Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Crime Government Privacy Software The Courts United States Technology

The Feds Are Dropping Child Porn Cases Instead of Revealing Their Surveillance Systems (reason.com) 167

SonicSpike shares a report from Reason: The Department of Justice has been dismissing child pornography cases in order to not reveal information about the software programs used as the basis for the charges. An array of cases suggest serious problems with the tech tools used by federal authorities. But the private entities who developed these tools won't submit them for independent inspection or hand over hardly any information about how they work, their error rates, or other critical information. As a result, potentially innocent people are being smeared as pedophiles and prosecuted as child porn collectors, while potentially guilty people are going free so these companies can protect "trade secrets." The situation suggests some of the many problems that can arise around public-private partnerships in catching criminals and the secretive digital surveillance software that it entails (software that's being employed for far more than catching child predators).

With the child pornography cases, "the defendants are hardly the most sympathetic," notes Tim Cushing at Techdirt. Yet that's all the more reason why the government's antics here are disturbing. Either the feds initially brought bad cases against people whom they just didn't think would fight back, or they're willing to let bad behavior go rather than face some public scrutiny. An extensive investigation by ProPublica "found more than a dozen cases since 2011 that were dismissed either because of challenges to the software's findings, or the refusal by the government or the maker to share the computer programs with defense attorneys, or both," writes Jack Gillum. Many more cases raised issues with the software as a defense. "Defense attorneys have long complained that the government's secrecy claims may hamstring suspects seeking to prove that the software wrongly identified them," notes Gillum. "But the growing success of their counterattack is also raising concerns that, by questioning the software used by investigators, some who trade in child pornography can avoid punishment."

This discussion has been archived. No new comments can be posted.

The Feds Are Dropping Child Porn Cases Instead of Revealing Their Surveillance Systems

Comments Filter:
  • Um ... (Score:4, Funny)

    by Krishnoid ( 984597 ) on Wednesday April 24, 2019 @11:05PM (#58487328) Journal

    Think about the children?

  • by Joe_Dragon ( 2206452 ) on Wednesday April 24, 2019 @11:08PM (#58487336)

    Sixth Amendment "in all criminal prosecutions, the accused shall enjoy the rightto be confronted with the witnesses against him."
    Also what about the Chain of Custody and the right to your own expert?

    • by Anonymous Coward

      IANAL.
      Exactly correct. Technical Barristers use 'Law of Evidence' to reject/purge make legally inadmissible evidence, which could be tainted, legally privileged, or illegally obtained or from an untrusted non verifiable domain. Unless they object, lesser legal representation may let it slip through. In Australia - we even had defence Barristers being police informants!

      The better ones seek to prosecute under perjury, those seeking to slide in tainted evidence, or lying about its source during discovery. few

    • by raymorris ( 2726007 ) on Thursday April 25, 2019 @07:18AM (#58488256) Journal

      Btw the computer program they are talking about is Cellebrite. It's used to copy files, including pictures, off of phones. It can sometimes find recently deleted pictures.

      The question the defense brings up I how do we know that the pictures copied off the phone were on the phone? Since Cellebrite doesn't say exactly how there software copies first from a phone, maybe it fabricates pictures that were never there, they suggest.

      Reason.com has many similar articles arguing against prosecution of child porn and child abuse cases. Like this one, their articles on the subject typically leave out any details, such as what software they are complaining about, case citations, etc.

    • by AmiMoJo ( 196126 )

      How does that work with traffic cameras?

  • by Joe_Dragon ( 2206452 ) on Wednesday April 24, 2019 @11:14PM (#58487362)

    are child pornography case to taboo for your own deference to even have the evidence or to have your own LAB do forensics???

    • by lrichardson ( 220639 ) on Thursday April 25, 2019 @12:17PM (#58489666) Homepage
      Had to laugh at the sheer, utter ineptitude of LE in Illinois a decade or so back. Guy gets arrested at work, dragged out in handcuffs, with the dreaded words 'Kiddie Pr0n' in the wind. Made bail ... but lost job. And, after about nine months, he managed to have a certified technician get access to his machine ... the one he dropped off at Best Buy ... to verify what the 'effing big idjits claimed. Slight problem - he provided a list of the programs on the machine ... which didn't match. There was a mail program, which referenced a completely different name. Which led back to Best Buy who, oops, had identified the wrong owner of the machine. Charges were dropped. One career fairly majorly derailed. And, afaik, not a single repercussion for the boys in blue.
    • are child pornography case to taboo for your own deference to even have the evidence or to have your own LAB do forensics???

      hey, we all know that any ACCUSATION of trafficking in child porn should result in a conviction. That and terrorism too. Trials are just for guilty people to get off.

