Showing posts with label FBI. Show all posts
Showing posts with label FBI. Show all posts

Friday, October 4, 2013

Recent News: Lavabit, Silk Road, and Calif. revenge porn bill

Lavabit used 4-point type in attempt to prolong Snowden SSL key release
Edward Snowden's e-mail provider, now-defunct Lavabit, attempted to defy the government's request for Snowden's SSL keys by printing the 2,560 characters in 11 pages of 4-point type. That way, the FBI would have to retype the key manually. Read more from Wired.

Silk Road closed by FBI, others promptly take its place
The FBI shut down Silk Road earlier this week, but the Huffington Post reports that many alternatives exist, and black market vendors have already made the move.
“I am now offering all of my inventory at a discounted rate due to the fall of SR!” wrote [a] vendor at Black Market Reloaded.
Read past Cybercrime Review posts about Silk Road here.

California bans revenge porn
California governor Jerry Brown recently signed into law a bill that could punish violators with up to six months in jail and a $1,000 fine for posting revenge porn. Revenge porn is when a person posts sexual photos of an ex on the Internet in an act of revenge.

Read more about the law from CNN, and more about revenge porn in an earlier Cybercrime Review post.

Monday, August 12, 2013

Second LulzSec hacker sentenced in California federal court

According to a press release issued by federal prosecutors on Thursday, August 8, 2013,  Raynaldo Rivera (known online as "neuron") "was sentenced  . . . to one year and one day in federal prison for participating in an extensive computer attack that compromised the computer systems of Sony Pictures Entertainment." According to the release, District Judge John A. Kronstadt with the Central District Court of California ordered Rivera to "13 months of home detention, to perform 1,000 hours of community service and to pay $605, 663 in restitution," in addition to his prison sentence. Rivera is the second member of the "hacking group" to be sentenced for involvement in the Sony Pictures hack, which exposed online the personal information of over 130,000 individuals.

According to a press release by the Federal Bureau of Investigations back on August 28, 2012, Rivera surrendered to authorities after a sealed indictment was issued by a federal grand jury on August 22, 2012. The FBI press release briefly described the indictment, as follows
The indictment alleges that in order to carry out the attack, Rivera allegedly used a proxy server in an attempt to mask or hide his Internet protocol (IP) address. The indictment alleges that Rivera and co-conspirators, including defendant Cody Kretsinger, who was indicted in September 2011 in connection with the same intrusion, obtained confidential information from Sony Pictures’ computer systems using an SQL injection attack against its website. An SQL injection attack is a technique commonly used by hackers to exploit vulnerabilities and steal information. The indictment alleges that Rivera and his co-conspirators distributed the stolen information, including by posting the data on LulzSec’s website, and by announcing the attack via its Twitter account.
Rivera would plead guilty in October 2012 for conspiring to cause damage to a protected computer. As the recent press release details, Kretsinger (known online as "recursion") was sentenced by Judge Kronstadt back in April. Kretsinger's sentence, which was similar to the Rivera order, was also detailed in the recent press release
In addition to [a prison term of one year and one day], Judge Kronstadt ordered Kretsinger to serve one year of home detention following the completion of his prison sentence, to perform 1,000 hours of community service, and to pay $605,663 in restitution.
Author's Note: For a little more information about the Sony Pictures hack by LulzSec (and a great read), I would suggest Parmy Olson 2012 book, We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency.

Friday, June 7, 2013

The Verizon FISA Court Order, the PRISM Program, And a Whirlwind Of Commentary: A Look Back At An Eventful Two Days

Late Wednesday night, news from The Guardian broke of a leaked top secret order from the Foreign Intelligence Surveillance Court (FISC), which granted the National Security Agency (NSA) “on going daily” access to all "call detail records" (or “telephony metadata”) in the possession of Verizon Business Network Services for a three-month period. Thursday evening, The Washington Post released presentation slides detailing the NSA and FBI’s PRISM Program, a top-secret program that enabled these government entities the ability to extract mass amounts of stored data maintained by nine major US internet companies. Through source materials, commentaries, and the articles themselves, I've attempted to chronicle the events over the past two days.


Wednesday, June 5, 2013

The FISA Court Order Breaks . . .
Glenn Greenwald, NSA Collecting Phone Records of Millions of Verizon Customers Daily, The Guardian: Greenwald reports of a leaked FISA Court Order, which grants the NSA  3-month access to Verizon Business Network Services' daily phone metadata. The FISA Court Order is authorized under the Foreign Intelligence Surveillance Act (FISA), 50 U.S.C. 1861 (better known as Section 215 of the USA PATRIOT Act).
Responses To The Greenwald Article Begin . . .
Andy Greenberg, NSA's Verizon Spying Order Specifically Targeted Americans, Not Foreigners, Forbes: Greenberg provides some of the first commentary on the leaked FISA Order, explaining the significance of the NSA specifically targeting Americans.
Charlie Savage & Edward Wyatt, U.S. Is Secretly Collecting Records of Verizon Calls, The New York Times: Savage and Wyatt comment on the FISC Order, explaining that the “TOP SECRET//SI//NOFORN” mark on the Order refers to "communications-related intelligence information that may not be released to noncitizens . . . mak[ing] it among the most closely held secrets in the federal government."
Orin Kerr, Is Verizon Turning Over Records of Every Domestic Call to the NSA?, The Voloch Conspiracy: Professor Kerr, Professor at George Washington University and computer crime expert, comments on the Leaked FISA Court Order, calling it "potentially a huge story," and provides some doctrinal points as to the scope of Section 1861.
Thursday, June 6, 2013 
 
Responses To Greenwald's Article Continue . . .
Marc Ambinder, U.S. Responds to NSA Disclosures, The Week: Ambinder provides the talking points released by a "senior government official" in response to the leak of the FISA Court Order. The comments refers to the Orders as "classified," but states that the information described in Greenwald's article "has been a critical tool in protecting the nation from terrorist threats to the United States."
From the Desk of Randy Milch, Verizon Policy Blog: While Verizon has been generally silent since the leak, Verizon's Policy Blog releases a letter from Randy Milch, Verizon's Vice President and General Counsel, claiming "no comment" while referencing the Order's "nondisclosure requirement."
Chairman Dianne Feinstein (D-Calif.) & Vice Chairman Saxby Chambliss, Feinstein, Chambliss Statement on NSA Phone Records Program, Press Release: Senate Intelligence Committee Chairman Dianne Feinstein and Vice Chairman Saxby Chambliss release a joint statement commenting on Greenwald's article, claiming that "[t]he executive branch’s use of [its authority under the Foreign Intelligence Surveillance Act] has been briefed extensively to the Senate and House Intelligence and Judiciary Committees, and detailed information has been made available to all members of Congress prior to each congressional reauthorization of this law."
Representative Jim Sensenbrenner (R-Wis 5th), Letter to Attorney General Eric Holder: Rep. Sensenbrenner, considered the Republican author of the PATRIOT Act, writes a letter to the Attorney General stating that the FISA Court Order is "extremely disturbing." Rep. Sensenbrenner would go on to state that he does not believe the Order "is consistent with the requirements of the [PATRIOT] Act."
Andy Greenburg, Senators Grill Attorney General Holder On Whether Verizon Surveillance Targeted Them, Too, Forbes: Greenburg reports that, while testifying before Congress on budgetary matters, Attorney General Eric Holder is questioned on the leak. Senator Mark Kirk (R-Ill.) is reported as asking the Attorney General, “Can you assure us no members of the Capitol building were monitored?” The Attorney General responds by saying he "wouldn’t be able to answer that question in an 'open forum.'"
Stewart Baker, The FISA Court Order Flap: Take a Deep Breath, Skating on Stilts Blog: Baker defends the legality of the FISA Court Order, explaining that to get such an order, "[t]he government had to persuade up to a dozen life-tenured members of the federal judiciary that the order [was] lawful." Baker additionally provides multiple scenarios as to why such an order would be so sweeping and so broad.
The PRISM Program Breaks . . .
Barton Gellman & Laura Poitras, Documents: U.S. Mining Data From 9 Leading Internet Firms; Companies Deny Knowledge, The Washington Post: In a story that looks to be released in tandem with another Guardian article, Gellman and Poitras provide a "top-secret document" that details "PRISM," a NSA and FBI program that allows these government entities access "into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track one target or trace a whole network of associates." The companies include Google, Facebook, Microsoft, Yahoo, Skype, YouTube, and Apple. 
Responses Continue To The PRISM Program & FISA Court Order . . .
Orin Kerr, NSA and FBI Have Real-Time Access to Major U.S. Internet Companies to Track Individuals Outside U.S., The Volohk Conspiracy: Professor Kerr comments on the PRISM Program. In his comments, Professor Kerr provides an important "caveat," stating that "the NSA only pulls out the data when  . . .  a preponderance of the evidence indicates that the person is outside the United States."
Director James R. Clapper, DNI Statement on Recent Unauthorized Disclosures of Classified Information, Press Release: Director of National Intelligence James Clapper (who will likely need to make another statement now that PRISM has been disclosed) issues a press release in light of the FISA Court Order leak. Director Clapper states that "[t]he unauthorized disclosure of a top secret U.S. court document threatens potentially long-lasting and irreversible harm to our ability to identify and respond to the many threats facing our nation."  
Amir Efrati, Jessica E. Lessin & Jennifer Valentino-Devries, Tech Firms' Data Is Also Tapped, The Wall Street Journal; Following on the heels of Director Clapper's statements, Efrati, Lessin, and Valentino-Devries confirm that the White House "acknowledged the existence  . . . of a secret National Security Agency program dubbed Prism." The article claims that the disclosure was by a "senior administration official" who clarified that the Program "targets only foreigners and was authorized under U.S. surveillance law." 
Hopefully this post will provide you with some of the key developments of yesterday's PRISM Program and FISA Court Order leaks. The true impact that these stories may have, however, will most assuredly take longer than two days to develop.

[Author's Note: Speaking of developments  . . . Later amendments to Gellman's article and disclosures by these internet companies indicate that the accessed company data was (or is) not "direct." This post has been edited to reflect the adjustment.]

Wednesday, May 29, 2013

Wisconsin federal magistrate reverses on forced production of decrypted data after government presents new evidence

Late last month, a federal magistrate judge denied the forced production of decrypted data from a defendant's hard drives. Last week, the judge changed his mind after the government presented new evidence.

In the initial order, the court made the "close call" to deny the production because the government did not have enough evidence concerning the defendant's access and control, nor did they actually know what was on the hard drives, though some file names indicated the presence of child pornography.

Since that time, the FBI was able to decrypt one of the drives which contained over 700,000 files including "numerous files which constitute child pornography." It also contained "detailed personal financial records and documents belonging to" the defendant and "dozens of personal photographs" of him.

The judge determined that this new evidence makes it a "foregone conclusion" that the defendant has "access to and control over the encrypted storage drives." As such, the defendant was ordered to "enter the appropriate password ... so as to decrypt those drives" or to otherwise make "available for [law enforcement's] examination a decrypted copy of the data."

Tuesday, May 28, 2013

A deeper look at United States v. Vargas, the case concerning the NYPD detective accused of violating the CFAA

The recent allegations against New York Police Department detective Edwin Vargas have been making headlines recently, and were the subject of a recent press release by the U.S. Attorney's Office for the Southern District of New York. The press release announced that on May 20, 2013, a complaint was filed in the Southern District of New York alleging that Vargas had committed two offenses under the Computer Fraud and Abuse Act, 18 U.S.C §1030.  Below, I take a look at the two counts and offer some thoughts on the "Unlawful Access of Law Enforcement Database" allegation (count two).

