Hacker News new | past | comments | ask | show | jobs | submit login
To keep Tor hack source code secret, DOJ dismisses child porn case (arstechnica.com)
307 points by awqrre on March 5, 2017 | hide | past | favorite | 137 comments



So, let's see now: a man is going free who should probably be going to jail for a long time, because the state doesn't want to disclose the methods of gathering evidence against him, which we can speculate are because they are illegal or sourced from non-law-enforcement agencies. A case with near-identical facts and the same judge _is_ going to trial and, not content with tapping your email, the state now wants to put viruses on your computer.

It's hard to point to anything in this story that resembles "How the world should be".


While the majority of it probably isn't 'how the world should be', a man is going free because (we speculate) that the evidence against him was gathered illegally. This bit probably is 'how the world should be'.


I've never understood this. If I gather evidence against somebody illegally, and it proves their guilt, shouldn't we both go to jail?


You're getting a lot of huffy responses to this question, but it is an entirely legitimate one. In fact, many (maybe most?) western countries don't have the same exclusionary rules the US has. There are other remedies to police misconduct. If you were starting a nation from first principles, it's not an iron law of justice that your courts have that rule.

The reason we believe the exclusionary rule works so well is that it strikes directly at the incentive structure for the police. We don't have to convince evidence-gathering officers of their liability or assess liability up and down the chain of responsibilities on the prosecution's side; we just have to assess whether evidence was handled properly, and, if it wasn't, the prosecutors lose the evidence. The one simple rule neatly ensures that nobody --- in any role --- on the prosecution's side has any incentive to mishandle evidence (or coerce underlings or partner organizations to mishandle it).

But clearly the rule isn't a requirement. We don't generally believe, for instance, that Canada's criminal justice system is systemically corrupt, and they don't have a hard-and-fast exclusion rule.


> The reason we believe the exclusionary rule works so well is that it strikes directly at the incentive structure for the police.

It also strikes directly at the incentive structure for defendants.

If you prove that the government wronged you but even then you still go to jail, you have little incentive to spend your resources proving that. And neither does anybody else, because prosecutors are not very interested in looking for prosecutorial misconduct.

But if proving government misconduct will keep you out of jail then you have every incentive to do it and the government won't be able to get away with it as much.


> incentive structure for the police

That assumes that the police's incentive is simply to convict as many people as possible. Which, if true, raises other concerns.


I think it more assumes that the police's incentive is to maximize the ratio of accusation to conviction as much as possible, which is a reasonable goal.

If they were simply trying to maximize the total number of convictions, then this wouldn't necessarily help; the police would just make broaden the kind of cases they'd accuse

And ofc, it's the function of the police to maximize the misdemeanor to conviction ratio; it's the function of the court to judge the quality of misdemeanor.

It is the function of whatever social/moral arm of the government to minimize misdemeanors. A police officer minimizing the number of accusations should only be doing so for practical reasons; In the ideal world he shouldn't be trying to interpret the law itself, and if it should exist (because it should in general be explicit what is and is not legal, and in general, it is not the policeman's job to decide what is moral, it is to enforce the standing morals.)

But its not an ideal world, and nobody wants to spend time/effort/money on a trash case, so the general incentive is to successfully convict; not to simply try.


>I think it more assumes that the police's incentive is to maximize the ratio of [conviction to accusation] as much as possible, which is a reasonable goal.

Strictly speaking it's not a very reasonable goal. The best way to achieve it would be to pick, say, the three easiest to prosecute cases every year and only prosecute those.


Well shit

Maximize ratio and minimize unaccounted (unaccused?) crime


> maximize the ratio of accusation to conviction

Um -- I think you meant that the other way around :-)


yes


I mean, illegally obtained evidence is still evidence. I don't think it's absurd to think police want to convict as many guilty criminals as possible, particularly if the crime is heinous enough to justify risking their own jobs by breaking the law to get evidence.


When we no longer have elected police, sherrifs, or district attorneys, then the numbers won't matter as much as the severity or sensationality of the crimes investigated.

