Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Australia Crime Government Privacy

Australian Authorities Hacked Computers in the US (vice.com) 75

Motherboard is reporting that Australian authorities hacked Tor users in the United States as part of a child pornography investigation. The revelation comes through recently-filed US court documents. The incident underscores a trend where law enforcement around the world are increasingly pursuing targets overseas using hacking tools, raising legal questions around agencies' reach. From the report: In one case, Australian authorities remotely hacked a computer in Michigan to obtain the suspect's IP address. "The Love Zone" was a prolific dark web child abuse site, where users were instructed to upload material at least once a month to maintain access to the forum. By July 2014, the site had over 29,000 members, according to US court documents, constituting what the US Department of Justice described as a "technologically sophisticated conspiracy." In 2014, Queensland Police Service's Task Force Argos, a small, specialised unit focused on combating child exploitation crimes, identified the site's Australian administrator in part because of a localized greeting he signed messages with. The unit quietly took over his account, and for months ran the site in an undercover capacity, posing as its owner. Task Force Argos' logo includes a scorpion, and the tagline "Leave No Stone Unturned." Because The Love Zone was based on the dark web, users typically connected via the Tor network, masking their IP addresses even from the law enforcement agents who were secretly in control of the site. Task Force Argos could see what the users were viewing, and what pages they were visiting, but not where they were really connecting from.
This discussion has been archived. No new comments can be posted.

Australian Authorities Hacked Computers in the US

Comments Filter:
  • by smooth wombat ( 796938 ) on Monday August 15, 2016 @12:00PM (#52705357) Journal
    raising legal questions around agencies' reach.

    Queensland Police Service's Task Force Argos, a small, specialised unit focused on combating child exploitation crimes, identified the site's Australian administrator in part because of a localized greeting he signed messages with.

    In other words, an Australian law enforcement agency was going after an Australian running a child porn site. Yeah, that is totally out of bounds for them. Who would ever think a country would have jurisdiction over people committing crimes in their country.

    Child pornography has no borders. Based on the hyperbole from Motherboard we can presume they support child pornographers to be protected so they can continue raping one and two-year olds because that's what's most important.
  • TOR END POINT = chilld sex offender that after they get out will be blacked listed form just about all work and may just do what it takes to get back in.

    • What do you mean by Tor end point? A Tor exit node only finds you traffic to non-dark web sites.

      A Tor relay only shares encrypted data between other nodes. You have to target the actual end user with malware to succeed in identifying them. And that's what this article is about - hacked PCs.

  • by papafox_too ( 883077 ) * on Monday August 15, 2016 @12:37PM (#52705645)

    Did the Queensland Police hack any computers? They appear to have simply sent emails containing links. When the link was clicked, the IP address of the mail client as recorded.

    From the TLA:

    >> Details on how exactly this was achieved are limited, but according to a court document from another case [documentcloud.org],
    >> “When a user clicked on that hyperlink, the user was advised that the user was attempting to open a video
    >> file from an external website. If the user chose to open the file, a video file containing images of child pornography
    >> began to play, and the FLA [foreign law enforcement agency] captured and recorded the IP address of the user accessing the file.”

    So it doesn't appear that any code was inserted into the target computer. The offenders didn't follow good opsec - they clicked on a link while they were not connected to a TOR proxy.

    As for jurisdiction - it appears that the server was moved to Brisbane. Again from the TLA:

    >> At one point, The Love Zone server was also reportedly moved to Brisbane, giving Task Force Argos,
    >> the Queensland Police Service unit that took over the site, access to every private message on the site.

    If the server was located in Queensland, then Queensland court orders could legitimately apply to it. So no evidence of hacking or of extra-territoriality. Move along folks, no misconduct, just good police work.

  • Remember the right-wing screaming the phrase 'One World Government!' at the top of their lungs during the nineties?
    Well, Righties, it appears the extra-judicial organs of state security have already faited that accompli.
  • Anyone in Australia hacking anything in the US should result in criminal charges (not that it'd ever go to trial unless the perpetrator actually found his or her way to US soil). Period. It doesn't matter if the person doing the hacking is a private citizen or the prime minister.

    That said, the "hacking" they're talking about seems to have been giving the guy a link a hyperlink. Calling giving someone a hyperlink and them clicking it a "hack" is a stretch, imo, if that hyperlink doesn't do anything other

    • Anyone in Australia hacking anything in the US should result in criminal charges (not that it'd ever go to trial unless the perpetrator actually found his or her way to US soil). Period. It doesn't matter if the person doing the hacking is a private citizen or the prime minister.

      That said, the "hacking" they're talking about seems to have been giving the guy a link a hyperlink. Calling giving someone a hyperlink and them clicking it a "hack" is a stretch, imo, if that hyperlink doesn't do anything other than connect to a web site. If it downloaded malware or something similar, then ok, but it doesn't sound like that's what happened.

      Why should it be illegal if they are law enforcement? We don't go after the thousands of hacks that occur on a daily basis yet you want to single out police by doing it for a good cause?

      • Why should it be illegal if they are law enforcement?

        There's no exemption in the law that allows agents of other governments to compromise .us systems.

        We don't go after the thousands of hacks that occur on a daily basis yet you want to single out police by doing it for a good cause?

        You know, that's a fair point. My intention wasn't to say that I think they should be singled out, but rather that what they did should be considered a criminal act, and that their being Australian LEO is completely irrelevant t

    • by Trongy ( 64652 )

      The US could apply to have the foreign citizen extradited to face trial. It would depend on the extradition treaty the two nations have in place.

      e.g. Australian Silk Road employee Peter Nash was extradited from Queensland to face trial in the US.
      Silk Road member Peter Nash avoids further US prison time [smh.com.au]

  • by Anonymous Coward

    What if the cops are actually pedophiles? There are cops that are convicted of child porn. There are 3 in the past decade in Florida alone and most of them worked either with or along side cyber crime units. My guess is they are introduced to it and/or obtain most of it from work. One guy took an entire flash drive of content and kept it in his locked gun case at home. Another guy was jerking off at his desk in the fucking police station when no one was around. Yet another was touching kids in his squa

  • They were running a child pornography website in their own jurisdiction, if that's illegal over there, then they should be prosecuted by their authorities (I think they should, it's disgusting to think police is distributing cp).
    They sent links that directed people outside of the tor network to a "clear web" cp website they also run. People that accepted to go to that website were subjected to the same "privacy" they are subjected to when visiting any other website. If recording visitors ips and sessions is

  • That's what the "Five Eyes" group is primarily for: Hacking citizens in other countries, for those countries.

    So the US spy agencies can not "work" on American citizens without a lot of legal problems. They might suspect someone, but the evidence is weak, to weak to use the normal, legal ways to find out more. So they ask their friends, e.g. the Australians: Could you please hack this guy? For the Aussies, this guy is a foreigner and therefor a legal target. If they find something that would make the person

No spitting on the Bus! Thank you, The Mgt.

Working...