The first count alleges that Vargas and other “known and unknown" defendants "willfully and knowingly combined, conspired, confederated, and agreed together and with each other to engage in computer hacking.” Specifically, the complaint alleges that Vargas conspired with individuals associated with an "e-mail hacking service" to violate §1030(a)(2)(C). That section under the CFAA, for context, states in relevant part
Whoever . . . intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains . . . information from any protected computer . . . shall be punished as provided in subsection (c) of this section. 
The CFAA also provides as an offense, in §1030(b), any attempted violations or conspiracy to commit violations of the Act. According to the complaint, Vargas “paid certain e-mail hacking services to hack into numerous e-mail accounts . . . in order to obtain the log-in credentials for those accounts.” The complaint continues
In total, Vargas ordered hacks of at least 43 personal e-mail accounts belonging to at least 30 different individuals including 21 who are affiliated with the NYPD; of those 21, 19 are current NYPD officers, one is a retired NYPD officer, and one is current NYPD administrative staff. Vargas accessed at least one personal email account belonging to a current NYPD officer after receiving the account's log-in credentials from the hacking service. 
While the first count contains allegations that one would typically associate with a criminal hacking statute like the CFAA, the second count is a bit more interesting. According to the allegations in the complaint, Vargas
intentionally and knowingly accessed a computer without authorization and exceeded authorized access and thereby obtained information from a department and agency of the United States, [specifically], Vargas accessed, and obtained information from the federal National Crime Information Center ("NCIC") database, without authorization, and exceeding the scope of his authority. 
Vargas’ alleged actions are believed to have violated §1030(a)(2)(B) of the CFAA, which states in relevant part
Whoever . . . intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains . . . information from any department or agency of the United States . . . shall be punished as provided in subsection (c) of this section. 
This allegation centers on Vargas accessing the NCIC database to gain information on fellow NYPD officers (referred to as “Victim 2” and “Victim 3” in the complaint). According to the complaint, FBI Special Agent Samad Shaheani states
From my discussions with NYPD representatives, I have learned that on or about November 5, 2011, Edwin Vargas . . . accessed the NCIC database and obtained information about Victim 2 and Victim 3. Based on my review of the records provided by the NYPD, I have learned that at the time that he accessed the NCIC database, Vargas was in his precinct in the Bronx. I have learned that Vargas did not have authorization to perform those searches or to access that information about Victim 2 or Victim 3. 
Much of the complaint focuses on the e-mail hacking allegations featured in the first count. However, I have my reservations on whether the second count can hold up. I recently reported on a Southern District of New York case, JBCHoldings v. Pakter, in which the court applied a narrow interpretation of “without authorization” and “exceeds authorization.” As I stated,
In applying the plain meaning of the term “without authorization” the court found that “an employee ‘accesses a computer without authorization’ when he does so without permission to do so. This definition plainly speaks to permitted access, not permitted use.” The court also found the CFAA’s statutory definition of “exceeds authorized access” was inherently similar to the plain meaning of “without authorization” stating, “[b]y its plain terms, this definition also speaks to access, not use.” 
A similar application might come into play in the case against Vargas. While JBCHoldings was a civil case, the court's application of “without authorization” and “exceeds authorized access” might hold some weight as this case moves forward (however, as the court JBCHoldings observed "[d]istrict courts within the Second Circuit have taken opposing views [as to the meaning of “without authorization” and “exceeds authorized access]”). Its true that Vargas might not have had “authorization to perform those searches” or to “access that information,” as the complaint alleges, but the question to consider would be whether Vargas, as in NYPD detective, was generally given access through his employment to use the the NCIC system. Did Vargas simply misuse the information from the NCIC system that he had the right to access through his employment? If so, that might make the second count against Vargas a bit more challenging. I’ll be interested to see how this case progresses.

What do you think? Feel free to sound off in the comments.

Wednesday, May 8, 2013

Breaking: Fed. judge denies motions to suppress in Rigmaiden; 4th Amendment, SCA case with Stingray use by FBI (Updated)

In United States v. Rigmaiden, No. 2:08-cr-00814-DGC (D. Ariz. May 8, 2013), a federal district judge in Arizona denied all of the defendant's motions to suppress. The motions were related to searches, the FBI's use of Stingray, access to stored communications and IP addresses, etc. It is long, but worth the read. An excerpt (relating to the Fourth Amendment argument):
Given the unique circumstances of this case and the case law discussed above, the Court concludes that Defendant did not have a legitimate expectation of privacy in the aircard, laptop, or apartment procured through fraud. Defendant acquired these items by invading the privacy of the persons from whom he stole names, social security numbers, credit cards, and driver’s license numbers. Having utterly disregarded the privacy rights of Travis Rupard, Steven Brawner, and Andrew Johnson, not to mention the many other names used in his scheme, Defendant cannot now credibly argue that he had a legitimate expectation of privacy in the devices and apartment he acquired through the fraudulent use of their identities.
An excerpt (relating to the SCA argument):
Courts have rejected Defendant’s arguments that historical cell-site records cannot be obtained under the SCA. See, e.g., In re Application of U.S., 620 F.3d 304, 313 (3rd Cir. 2010) (holding that cell-site location information “is obtainable under a § 2703(d) order”); United States v. Graham, 846 F.Supp.2d 384, 396 (D. Md. 2012) (“It is well established that Section 2703(c)(1)(B) of the Stored Communications Act applies to historical cell-site location data.”); see also United States v. Skinner, 690 F.3d 772, 777 (6th Cir. 2012) (holding that locating defendant through a phone’s cell-site records is not a Fourth Amendment search). Contrary to Defendant’s arguments, federal courts consistently rely on Smith and Miller to hold that defendants have no reasonable expectation of privacy in historical cell-site data because the defendants voluntarily convey their location information to the cell phone company when they initiate a call and transmit their signal to a nearby cell tower, and because the companies maintain that information in the ordinary course of business. See United States v. Ruby, No. 12CR1073 WHQ, 2013 WL 544888, at *6 (S.D.Cal. February 12, 2013); Jones, 2012 WL 6443136, at *5 (D.D.C. 2012); Graham, 846 F.Supp.2d at 397-401; United States v. Madison, No. 11-60285-CR, 2012 WL 3095357, at * 8-9 (S.D.Fla. July 30, 2012).
...
Defendant argues that the government was able to use the cell-site information to effectively track his aircard from June 10 to July 18, 2008, a period of 38 days, and that this “prolonged surveillance” implicated his reasonable expectation of privacy. Doc. 824 at 215- 17. Defendant relies on United States v. Maynard, 615 F.3d 544 (D.C. Cir. 2010), and United States v. Jones, 132 S.Ct. 945 (2012), but those decisions are inapposite. They do not address orders under the SCA, and the Supreme Court in Jones did not adopt the privacy theory advanced by Defendant.
...
In this case, a government agent, working in his office with the historical cell-site information and using mathematical and triangulation techniques, was able to calculate a general location for Defendant’s aircard during a 38-day period. The calculation narrowed the location of the aircard to one-quarter of a square mile. The Court cannot conclude that such use of cell-site information, obtained from a third party under the SCA, is tantamount to attaching a GPS device to a person’s vehicle. Calculations made from the historical cell- site information did not provide minute-by-minute intelligence on Defendant’s precise movements as did the GPS device in Maynard. The calculations merely identified a general area where the aircard was located – and stationary – for 38 days. The information was not used surreptitiously to track Defendant’s movements over an extended period without a warrant. 
For some background, see:

--Kim Zetter, Wired, Secrets of FBI Smartphone Surveillance Tool Revealed in Court Fight

--Vanessa Blum, The Recorder, Emails Detail Northern District's Use of Controversial Surveillance

Update 1:

--Here is the EFF/ACLU Amicus Brief in the case

Update 2:

--Kim Zetter's new post is up: Judge Allows Evidence Gathered From FBI’s Spoofed Cell Tower

Update 3:

--Orin Kerr has his take up, here: District Judges Divide on Long-Term Cell Phone Tracking Under the Fourth Amendment (he also discussed Powell another SCA/4th Amendment case)

Tuesday, April 30, 2013

Jury: School principal Weindl not guilty of CP charges; case arose after FBI agent left spyware on son's school laptop

From the Saipan Tribune (2/13/13): Weindl found not guilty:
A federal jury yesterday found former Whispering Palms School principal Thomas Weindl not guilty of charges of accessing child pornography websites using a Public School System-issued laptop.
For those unfamiliar with the case, here is my description from a previous post:
In United States v. Weindl, __ F.Supp __ (D. N.M.I. Nov. 20, 2012), a Northern Mariana Islands federal district court denied suppression of evidence obtained when spyware installed on school-owned laptop (assigned to an FBI agent's son and later used by the principal) sent child pornography (CP) reports (alerts) to the FBI agent - evidence that led to charges against the school principal (two counts of receiving CP and two counts of possession of CP). There are three relevant issues in the case: (1) whether the act of "accidental" failure to remove the spyware resulted in an "inadvertent search" or an intentional one, (2) whether the FBI agent was acting under the color of law when he opened and later investigated the reports he received from the spyware, and (3) whether Weindl had standing to assert a reasonable expectation of privacy in the spyware reports. 
I had a chance to speak via email with Weindl's attorney, David Banes, last night; Banes indicated that he believed the turning point in the case was the testimony of his computer expert. He also mentioned that "we were able to show that the alleged porn sites constantly changed content" making it hard for the prosecution to prove that what Weindl allegedly browsed and viewed (at time A) was the same content when the page was accessed (assumedly by prosecutors) to serve as a basis for the charges (and evidence at the trial) (at time B). Finally, Banes noted that the defense was able to put on convincing evidence that eBlaster reports are not designed to be used as forensic evidence.

My previous posts on the case can be found below:

11/28/2012 - Principal caught with CP when FBI agent returns son's school laptop with spyware still on it; court denies suppression

12/3/2012 - Weindl - FBI agent spyware v. principal attracts attention and misinformation

12/5/2012 - Weindl (FBI agent's spyware vs. principal) - Why the court got it wrong

Jeffrey's differing take can be found here:

12/7/2012 - Weindl: Why the court got it right, and the FBI agent/father shouldn't be viewed as a government agent

Kashmir Hill at Forbes also wrote it up, here:

11/30/12 - An FBI Dad's Misadventures With Spyware Exposed School Principal's Child Porn Searches

Tuesday, December 11, 2012

FBI job applicant fails polygraph, admits to CP possession, and asks if it would slow his application. It did.

Working for the Federal Bureau of Investigation is a dream of many Americans. The famed agency has - rather understandably - a difficult hiring process including a polygraph. I'm assuming questions concern possible crimes the job candidate has committed as well as generally making sure they are not a threat to national security.

When Dominick Pelletier appeared for a job interview with the FBI, he was escorted to the polygraph room where the types of questions were explained to him. Pelletier became nervous about the potential for questions about sex crimes as he had done research on child pornography in a different country. He was assured that the questions would only concern whether he possessed or distributed child pornography, and the test was administered.

Much to his dismay, he failed the polygraph. Explaining the situation, he said that he had seen child pornography images as part of his research. The FBI agent remained calm, and Pelletier continued to think he was in consideration for the position. FBI agents continued to ask him questions, and he admitted to possession of "child erotica" at home.

After refusing to allow FBI to accompany him to his home, Pelletier ultimately signed a consent form after being told they would just get a search warrant anyway. He remained at the office, never asked to leave or to speak with an attorney, and apparently still thought he would be considered for the job. Unfortunately for him, he didn't get the job, and more than 600 images of child pornography were found on his computer.

Pelletier was ultimately convicted of possession, and he appealed, arguing that "he was entitled to Miranda warnings and did not receive them" and that his consent to search was involuntary.

The Seventh Circuit held that Miranda rights were not necessary as Pelletier was not in custody. The lengthy time at the office, encounters with armed agents, and security measures were all a part of the job application process - and were not a result of his suspected criminal activity. "Pelletier was friendly and talkative throughout the day ... and asked at the end of the interview whether his possession of child pornography would slow his job application process."

The court also did not address the consent issue as they determined probable cause allowed for a search warrant which protects the evidence under the inevitable discovery doctrine.

As a side note, it is always a pleasure to read a Seventh Circuit opinion. Judge Kanne began the opinion:
Federal investigative agents will tell you that some cases are hard to solve. Some cases require years of effort—chasing down false leads and reigning in flighty witnesses. Others require painstaking scientific analysis, or weeks of poring over financial records for a hidden clue. And some cases are never solved at all—the right witness never comes forward, the right lead never pans out, or the right clue never turns up.
This is not one of those cases.
I'm always a little appreciative of a judge (and a clerk, of course) willing to be a little creative with their legal writing.

The case is United States v. Pelletier, No. 12-1274 (7th Cir. 2012).

Friday, December 7, 2012

Weindl: Why the court got it right, and the FBI agent/father shouldn't be viewed as a government agent

You'll have to forgive my co-blogger and me for turning our blog into a blog almost entirely about this Weindl case (United States v. Weindl, No. 1:12-CR-00017 (D.N.M.I. 2012), but as you're probably well-aware by now, it's an important case on the issues presented - and one likely to be appealed to the Ninth Circuit after the trial.

It's not often that Justin and I disagree. But in this case, while I find noble his attempt to argue for strengthened privacy rights under the Fourth Amendment, I cannot say that I find his reasoning compelling (see his previous posts here, here, and here). Justin argues that FBI Agent Auther left eBlaster on the computer intentionally because he suspected Weindl of "questionable activities," which apparently means that Auther knew that not only would Weindl fail to return the computer to the proper place, but that he would also watch child pornography on it. Perhaps Auther's training and experience gives him a sixth sense about such things, but it just doesn't seem likely. What is more likely is that he simply thought eBlaster had been deleted (after all, he did try to have all data removed twice), and he returned the computer as he was supposed to have done. Does law enforcement always comply with the Fourth Amendment? No. Does this seem like a case of an agent trying to circumvent the Fourth? Not really.

The issue that Justin and many others are raising and focusing on is the fact that Auther is an FBI agent. Yes, he is that, but he's also a parent, and as a parent, he should have the right to protect his children from content he doesn't think they should be viewing. That was his intent in installing eBlaster on the computer (unless it was an elaborate attempt to catch the principal beginning months before he even knew the computer would be returned). Who cares if he didn't own the computer? The school shouldn't be allowed to give students computers, and then tell parents that they're not allowed to attempt to prevent their children from viewing pornography, learn how to make meth, or whatever else kids do on computers nowadays. If Auther didn't want his son doing illicit activities, and this was the method he chose to make sure that didn't happen, then good for him. The point is that he didn't install it because he worked for the FBI nor did he install it for the purpose of wiretapping or searching Weindl's activities - he did it because he felt it was the best method for protecting his son.

So let's suppose Auther wasn't an FBI agent. "New Auther" is a grocery store manager, a father of three, happily married for 16 years. Semi-religious, and though not entirely opposed to the viewing of pornography, he thinks that his oldest son (in his mid-teens) is too young to be viewing it. He asks a co-worker what he can do, and the co-worker suggests eBlaster. He then downloads it and installs it on the computer where it sends him reports for the next few months. When New Auther is transferred to a grocery store in another state, he asks his computer friend/co-worker to remove all of his son's files. The co-worker is unsuccessful. He takes it to a computer store where they "reimage" it, making him think the computer has received a fresh start, free of eBlaster and everything else. He then returns the laptop to the school's principal, an acquaintance (not buddies, but something above Facebook friends). A couple weeks later, New Auther gets four eBlaster reports showing that the computer is now being used to view child pornography.

Those are essentially the same acts of real Auther, and those are the reports that the court refuses to suppress. After that point, Auther's actions do arguably cross the line into a government search. But those actions of a concerned parent that looked at the e-mails he received - those actions could have come from anyone - FBI agent or not. It is irrelevant that he opened all of the e-mails he received  - even if there were four of them. This was a mistake by someone who happens to also have a full-time job as a government agent, as opposed to a government agent who happens to make a mistake (and even that doesn't always warrant suppression thanks to good faith and other exceptions). This was not the case of Big Brother installing spyware on everyone's computers in order to capture our Internet activity (as if they actually need to go through that much trouble!).

Justin also argues that Weindl "certainly was not doing anything illegal." The computer loan program was a federally funded program to give students laptops for educational purposes. My guess is that under the terms of the grant, each laptop had to be accounted for at all times, and they probably are not allowed to just loan the computers out to anyone. By policy, they were only given to students and were never given to faculty. Anyone - especially the principal of the school - should have known that it went against the terms of the grant for a non-student to take possession of the laptop. My guess is that Weindl is smart enough to know that in taking possession of property purchased with federal government money and choosing to use it for personal purposes (especially viewing child pornography!), he's probably violating some sort of law for that possession.