But if the numbers = tough on crime, then there is pressure to obtain evidence illegally. If it becomes pervasive, then investigating the misconduct will never be prioritized because it doesn't seem as impressive to the voting public, and furthermore the justice system very rarely goes after their own.

So it's good there's a consequence for not walking a fine line; it's the embarassament of having your work undone.


This would open the doors for torture, not something a civilized state should risk lightly.


> The reason we believe the exclusionary rule works so well is that it strikes directly at the incentive structure for the police.

That's debatable. Parallel construction seems pretty common. The NSA shares information with the FBI, DEA etc, and then they exploit that information to collect clean evidence. So there's never any mention of NSA help.

Of course, that arguably involves perjury. But judges seem pretty OK with ignoring that. I do suspect that the Playpen cases involved parallel construction, and that they just screwed up on this one.


By "pretty common", you mean, "I've heard of it", right?


Point taken. But I've heard repeatedly about it, involving different sorts of illegal data, over some years. And the discovery rate is arguably low. That suggests to me that it's common.


You're actually missing a huge point in this, it gives the police the ability to selectively block the justice system.

If a police officer sees a defendant that they wish to let off the crime, all they have to do is testify to some trivial mishandling of the evidence.


The structure is to keep police officers honest which is more important than a particular person going to jail. The operating principle is that a dishonest police force is more dangerous than a criminal who was caught using illegal evidence. Typically the criminal will commit another crime and if you get evidence against them legally, then you can prosecute them for the new crime.


The "we both go to jail" policy would probably do even betting at keeping police officers honest. The threat of the officer going to jail being significantly worse than the threat of allowing the criminal to walk free.

The details are sketchy, who prosecutes the police/prosecutors? But in principle I think it makes sense.


> worse than the threat of allowing the criminal to walk free.

Alleged criminal. You realize you're innocent until proven guilty, right?


A "we both go to jail" policy would have the same incentives we see in the Wells Fargo example. We need top down incentive to follow the law at all levels. The current situation means that nobody profits from failure to follow the law.


>The threat of the officer going to jail being significantly worse than the threat of allowing the criminal to walk free.

Not if the officer going to jail is being manipulated by their superiors or is otherwise arranged to take the fall for someone else.


> The operating principal

Wouldn't the right word be "principle"?


Yes it would be (fixed). Thanks for catching it while it was still editable!


There's multiple problems with that idea. Firstly, it incentivizes 'working around the system' for enforcement to go after people. Enforcement is not inherenetly out there for the 'good', many times they're there for their own agenda, while looking like they're enforcing the law. This can create a mixture of criminal/enforcement culture, and lead to a further increase of 'bad cops'.

Secondly, when gathering evidence illigally, it may be that the evidence is purely out of context, shaped to make the person look guilty, or that the methods of doing so are not reliable. Courts still have a problem with reliability of evidence, even 'lie-detectors' are still seen as legitimate, but there is no evidence of their ability.


I think the logic is: "If you're willing to gather evidence against somebody illegally, then you'd also be willing to fabricate evidence that doesn't exist".


What guarantees do we have that the evidence has not been fabricated or planted? Evidence collection processes exists to minimize misconduct. If someone can't explain how the evidence has been obtained, they should be viewed as suspect.


This argument would legitimize torture if society would agree on that it is legitimate. So it's a really bad idea to accept this argument.


The way the system is now, if you gather evidence by "torture" (remembering it's just an analogy) and fail to come up with a convincing cover story for how you gathered the evidence, then the case is dismissed and everyone goes home. "Welp, it was worth a try!" It's this current system that's at risk of legitimizing torture as yet another illegal-but-oh-well tool for investigation.


Not if the victim of torture can afford our legal system. A (most likely Federal) judge would deny qualified immunity to those responsible, and they'd be held accountable at least in civil court, possibly criminal, although doubtful, given the way state prosecutors crawl up the police butt.


A federal judge deny qualified immunity? I'm struggling to contain my incredulity. There are instances where cops shot people who were unarmed and attempting to comply, where filmed doing it from multiple angles, and the cops still walked.


There also cases where cops shot people and the cops went to jail, but nobody talks about those.

https://slatestarcodex.com/2014/12/17/the-toxoplasma-of-rage...