      Such power would never be abused - government is here to keep us safe, like moms and dads with nukes.

  • by Anonymous Coward

    its just the time in this case is exhorbitant. sending a link to a dropbox to a minor could get you 200k fine and 3.5 years in big boy day camp. they have people robbing and stealing and killing and raping and human trafficking getting pleas and drug court doing a lot worse with minors, with mere slaps on the wrists and minor corporate inconveniences

    • Isn't it a crime for simple possession? How many cases are joe jobs/frame ups?
      So, have an accomplice in Thailand email some in what appears to be a spam so it lands in their junk folder. Then arrange to anonymously report them. They've never seen it, but are guilty nonetheless.

      I've wondered when someone is targeted... do the plant drugs if they have assets to take vs kiddie porn if they're broke? They don't have to show it's yours, that you knew it was there or anything for either one.
      • by WankerWeasel ( 875277 ) on Thursday April 25, 2019 @05:18AM (#58488010)
        That's not the case at all. One has to prove intent. Simply clicking on a link is far from enough. The prosecution has to show the individual had intent to view such images and actively looked for them and consumed them. Source: worked in computer forensics and helped prosecute pedophiles for 10+ years.
        • Which is a good thing. Visit a chan site and you see banner ads for what have to be FBI honeypot sites (and they get cached in your browser).

  • by ugen ( 93902 ) on Wednesday April 24, 2019 @11:17PM (#58487376)

    It is better that ten guilty persons escape than that one innocent suffer. (c)

    • by ugen ( 93902 ) on Wednesday April 24, 2019 @11:21PM (#58487388)

      And to expand on that a bit, from John Adams:
      "It is of more importance to the community that innocence should be protected, than it is, that guilt should be punished; for guilt and crimes are so frequent in this world, that all of them cannot be punished....when innocence itself, is brought to the bar and condemned, especially to die, the subject will exclaim, 'it is immaterial to me whether I behave well or ill, for virtue itself is no security.' And if such a sentiment as this were to take hold in the mind of the subject that would be the end of all security whatsoever"

      I wonder if it's too late.

      • by SirAstral ( 1349985 ) on Thursday April 25, 2019 @01:43AM (#58487686)

        Yes, it is too late. People can only learn this lesson the hard way based on history. There is a reason the tree of liberty must be refreshed from time to time with the blood of tyrants and patriots. There is a reason governments are born and die, because all government is just the winners of wars deciding how they want everyone else to live... or else.

        It is very much is a world of "guilty until proven innocent" and eventually just as you quoted. Virtue is no security and when people finally learn they just are not going to get a fair or honest trial because that is now impossible they will instead abuse and twist the laws to their own ends instead of following them or working to make them better. Instead, they will work to use the law to oppress their opponents or advantage themselves in other ways and care little to not at all about the future in which those very laws they help create are used to oppress or disadvantage them when time comes.

        • by meglon ( 1001833 )

          There is a reason the tree of liberty must be refreshed from time to time with the blood of tyrants and patriots. There is a reason governments are born and die, because all government is just the winners of wars deciding how they want everyone else to live... or else.

          Those two things have nothing to do with each other. Jefferson's quote, so often misused by people who have never even bothered to read the letter it comes from, was stating pretty much exactly the opposite of that. Jefferson was saying that every so often people, either completely ignorant, or completely gullible, would do something stupid like rebel against the government, and at that time governments purpose is to kill as many as is needed to maintain order, then pardon the rest.... and the bigger poi

      • There are videos on YouTube, one is of a guy chopping this dude up, on the streets in public, with a small hatchet. There are 30 or more people standing around pointing their phones at the event. 'To late' is an understatement.

        ...but there's hope in every situation.

      • by GuB-42 ( 2483988 )

        That quote is much better than the simplistic "It is better that ten guilty persons escape than that one innocent suffer".

        That's because if you let a guilty person escape, chances are that more innocent victims will suffer because of his crimes.

    • Going by that sentiment, the author would do well to reserve judgment like "the defendants are hardly the most sympathetic" for those who are actually convicted.
    • by rtb61 ( 674572 )

      Windows update firmware attacks, they are using what they intended for foreign attacks, at home because fat, lazy and stupid junk yard dog law enforcers, creating chaos. Nothing else would stop them from prosecuting because it would cost M$ billions.

    • I'd rather let a thousand guilty men go free then chase them. -- Chief Wiggum
  • They'd have to show their surveillance system if the warrant to grab the computer is questioned. Once you've seized the person's computer, that's the evidence. You wouldn't be expected to show how the original warrant was approved since that's a separate matter. So unless they're dropping exclusively cloud-based crimes that they used intelligence gathering to find or whatever, this doesn't make sense.
    • by Anonymous Coward on Wednesday April 24, 2019 @11:25PM (#58487396)

      Wrong. The original warrant is highly scrutinized. If the method used to obtain the probable cause for the original warrant is challenged and eventually thrown out, every bit of evidence found after the execution of said warrant is deemed âoefruit of the poisonous treeâ.

      Iâ(TM)ve written and executed many search warrants and have performed countless digital forensic examinations.

      • by Joe_Dragon ( 2206452 ) on Thursday April 25, 2019 @12:06AM (#58487500)

        the Geek Squad case set precedent!

      • by BlueStrat ( 756137 ) on Thursday April 25, 2019 @01:13AM (#58487648)

        If the method used to obtain the probable cause for the original warrant is challenged and eventually thrown out, every bit of evidence found after the execution of said warrant is deemed Ãoefruit of the poisonous treeÃ.

        Not 100% true in the US anymore, if it ever truly was, sadly.

        "If officers violate your Fourth Amendment rights through a mistake, the evidence they find may nevertheless be admissible." - The "Good Faith Exception"

        https://www.nolo.com/legal-enc... [nolo.com]

        I guess Blackstone's Formulation as written has become totally intolerable to TPTB when one of their apparent goals is criminalizing as many people as possible then employing selective enforcement to attack their political/ideological/cultural opponents, dissidents, and "deplorables" while giving your allies a pass.

        Blackstone's Formulation in reverse, essentially.

        Strat

        • by Anonymous Coward

          Not 100% true in the US anymore, if it ever truly was, sadly.

          Sadly? I find this "fruit of the poisonous tree" business sad. If valid evidence (not planted etc.) is brought, down you go. No matter how that evidence was collected.

          If officers violate constitutional rights or otherwise break the law, down they go. So they may kick down a door without a warrant, and collect the evidence that lands you in prison. Then the officers doing this go to prison for breaking & entering (they had no warrant) - and of course they cannot be employed as policemen after doing tim

          • If officers violate constitutional rights or otherwise break the law, down they go. So they may kick down a door without a warrant, and collect the evidence that lands you in prison. Then the officers doing this go to prison for breaking & entering (they had no warrant) - and of course they cannot be employed as policemen after doing time. All as it should be.

            That would be ideal, but that is not how it is. A cop can safely confess in court to illegal (i.e. warrentless) Breaking and Entering in court, co

      • by whoever57 ( 658626 ) on Thursday April 25, 2019 @01:20AM (#58487658) Journal

        What if all these cases are linked back to one warrant (or a very small number of warrants) and the Feds don't want to risk the warrant being ruled invalid?

        There might be thousands of cases that could be in jeopardy if the warrants are ruled invalid.

        • What if all these cases are linked back to one warrant (or a very small number of warrants) and the Feds don't want to risk the warrant being ruled invalid?

          There might be thousands of cases that could be in jeopardy if the warrants are ruled invalid.

          What, you mean the government's case against someone might be thrown out on a technicality just the same as someone might be convicted on a technicality? Oh dear! The government that has a monopoly on the power to imprison and execute people held to a high standard? How horrible! /s

          What of Blackstone's Formulation? Would you rather 10 innocent men be convicted rather than risking a single criminal going free? If not 10 innocent men, then how many? What is an acceptable ratio?

          I would hope that your answer wo

    • by znrt ( 2424692 )

      what doesn't make sense to me is that any public service depends on undisclosable software and algorithms. imo that would be unacceptable in any administration in general ... but in criminal justice? this is nuts. so it has come to this already ...