There is something that my co-blogger and I agree on - I absolutely agree that the installation of eBlaster onto a person's computer without their knowledge and permission is a wiretap, in violation of the federal Wiretap Act. Where Justin and I would differ, however, is whether Auther's actions were intentional (as the Act requires). He thinks Auther intentionally left eBlaster on the computer in order to intercept Weindl's activity. I, however, would likely come down on the other side.

And... done. Are we finished talking about Weindl? Maybe.

Monday, December 3, 2012

Weindl - FBI agent spyware v. principal attracts attention and misinformation

Since I wrote about United States v. Weindl on November 28th, Principal caught with CP when FBI agent returns son's school laptop with spyware still on it; court denies suppression, the story was picked up by Kashmir Hill at Forbes (by way of Eric Goldman), An FBI Dad's Misadventures With Spyware Exposed School Principal's Child Porn Searches, and from there spread like wildfire to various other sites.

Today, Robert X. Cringely, on his Infoworld blog "Notes from the field" highlighted the story as well - School for scandal: FBI spyware nabs pervy principal. In the story, he states:
When spooks spy on their kids -- and happen to ensnare adults doing things they shouldn't -- isn't that illegal spying? I asked cyber lawyer Jonathan Ezor, Director of the Touro Law Center Institute for Business, Law and Technology in Islip, New York. 
Though Ezor cautioned that he is not a criminal attorney, he says Auther's discovery of Weindl's dark deeds probably falls under the "in plain sight" exception for evidence. If you open the door for the cops and they see a big pile of cocaine sitting on your coffee table, they have every right to break down the door, then seize you and the drugs, no warrant required. 
The more important issue, says Ezor, was what the feds told Weindl when they sat down with him in his office and whether they read him his rights. That might have a greater bearing on whether his Fourth Amendment rights were violated. 
On the other hand, Justin P. Webb of the CyberCrime Review blog says the court was wrong across the board (though he's saving his reasons why for a future blog post).
Two things:

(1) With all due respect to Jonathan Ezor, he clearly did not read the case. As I stated in my write-up, the court expressly dismissed the plain view exception to the warrant requirement. You cannot argue for plain view when you are somewhere you weren't authorized to be. Further, and as the case states specifically, Weindl was not read his rights" when [the the two FBI agents] sat down with him in his office." Most importantly: the significant implications of the case, which Weindl's attorney assured me will reach the the 9th Circuit, do not revolve around the interrogation, but the search.

(2) Cringely is correct to note that I believe the Weindl opinion was wrong across the board. While my post on that issue is not up yet, it will be within 48 hours.



Wednesday, November 28, 2012

Principal caught with CP when FBI agent returns son's school laptop with spyware still on it; court denies suppression

This case will be discussed in two posts.

In United States v. Weindl, __ F.Supp __ (D. N.M.I. Nov. 20, 2012), a Northern Mariana Islands federal district court denied suppression of evidence obtained when spyware installed on school-owned laptop (assigned to an FBI agent's son and later used by the principal) sent child pornography (CP) reports (alerts) to the FBI agent - evidence that led to charges against the school principal (two counts of receiving CP and two counts of possession of CP). There are three relevant issues in the case: (1) whether the act of "accidental" failure to remove the spyware resulted in an "inadvertent search" or an intentional one, (2) whether the FBI agent was acting under the color of law when he opened and later investigated the reports he received from the spyware, and (3) whether Weindl had standing to assert a reasonable expectation of privacy in the spyware reports.

I believe this case was wrongly decided on the all three issues. I contacted David Banes, the lawyer for Weindl, and he (not surprisingly) agrees as well. He indicated that his client "fully intend[s]" to appeal this denial of suppression after the case goes to trial (it does not look like the judge will allow a conditional plea).

In this first post, I will give a summary of the case. In the second post, I will argue why the court erred in its holding.

Summary 

The defendant Thomas Weindl ("Weindl") was a school principal at Whispering Palms public school in Saipan, Mariana Islands. The FBI agent whose actions gave rise to this case is Joseph Auther ("Auther"). Auther's eldest son was enrolled at Whispering Palms, and was assigned a laptop during his time there. Auther kept an eye on his son's use of the laptop by purchasing and installing eBlaster on the laptop (without his son's knowledge). eBlaster sent email reports directly to Auther, with keystrokes, internet sites visited, and a plethora of other information. The report in Auther's inbox "would give the subject as 'Report,' followed by the date and time span of covered activity."

Auther was reassigned to a different FBI office in April 2012 and as part of the moving process, returned the laptop to the school, and more specifically, handed it over to Weindl. Auther did not tell Weindl about eBlaster, apparently assuming that it had been removed, but had told Weindl (prior to turning it in) that he would wipe the machine. Auther did in fact attempt to wipe the machine, but failed. The court describes Auther's actions as follows:
The first step Auther took to service the laptop was to bring it into the FBI office and ask fellow agents for advice on how to wipe it clean. They tried to remove all the files but were unsuccessful. Next, . . . Auther asked a local computer store to repair a scratched screen and wipe off all the files on the laptop's hard drive. The store's service order (Ex. 1) lists the work to be done as "Reimage" and the work performed as "Clean out files." Auther did not tell the technician about eBlaster, but he expected that the cleaning would eliminate the program. 
As stated previously, eBlaster was not, in fact, removed. After handing the laptop over, Auther did not receive any emails from eBlaster for over six days. On the seventh day, Auther received four emails from eBlaster indicating someone was using the laptop to access child pornography. The emails had subject lines, as described above, that clearly indicated that they were regarding activity that occurred after Auther turned in the laptop. Auther viewed all four emails, nonetheless. Auther hypothesized that the activity could be from a virus, another student using the laptop, or Weindl himself. He thought of Weindl because the pornography searched for was of young asian children with older adults and Weindl had recently married a Korean woman and now had an 11-year-old stepdaughter.

At this point, Auther did not report the results of the reports to authorities, but instead called Weindl under false pretenses, acting as if he would like to purchase the laptop. Weindl indicated that he had given it back to the school laptop agency (PSS), and that Auther wouldn't be able to buy it. Auther did not indicate that he had received CP reports, or that eBlaster was apparently still on the computer. Auther's reasoning was:
. . .that he did not want to raise concerns in Weindl's mind about who was using the computer or about a possible investigation involving Whispering Palms teachers and students. . . . [H]e was concerned that the Internet activity might mean that a child molester was operating at Whispering Palms. He was aware that a former coach at Pennsylvania State University had just been convicted on child molestation charges, and he was determined not to allow similar conduct to go undetected at Whispering Palms. (emphasis added)
Three days later, instead of handing the case over to the authorities, Auther then proceeded to start an investigation into what was going on with the laptop. Flashing his FBI badge at the offices of the the laptop program agency (PSS), he inquired if the laptop had actually been returned, and found that it hadn't. Auther then inquired with his ISP about the IP address noted in the reports, attempting to find out where the computer was being used. Auther indicated to the court that he may have shown his FBI badge to the ISP. The ISP refused to tell him anything, but he was able to decipher that the computer usage was not from an IP at his house.

On the same day as the trip to PSS and the ISP, Auther received two more emails indicating that the computer was being used to access CP. He decided to drive by the school on his way to report everything to the FBI. He noticed Weindl's car in the parking lot and called Weindl on his cellphone. Auther asked about the laptop and Weindl said he was investigating some "hanky panky" going on at PSS. Auther knew he was lying since PSS did not have the laptop, and grew much more suspicious. He reported what was going on and his suspicion about Weindl to a special agent with the FBI (Ewing). He also asked that child protective services be sent to Weindl's house to check on his 11-year-old stepdaughter.

Over a week later, Ewing and Auther went to Weindl's office to speak with him. During the conversation, Weindl admitted he lied about returning the laptop to PSS and admitted to viewing child pornography. He also confessed that he had taken the laptop out into the jungle and smashed it. He was arrested outside the school a short time later. Prior to trial, Weindl filed a motion to suppress the eBlaster evidence arguing that it was obtained in violation of his Fourth Amendment rights.

The court, in denying suppression of the eBlaster evidence, began by declaring that to have a Fourth Amendment violation, there needed to be state action and standing (a reasonable expectation of privacy). Addressing the state action portion, the court laid out the standard relating to an off-duty officer - whether Auther was acting under color of state law, where his actions "in some way related 'to the performance of his official duties'" or "pursuant to [a] government or police goal." The court held that when Auther installed eBlaster he was acting as a private citizen, and not as an FBI agent. Despite the circumstances changing when Auther returned the laptop (that Auther wasn't acting as a concerned parent anymore), the court held that it was an inadvertent search not under color of state law because Auther did not intentionally leave eBlaster on the computer.

In reaching that result, the court was not persuaded by Weindl's argument that even if the presence of eBlaster was inadvertent, Auther opening and reading the eBlaster reports turned something inadvertent into intentional. The court reasoned that "[t]he search was the gathering of information by eBlaster, not the viewing of the contents." The court also dismissed the argument that "the initial eBlaster reports come under the Fourth Amendment via the two-part test for private-party searches."

So, to clarifiy, the original four emails from eBlaster sent to Auther, and him viewing them, were not the "product of a search conducted under color of state law."

The court did find a search, however, relating to the two eBlaster reports Auther received after he called Weindl to inquire about the laptop. The court stated:
By that time, Auther knew that someone may have been viewing illicit material on the laptop. He suspected Weindl even before he called him. When he did call, he hid his real concern about the laptop's usage behind a pretense that he was interested in purchasing the computer. After the call, he did not uninstall or disable eBlaster, even though as a private citizen he was under no obligation to continue monitoring an unknown person's offensive Internet activities. He did not immediately call his colleagues at the FBI and hand the investigation over to them — conduct that might have indicated Auther wanted to maintain a separation between his private self and his public persona as a law enforcement officer. . . . [instead] Auther continued his investigation into the child pornography website searches. . . . At the PSS offices, he showed his FBI badge. At the Internet service provider, he relied on the fact that he was known to be an FBI agent to seek information about IP addresses. The totality of the circumstances shows that at this point, Auther's actions were related to his official duties and in pursuit of a police goal. Although a formal FBI investigation had not been opened yet, Auther was now acting under color of law.
The court dismissed the government's argument to the contrary, that "even if Auther's conduct constituted state action, his discovery of the illicit Internet activity through eBlaster e-mails was accidental and therefore does not come under the Fourth Amendment." The court stated that precedent was clear that to have inadvertent discovery through plain-view doctrine, the police had to be somewhere they were justified to be. However, here, "Auther, . . . had no legitimate justification to intrude on anyone's conduct on the school laptop once it was no longer on loan to his son. Moreover, the incriminating evidence did not drop out while he was straightening the icons on the computer's desktop but came into view because of intentional spying on the keyboard and hard drive."

Addressing the argument that a violation of the federal Wiretap Act occurred, the court noted that under the criminal portion of the Act, "suppression motions are authorized only with respect to the contents of wire and oral — not electronic — communications."  The court laid out that the definition of "[a] wire communication is 'any aural transfer' involving wire or like connections between the point of origin and point of reception." 18 U.S.C. § 2510(1). And that, "an 'aural transfer' is 'a transfer containing the human voice' at some point in transmission of the communication." 18 U.S.C. § 2510(18). Thus, the court held that there was "no evidence that the transmission of information from the school laptop to Auther via eBlaster entailed hearing a human voice. Therefore, the evidence that Weindl seeks to suppress is not the product of a wire communication."

