Australian Law Enforcement Hacked US Users' Computers During Child Porn Investigation
from the everyone-just-hacking-everyone-these-days dept
Thanks to the internet, more law enforcement agencies are exceeding jurisdictional limitations than ever before. The FBI's Network Investigative Technique (NIT) -- deployed during a child porn investigation to strip Tor users of their anonymity -- travelled all over the United States and the world beyond. IP addresses and computer information harvested by the FBI were turned over to Europol and details obtained by Motherboard suggested at least 50 computers in Austria alone had been compromised by the FBI's hacking.
Rule 41 imposes jurisdictional limitations on the FBI's hacking attempts -- something the DOJ is trying (and succeeding, so far) to have changed. But the hacking goes both ways. Not only does the FBI go cruising past US borders while tracking down Tor users accessing seized child porn servers, but law enforcement agencies in other countries are doing the same thing -- and raising the same questions.
Australian authorities hacked Tor users in the US as part of a child pornography investigation, Motherboard has learned.
[...]
In one case, Australian authorities remotely hacked a computer in Michigan to obtain the suspect’s IP address.
“I think that's problematic, because they've got no jurisdiction,” Greg Barns, an Australian barrister who practices criminal and human rights law who's also a former national president of the Australian Lawyers Alliance, told Motherboard in a phone call.
It might be problematic, but no one seems all that interested in doing anything about it. No defendants garner less sympathy than those viewing child pornography, and law enforcement partnerships fighting the problem span the globe. No law enforcement agency is going to turn down child porn tips from another agency -- no matter where that agency is located or how it obtained this information.
The issues raised by these extraterritorial searches are likely to only be addressed (inconsistently) by local courts. Legislators aren't interested in restricting the pursuit of child pornographers, and as long as cases are handled locally and setting aside any chances of extradition demands, there's really no compelling reason for them to head off these abuses before they get worse.
The technique deployed by Australian law enforcement does raise a few questions of its own, though. It appears the agency deployed a phishing attack that prompted recipients to click a malicious link that phoned home with user info. The link, though, turned the agency into an actual distributor of child porn, rather than the more passive technique the FBI used when it took over hosting duties for a few weeks after seizing a child porn site's server.
Details on how exactly this was achieved are limited, but according to a court document from another case, “When a user clicked on that hyperlink, the user was advised that the user was attempting to open a video file from an external website. If the user chose to open the file, a video file containing images of child pornography began to play, and the FLA [foreign law enforcement agency] captured and recorded the IP address of the user accessing the file.”
The file was configured in such a way as to route the target’s traffic outside of the Tor network, the document explains.
Seems like a somewhat dubious use of law enforcement resources, but considering undercover officers are able to distribute other contraband (like drugs) in sting operations, it's likely this child porn distribution will be viewed as a lawful part of the agency's investigation.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: australia, child porn, hacking, malware, nit
Reader Comments
Subscribe: RSS
View by: Time | Thread
This is getting serious!
Just wait until fucks like Erdogan figure out he can silence all of this critics by hiring a bunch of black hats to store CP on citizens in foreign countries machines.
If you believe this has not yet happened... go put your fucking head back in the sand so you can take you daily governmental fucking up the ass.
[ link to this | view in chronology ]
Re: This is getting serious!
Was there ever any doubt?
[ link to this | view in chronology ]
Re: This is getting serious!
After all, it's impossible for the accused to prove what link they meant to click on, and we only have the word of an anti-pedophile taskforce that those links said anything at all.
[ link to this | view in chronology ]
And hopefully not TOO important with TOO much clout or the bombs will start dropping.
[ link to this | view in chronology ]
made up krimes with made up victims...
um, how much further down the rabbit hole can we fall ?
[ link to this | view in chronology ]
Re: made up krimes with made up victims...
We are already at the bottom.
The police can accuse you of anything, murder you, or arrest you for resisting arrest and get the fuck away with it.
What does it matter that any additional problems can befall you at that point? This is already enough to destroy lives and families entirely... who gives a fuck if it can get worse, we need relief!