      • Re: (Score:3, Insightful)

        by AHuxley ( 892839 )
        Computer software?
        Was the software collecting on a forum? Web site? On CC use only? On social media? A chat room? On p2p? Police created malware? A GUI pop up for AV software/a system update? A free email service? A free chat/IM service?
        Did it get the MAC? Installed software in the one system/network under surveillance?
        What caused the software doing the collecting to detect a user? A full file name? A file checksum?
        Is it a full checksum? A part of a checksum due to computer limitations?
    • by AHuxley ( 892839 )
      In the USA everyone gets discovery. The only way to keep something that secret is to demand a secure court and lawyers with a security clearance for "spying", gov/mil whistleblowing. Show a need with trade secrets, industrial espionage?
      Criminal court is open to questions by lawyers.
      A lawyer is going to that the "original warrant" and find out if it was an effort by undercover police, police informant, computer software?
  • Fuck (Score:2, Insightful)

    by Anonymous Coward

    Fuck the Feds.

    • You do want a government. Trust me. The alternative is basically Somalia.

      Your government sucks? Get rid of it, get a better one. But you do want one.

  • by rv6502 ( 5793142 ) on Wednesday April 24, 2019 @11:38PM (#58487422) Homepage

    If they can get into the suspects computer to find the files, how difficult is it to plant files on someone's computer by the same means?

    Criminal possession laws (of any kind) are the authorities' work-around to innocent until proven guilty.

    • Very difficult. Computer forensic investigations have to follow a very strict chain of custody and be executed in a specific manner. You're almost never working with a live system but rather a forensic image of the suspect system. Hashing and other safeguards allow the investigators to prove the contents of the suspect drive legitimately but also prevent them from planting evidence. Any attempt to do so would be clear as day to the defense in their own examination.
      • Re: (Score:3, Insightful)

        by Anonymous Coward

        He's talking about trojans and such, which are in a position to inject pain4.jpg on all of your laptops' trashcans months before any forensic hashing takes place. That's original content from there on out.

      • Re: (Score:2, Insightful)

        by Anonymous Coward

        Any attempt to do so would be clear as day to the defense in their own examination.

        Assuming the defendant can afford to pay for such examination. Any court-provided defense attorney is unlikely to be able to hire an expert for their own forensic examination -- and the prosecutors know it.

        Besides, the cops bust someone, take their computers off to the station, make a side stop and put files on the computer, then get to the station and hand it over to the forensic guys. Forensic guy: "Yep, CP on the machine!" Judge: "50 years, you scum."

        Cops (some, but not all) have been proven to plant

    • by strikethree ( 811449 ) on Thursday April 25, 2019 @12:00PM (#58489558) Journal

      If they can get into the suspects computer to find the files, how difficult is it to plant files on someone's computer by the same means?

      Almost all of these investigations kick off because Microsoft's Malicious Software Removal Tool has an MD5 sum (it does SHA256 for newer pictures) of all known child pornography. When it gets a hit, the FBI is notified and the investigation begins.

      TL;DR, Your own computer reports you. They don't HAVE to plant the evidence; although I am sure they will in certain cases.

      • by rv6502 ( 5793142 )

        If that is the case that sounds like a violation of the the Fourth Amendment at the very least in principle.

        Microsoft is operating on behalf and at the request of the government ( Who gave them all those MD5/SHA256 hashes? )

        Probably why they have to drop the cases. They wouldn't want to set a precedent until they find a better loophole.

  • by Anonymous Coward on Wednesday April 24, 2019 @11:39PM (#58487424)

    "found more than a dozen cases since 2011 that were dismissed either because of challenges to the software's findings, or the refusal by the government or the maker to share the computer programs with defense attorneys, or both"

    Sorry, but your secret evidence I'm not allowed to see or challenge how it was collected is, for legal purposes, hear say .. it amounts "we can't tell you your honor but you can trust us".

    Secret evidence you aren't allowed to see usually means it's illegal, or will be used illegally as law enforcement basically lies about their sources.

    • by Anonymous Coward

      Reduced to VPN and torrent providers have been cooperating. And we are also forging certificates so altered P2P are spread widely. It looks like innocent people being fingered for helping TOR connections do their bit.

  • Win10 (Score:2, Interesting)

    by Anonymous Coward

    I bet it's Win10.

    My bet is that the Feds have cut a deal with Microsoft.

    Here's how it works:

    On a regular basis they provide MS with an updated list of file hashes generated from their set of files known to contain CP.

    On Microsoft's slow scrape of all files on the system, or when files are accessed, the hashes of said files are uploaded as "telemetry" and checked against the list. Offenders are identified as best as possible and then the information handed over to the Feds.