Finally, the court noted that to suppress the two eBlaster reports the arrived after Auther called Weindl under false pretenses, Weindl must have Fourth Amendment standing; that he had a subjective expectation of privacy regarding his actions on the laptop, and that his expectation was objectively reasonable. The court held that Weindl did not have standing. The court refused to accept the argument that Weindl had a property interest in the laptop. But, the court stated, the Fourth Amendment isn't solely grounded in property (note: don't tell that to Scalia), but also in privacy expectations.

Weindl argued, in that vein, that he had a legitimate expectation of privacy in the laptop because: he was the sole user, there were no warnings that his use would not be private (or that monitoring occured), he used the laptop in his own, locked office, when he was not using the laptop, he placed it in a desk drawer, and he never gave anyone else permission to use it. Not buying this argument, the court explained:

Sometimes, people delude themselves into thinking that they have a right to things that don't belong to them. . . . No evidence indicates that Weindl had a right to use, or himself had permission to use, a PSS laptop, even for school-related activities. Auther turned his son's laptop in to Weindl in Weindl's capacity as an agent for the school, not for Weindl's personal use.
Even if Weindl had a subjective (albeit unrealistic) expectation of privacy in the PSS laptop, it was not an expectation that society is prepared to endorse. An expectation of privacy does not become objectively reasonable just because a person hides someone else's property away in his office desk and does not let anyone else use it. A person cannot have a reasonable expectation of privacy in a computer he stole or obtained by fraud. See United States v. Wong, 334 F.3d 831, 839 (9th Cir. 2003) (stolen laptop); United States v. Caymen, 404 F.3d 1196, 1201 (9th Cir. 2005) (fraudulently obtained laptop). . . .
Weindl's case is similar to Wong and Caymen. Weindl misappropriated school property for his own personal use. Whatever expectation of privacy he developed in the contents of the laptop's hard drive and the keystrokes of Internet searches is not a legitimate one that society is prepared to accept. . . . The laptop was not assigned to Weindl and was not his office computer. For these reasons, Weindl lacks standing to claim a Fourth Amendment violation with respect to the eBlaster reports. (emphasis added)
Accordingly, the court held that none of the eBlaster reports should be suppressed, because the first four were not part of a search under color of state law and the last two were searches, but Weindl lacked standing (a reasonable expectation of privacy) to challenge them.

The next post on this case will focus on the court's analysis and explain what I believe the correct holding should have been.

(There is an additional issue in this case regarding the interrogation of Weindl that occurred in his office (after it was determined that he had looked at the CP), specifically: whether the conversation constituted a custodial interrogation requiring Miranda rights. The court held that part of the interrogation could stand, and part had to go. I believe this issue was wrongly decided as well (the entire conversation should have been tossed). However, I'm not going to address it because it is tangential to the main issue (and actually goes away if the computer evidence is suppressed because it would be fruit of the poisonous tree)). 















Tuesday, October 30, 2012

When in doubt, try mosaic theory?

In United States v. Mohamud, 2012 U.S. Dist. LEXIS 151430 (Or. Oct. 22, 2012) the defendant was charged with attempt to use a weapon of mass destruction. He argued two things: (1) that evidence from an alleged date rape investigation by Oregon State Police (OSP) should be suppressed because the consent was not voluntary and the police exceeded the scope of consent, and (2) that because the OSP evidence was poisoned, the FBI's use of that evidence (since they were participating with OSP) was fruit of the poisoned tree.

The case has a number of interesting elements (I would recommend reading it), but a lot of missing info due to national security concerns. To quickly provide a synopsis of the outcome, the FBI essentially provided evidence that it would not be using any of the information from the OSP investigation against the defendant in the national security case.

Here's where it gets interesting - the defendant argued that even if the FBI wasn't going to use any evidence from OSP, what the FBI learned by participating in the OSP evidence "must have [had an effect] on the direction of the investigation, requiring suppression of all evidence obtained after an illegal search or seizure." To support this argument, the defendant attempted to invoke mosaic theory in a hail mary attempt. The defendant interviewed witnesses about mosaic theory, who explained the basics:
[T]he mosaic theory, ... the concept that while some information in specific [documents] may appear harmless to disclose when read in isolation, such information may be very valuable as part of a mosaic of information gleaned from various sources, including multiple [documents] prepared over time. The Supreme Court endorsed the mosaic theory in Sims
The only problem with this tactic is that mosaic theory, to the extent it has been injected in Fourth Amendment cases at all, has been used in analyzing individual's reasonable expectation of privacy, see e.g. Maynard (Orin Kerr has an upcoming Michigan Law Review article on mosaic theory and its place (or lack of a place) in Fourth Amendment jurisprudence). To the defendant's credit, mosaic theory has been used in the national security context, but to my knowledge, most often by the government to argue against disclosure of information under the Freedom of Information Act (FOIA) (even National Reporters Committee offers the defendant no support). The attorney get's an A for effort, but the court did not buy it:
The mosaic theory is not the standard, however, when deciding if tainted evidence must be suppressed. The mosaic theory is generally discussed in cases involving the state secrets privilege or the Freedom of Information Act ("FOIA") exemptions for intelligence sources and methods. In analyzing whether evidence is tainted, I will employ the standard explained in Smith, 155 F.3d 1051.
Thus, I must consider whether anything the FBI seized from the OSP investigation, or any leads it gained there, tended "significantly to direct" the national security investigation toward all evidence the FBI collected...
 My guess is that with all the attention mosaic theory has received, it was just a matter of time before it would be tried in other Fourth Amendment cases.