[ link to this | view in chronology ]
Re: Re: made up krimes with made up victims...
Any officer bringing someone into a station where the only charge they have is "They resisted arrest" should be fired on the spot. If they were being arrested for something else and then resisted, then fine. If you can't think of a real reason why they were being arrested though....
[ link to this | view in chronology ]
Re: Re: Re: made up krimes with made up victims...
As for why it hasn't been fixed? Well the police obviously aren't going to object to something that let's them throw their weight around and punish those that don't 'respect' them enough, and most courts and judges bend over backwards to give the police anything and everything they want, because clearly they're the good guys and by definition can't do anything wrong.
[ link to this | view in chronology ]
Re: Re: Re: made up krimes with made up victims...
Here in Canada folks protesters are occasionally arrested for trespassing when occupying a government or corporate office. They can cooperate with police, or they can go completely limp and be dragged away. Neither is resisting arrest. But the slightest amount of resistance is a different matter.
Usually some government or corporate official, to reduce bad publicity, will announce that they're not pressing trespassing charges.
But some protesters find themselves facing "resisting arrest" charges regardless. That its the only charge they face doesn't mean that there wasn't a real reason for the arrest.
[ link to this | view in chronology ]
Re: Re: Re: Re: made up krimes with made up victims...
[ link to this | view in chronology ]
Re: Re: Re: made up krimes with made up victims...
[ link to this | view in chronology ]
Re: made up krimes with made up victims...
[ link to this | view in chronology ]
This is meant to set precedent for hacking info on people they just don't like be it political, protesting, environmental, personal grudges etc.
[ link to this | view in chronology ]
government just needs to obey harder!
The only thing that did separate the two was a moral high ground. I agree that police should be allowed to do sting operations with child pornography (just like other contraband), but it needs to follow the rules and laws as well as preserve evidence chains or you are just like the criminals and should be imprisoned.
[ link to this | view in chronology ]
No hacking, just good police work
1. Queensland Police arrested an Australian man who operated a child porn server, gaining control of the server
2. They moved the server so that it was physically located within Queensland
3. The server was modified such that to download child porn, the server would email a link to the video
4. If a perp opened the email and clicked on a link while *not* using TOR, their IP address was visible. A unique cookie was set as well. The email contained a link to real child porn.
So, no 'hacking' took place. No software was installed/modified on the target computer. If the suspect was located outside of Queensland, then the arrest and analysis of the computers was carried out by the appropriate local police - in USA it appears to be the FBI.
So, no hacking took place, just good police work. To be accused through this QP operation, a suspect had to have (a) a matching email address and an IP address matching the one used to download child porn; (b) the unique cookie installed during the download; and (c) probably one or more pieces of child porn on the computer.
[ link to this | view in chronology ]
Re: No hacking, just good police work
[ link to this | view in chronology ]
Re: Re: No hacking, just good police work
IF they obtained access to a server without the owners knowledge then that is 'hacking' whereas here the owner was fully aware since he gave up the server as part of the arrest with all access codes and other necessary knowledge to control and run the server. This was a honeypot structure pure and simple and under Australian law quite legal, no matter what American law might scream about in regards to problems with the 5th, 4th or even 1st amendment.
[ link to this | view in chronology ]
Re: Re: Re: No hacking, just good police work
Yes, I am perfectly aware that this is what many people think "hacking" means now. I'm simply unwilling to stop fighting the battle against this corruption of the term. At least until we have a new term that can replace the traditional meaning of "hacking".
Here's an excellent essay about the tradition meaning of the word: http://www.catb.org/jargon/html/meaning-of-hack.html
[ link to this | view in chronology ]
Then they hacked the protest groups, and I said nothing because I have privilege.
Then they hacked their rivals, and I said nothing because I agreed with them.
Then they hacked the pedophiles, and I said nothing because pedos are icky.
Now they've hacked everyone everywhere, and I don't dare say anything lest I be whisked off to Reeducation Camp.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]