    Microsoft only agreed to do this fo

  • by ytene ( 4376651 ) on Thursday April 25, 2019 @03:52AM (#58487878)
    In her book, "On Liberty", former British Government Lawyer and subsequently Director of Liberty (now Baroness Chakrabarti) writes about an event which took place in London in September 2003, the Excel Centre in London's Docklands area was playing hos to the annual "Defence Security and Equipment International exhibition". Chakrabarti describes how the phones in Liberty's London office began to ring off the hook with news that London Police were stopping and arresting significant numbers of people, using "Section 44 of the Terrorisom Act 2000".

    "It was only during the test case that Liberty subsequently brought against the Docklands operation, on behalf of journalist Penny Quinton and protester Kevin Gillan, that we learned that the entire Metropolitan Police area (now Greater London) had been designated on a rolling twenty-eight day basis for eighteen months before the incident and ever since the legislation had come in to force. Like some hideous dystopian sci-fi story, our great capital city had been turned in to a stop-and-search zone."

    This was a rare insight in to the way that (perhaps unwittingly, let us give the benefit of the doubt), the British Police were using an arcane part of a terrorism law to arrest random citizens - I say "random" because thanks to Section 44, the police were not required to show "reasonable suspicion" that any offence had been committed.

    I cite this as an example because all the evidence we have leads us to conclude that the FISA court - and others - are either directly authorizing or "allowing conduct" that any reasonable person would flat-out reject as unacceptable in a stable democracy. The only reason these practices are excused in the first case is because of the "extraordinary threat to national security".

    The same thing will almost certainly happen with the Four Horsemen of the Infocalypse [wikipedia.org] (namely anything involving terrorists, drug dealers, pedophiles and organized crime).

    The idea is a simple one. You want to give your law enforcement agents virtually limitless and sweeping powers. If you did that without justification, public outrage would force a retreat before the masterminds behind such a scheme were thrown out of office. So what you do is "piggy-back" on a convenient piece of "emergency" legislation, then write the rules to be deliberately "imprecise".

    For example, suppose you are a super-aggressive FBI agent and you want to use borderline criminal techniques to monitor pedophiles. You want a promotion, but to get it you're going to have to nail some big cases. Suppose there is a monitoring technique that you might be allowed to use if the suspect was a terrorist [see British example, above] but which you would not be allowed to use if the suspect were a pedophile. So you find a way to "finesse" the possibility of terrorism activity in to your case. The technique used for this step is irrelevant, the goal is simply to find a way of justifying the investigative technique you want to use.

    Just like stingray towers sweep up both suspects and innocent bystanders, there will be techniques that you can use to pick up other activity. We've seen it done. Addresses added to the bottom of a list of properties for a search warrant to be signed by a judge. "Oh, sorry, your honor, I must have added that one to the list by mistake."

    The agents and operators who make up our law enforcement agencies do an incredibly dangerous, difficult and thankless job in trying circumstances - and by and large they need our support. But such support can only reasonably be given when we can have confidence that they are acting with candor, integrity and in strict accordance with the rules of law and due process.

    ANY time a prosecutor declines to proceed with a case rather than divulge the methods used to gather evidence, that should be a red flag to the presiding judge that something irregular may have happened. Tha
    • by dotancohen ( 1015143 ) on Thursday April 25, 2019 @05:01AM (#58487982) Homepage

      You can even take that thought a step further. The United States performs regular targetted assassinations, colloquially called "drone strikes". Are similar methods being used to determine who gets a Predator visit to their wedding?

    • Consider this in a different setting - a civil case, not a criminal case. Imagine one party used illegal practices [i.e. activities not permitted under law] to put the other party at a disadvantage. Imagine that the court found out and found in favour of the disadvantaged party. Would the case stop there?

      It frequently does stop there. Any time a woman misbehaves during a divorce (hiding finances, preventing kids from exercising their rights) the judge merely reprimands here verbally and the case continues. Men don't get away with that sort of thing and the court punishes them for even attempting it.

      So it already happens in civil cases. It's nothing new.

  • by sad_ ( 7868 ) on Thursday April 25, 2019 @07:02AM (#58488214) Homepage

    maybe those dropped cases are from innocent people, as the tech is not perfect but they identified them as wrongly accused and there is no longer a need to continue with the case.

BLISS is ignorance.

Working...