FBI Says It Will Ignore Court Order If Told To Reveal Its Tor Browser Exploit, Because It Feels It's Above The Law…
from the above-the-law? dept
There are a bunch of different cases going on right now concerning the FBI secretly running a hidden Tor-based child porn site called Playpen for two weeks, and then hacking the users of the site with malware in order to identify them. The courts, so far, have been fine with the FBI’s overall actions of running the site, but there are increasing questions about how it hacked the users. In FBI lingo, they used a “network investigative technique” or a NIT to hack into those computers, but the FBI really doesn’t want to talk about the details.
In one case, it was revealed that the warrant used by the FBI never mentions either hacking or malware, suggesting that the FBI actively misled the judge. In another one of the cases, a judge has declared the use of the NIT to be illegal searches, mainly based on jurisdictional questions (the warrants were for Virginia, but the individuals were far away from there).
In yet another case, the one involving Jay Michaud — his lawyers have now told the court that the DOJ has made it clear that despite the court ruling earlier this year that the FBI must reveal the details of the NIT/hacking tool, it will not do so (first revealed by Brad Heath). The redacted filing is in response to a (sealed) motion for reconsideration by the DOJ, but reveals more or less what the DOJ said in that filing:
The Government has now made plain that the FBI will not comply with the Court’s discovery order… [REDACTED]… The Government further acknowledges that “there may be consequences for this refusal.” [REDACTED] Pursuant to the law discussed below, the consequences are straightforward: the prosecution must now choose between complying with the Court’s discovery order and dismissing the case…..
The dilemma is one entirely of the Government’s own making, and nothing in its Motion for Reconsideration or renewed requests for secret proceedings changes the analysis.
The filing goes on to point out how the FBI has similarly been refusing to reveal details of its Stingray mobile phone surveillance tools (something we’ve discussed here quite a bit), leading to convictions being overturned. As Michaud’s lawyers point out, the situation here is basically the same. If the FBI refuses to obey a court order, then the case should be dropped.
As the Maryland court observed, the FBI?s obstruction of disclosure ?from special order and/or warrant application through appellate review ? prevents the court from exercising its fundamental duties under the constitution.? … ?[I]t is self-evident that the court must understand why and how [a] search was conducted,? and ?[t]he analytical framework requires analysis of the functionality of the surveillance device and the range of information potentially revealed by its use.? … These conclusions mirror the conclusions reached by this Court at the February 17 hearing.
The filing also highlights how important it is to get the details, noting that the FBI has a history of incorrectly raiding homes because it doesn’t understand how Tor works:
The Government?s refusal to comply with the discovery order is all the more untenable given the exceptional technical complexities that are involved with the Tor network and the FBI?s use of sophisticated hacking ?techniques.? Just a few weeks ago, Seattle police raided the home of two people who use the Tor network, based on an allegation that their IP addresses had been linked to child pornography, when in fact illicit traffic had merely passed through their connection to the network…..
But perhaps even more amusing, the lawyers point out how the DOJ/FBI’s claims here run exactly counter to the DOJ/FBI’s arguments about Apple’s obligation to respond to the DOJ’s court order to help unlock encrypted phones:
Of course, there’s also the fact that because of the whole Apple/DOJ fight, Senators Dianne Feinstein and Richard Burr started pushing a bill to ban encryption that opens with the following: