Security services are prepared to let dangerous criminals escape if it means protecting their hacking techniques, finds Stewart Mitchell
Spying, internet surveillance and hacking are secretive worlds, but sometimes the need for secrecy can get in the way of their ultimate goals. Being asked to show how you have obtained evidence can mean giving up an asset that is worth more than the actual evidence itself.
The predicament was highlighted in a recent case in the US, when FBI officials used a previously unknown exploit to infiltrate, take over and investigate a dark web child abuse ring.
The PlayPenweb group breach –where government officials reportedly used a Tor browser flaw to identify the IP addresses of members – led to the identification of 135 suspects in the US and 8,700 members in 120 countries.
However, as the case of one defendant came to trial, court rulings made it clear that, to seal a conviction, the officials would need to disclose how the evidence against the alleged paedophiles was obtained. Rather than reveal their exploits, federal prosecutors dropped the case, but were able to keep the possibility of further legal action alive – presumably in case the exploit was later made public and no longer had value as a stealth tool.
The ruling “deprived the government of the evidence needed to establish defendant Jay Michaud’s guilt beyond a reasonable doubt at trial,” the prosecutors said when dropping the case. “The government must now choose between disclosure of classified information and dismissal of its indictment. Disclosure is not currently an option.
“Dismissal without prejudice leaves open the possibility that the government could bring new charges should there come a time when the government be in a position to provide the requested discovery.”
Fragile evidence
Esta historia es de la edición June 2017 de PC Pro.
Comience su prueba gratuita de Magzter GOLD de 7 días para acceder a miles de historias premium seleccionadas y a más de 9,000 revistas y periódicos.
Ya eres suscriptor ? Conectar
Esta historia es de la edición June 2017 de PC Pro.
Comience su prueba gratuita de Magzter GOLD de 7 días para acceder a miles de historias premium seleccionadas y a más de 9,000 revistas y periódicos.
Ya eres suscriptor? Conectar
How to earn Cyber Essentials certification
The UK's government-backed security standard provides reassurance for you and your customers. Nik Rawlinson explores what's involved - and how to get it
HP Omen Transcend 14
If you're sticking with Asus or Razer gaming laptops out of habit, the HP Omen Transcend 14 may just change your mind
AI TRİSM
New computing paradigms come with new challenges. Steve Cassidy explores how to use AI safely and securely
13 warnings about using AI at work
AI experts from industry and academia were gathered by the Turing Institute to consider the future of the technology. Nicole Kobie reveals the lessons they offered
Brilliant business comms at zero cost
Whether you choose 3CX Free or 3CX SMB V20, it's time to say goodbye to per-user pricing and bundle rip-offs
TURN YOUR DUMB TV INTO A SMART ONE WITH A RASPBERRY PI
Enjoy video on demand and more Nik Rawlinson finds out how the humble Pi can transform your TV
GIGABIT INTERNET Get the speeds you're paying for
Is your premium internet service not racing along like it should? Darien Graham-Smith goes in search of faster downloads on every device
7 HABITS OF HIGHLY EFFECTIVE IT PROS
The PC Pro team combine their collective wisdom to create seven tips for keeping on top of your IT game
BRILLIANT MONITORS from £149
Whether you’re looking for screens to roll out ina business, an entertainment centrepiece ora pro-quality monitor, one of our 15 displays holds the answer
PORTABLESSDs FROM £69
We review 12 portable SSDs that cover a wide range of standards, form factors and target users