FBI Says It Will Ignore Court Order If Told To Reveal Its Tor Browser Exploit, Because It Feels It's Above The Law...

FBI Says It Will Ignore Court Order If Told To Reveal Its Tor Browser Exploit, Because It Feels It's Above The Law...

by
Mike Masnick
from Techdirt on (#1BVP2)
There are a bunch of different cases going on right now concerning the FBI secretly running a hidden Tor-based child porn site called Playpen for two weeks, and then hacking the users of the site with malware in order to identify them. The courts, so far, have been fine with the FBI's overall actions of running the site, but there are increasing questions about how it hacked the users. In FBI lingo, they used a "network investigative technique" or a NIT to hack into those computers, but the FBI really doesn't want to talk about the details.

In one case, it was revealed that the warrant used by the FBI never mentions either hacking or malware, suggesting that the FBI actively misled the judge. In another one of the cases, a judge has declared the use of the NIT to be illegal searches, mainly based on jurisdictional questions (the warrants were for Virginia, but the individuals were far away from there).

In yet another case, the one involving Jay Michaud -- his lawyers have now told the court that the DOJ has made it clear that despite the court ruling earlier this year that the FBI must reveal the details of the NIT/hacking tool, it will not do so (first revealed by Brad Heath). The redacted filing is in response to a (sealed) motion for reconsideration by the DOJ, but reveals more or less what the DOJ said in that filing:XteQz4T.pngIf you can't see that, the relevant portion reads:
The Government has now made plain that the FBI will not comply with the Court's discovery order... [REDACTED]... The Government further acknowledges that "there may be consequences for this refusal." [REDACTED] Pursuant to the law discussed below, the consequences are straightforward: the prosecution must now choose between complying with the Court's discovery order and dismissing the case.....

The dilemma is one entirely of the Government's own making, and nothing in its Motion for Reconsideration or renewed requests for secret proceedings changes the analysis.
The filing goes on to point out how the FBI has similarly been refusing to reveal details of its Stingray mobile phone surveillance tools (something we've discussed here quite a bit), leading to convictions being overturned. As Michaud's lawyers point out, the situation here is basically the same. If the FBI refuses to obey a court order, then the case should be dropped.
As the Maryland court observed, the FBI's obstruction of disclosure "fromspecial order and/or warrant application through appellate review - prevents the courtfrom exercising its fundamental duties under the constitution." ... "[I]t is self-evident that the court must understand why and how [a] search wasconducted," and "[t]he analytical framework requires analysis of the functionality of thesurveillance device and the range of information potentially revealed by its use." ... These conclusions mirror the conclusions reached by this Courtat the February 17 hearing.
The filing also highlights how important it is to get the details, noting that the FBI has a history of incorrectly raiding homes because it doesn't understand how Tor works:
The Government's refusal to comply with the discovery order is all the moreuntenable given the exceptional technical complexities that are involved with the Tornetwork and the FBI's use of sophisticated hacking "techniques." Just a few weeksago, Seattle police raided the home of two people who use the Tor network, based on anallegation that their IP addresses had been linked to child pornography, when in factillicit traffic had merely passed through their connection to the network.....
But perhaps even more amusing, the lawyers point out how the DOJ/FBI's claims here run exactly counter to the DOJ/FBI's arguments about Apple's obligation to respond to the DOJ's court order to help unlock encrypted phones:1X2arTJ.pngTheir complaint is that the DOJ said that Apple could use a secure location to keep the code safe, but rejects such a solution here -- but the comparison could go even deeper. After all, the DOJ kept saying that Apple was acting as if it was above the law in telling the FBI that it would not write special software to help break into a phone. Yet, here, the request is much more straightforward. The FBI doesn't have to write any new code at all... it just has to reveal what it has been told to reveal by a court: the software it used to hack into someone's computer.

Of course, there's also the fact that because of the whole Apple/DOJ fight, Senators Dianne Feinstein and Richard Burr started pushing a bill to ban encryption that opens with the following:CBxkTqO.pngSomehow, I get the feeling that both Feinstein and Burr will feel differently when it's the FBI/DOJ refusing to comply with court orders, and will claim the government is correct here. I wonder if anyone else in the Senate will now release a companion bill to the Burr/Feinstein bill suggesting that the DOJ itself should start complying with court orders, as it is not "above the law."

Permalink | Comments | Email This Story
feed?i=emFD4-vLiEE:zE2yhUSkRp8:D7DqB2pKE feed?d=c-S6u7MTCTEemFD4-vLiEE
External Content
Source RSS or Atom Feed
Feed Location https://www.techdirt.com/techdirt_rss.xml
Feed Title Techdirt
Feed Link https://www.techdirt.com/
Reply 0 comments