Of course not. The justice system actually working shouldn't be remarkable enough to warrant a news cycle.


Federal courts do this routinely on cases brought before them. But most victims can't afford the court system. Here is a recent, typical one:

"New Brunswick, N.J., police drive their patrol car into fleeing suspect. Officers: We parked in his path, and he rode his bike right into us. Third Circuit: Video inconclusive. No qualified immunity.


One reason that I didn't consider until relatively recently is the issue of standing.

It's not possible for random people to successfully sue, say, the police for illegally gathering evidence if they have no proof that they were harmed and no proof that it happened.

The issue is that only people charged with a crime have the standing needed to bring this matter up in court. The (possible) crooks keep the police and justice department honest.


How can tainted evidence be used to establish guilt beyond reasonable doubt, when the entire basis of trust in the collection of the evidence is ostensibly gone.


How would one stop the police from getting "anonymous tips" with illegally acquired evidence again and again? It sounds like it would lead to a plain disregard for procedure.


Fruit of the forbidden tree. It's inadmissible in court.


Unless the LEO acted in "good faith"


I'm pretty sure there's a common saying about two lefts not making a right. Or two rights not making a wrong? Can't quite remember.


I'm with you ! They are both criminals and as such should be detained.

Quoting Bill Binney “Things won't change until we put these people in jail”


I don't completely understand how demonstrating the chain of investigation should require the disclosure of the vulnerability. I really hope the execution of the law isn't going to depend on 12 random people understanding the finer points of cryptanalysis.

I wish there were some way to get a private but independent verification that X technique allowed IP addresses to be collected if they did action Y (e.g. logging onto playpen). Then the investigation could be questioned without the government disclosing their vulnerability, which seems like a standard we wouldn't hold most to. If someone were on trial for copyright infringement could they subponea for the full source of FairPlay as a coercion to get the case dropped?


Being digital data, I'm assuming you have to be able to explain where the data was sitting, posit a reason for the data to exist there at all (edit: or some context around the data) and describe your method of obtaining the data.

Otherwise you could just create the data. With the above, you still can - it does however allow for inconsistencies to arise, and when they do a closer inspection can be conducted. (IANAL)


"Private" means "unavailable to the defendant" in this case which runs counter to some of the deepest roots of our justice system.

You do not get to convict someone based on evidence that can't be entered at trial. Some third party saying "oh yeah we totally verified it" is not enough.


How so?

In general if a criminal goes free despite having evidence against him just because the evidence was not obtained legally ... it sounds rather wrong to me.


> In general if a criminal goes free despite having evidence against him just because the evidence was not obtained legally ... it sounds rather wrong to me.

Then you are terribly shortsighted. It is "innocent until proven" guilty" for many very good reasons. We have only the word of the government that this man is guilty.

The government has ALL the cards and power, the innocent need protection from it more than we need to punish the guilty.

The accused aren't geniuses; the fact that the government didn't build a solid case against him with physical evidence, wiretaps, keyloggers, etc. means he really wasn't that important. The fact that they have such a high profile suspect and can't make the case against him without a fishing expedition makes me VERY suspicious.

The fact that they are willing to drop the case makes me wonder how much of what they have is induced, entrapped, or outright fabricated.


I said "in general" for a reason.

I'm not talking about _this_ particular case. (I'm not sure that accessing a dubious website is in itself a crime; obviously the police accessed the site too).

Presumably the police _can_ prove it, but the court simply refuses to even _see_ the evidence.


> Presumably the police _can_ prove it, but the court simply refuses to even _see_ the evidence.

Then you are required to assume that the police CANNOT prove it.

I have several system administrator friends who have actually dealt with CP on their systems. Every single time it was discovered to have been planted by the FBI attempting to fish for pervs.

So, yeah, I'm gonna give the accused a whopping benefit of the doubt. CP is such a hot button issue and so amazingly rare that I always assume that the government or its agents are up to something nefarious first and that someone is a despicable human being second.

Perhaps my Bayesian prior is wrong, but I kinda doubt it.


That would encourage police to gather evidence illegally all the time, because it works. Which is consider a worse state of affairs than guilty people going free.

Just imagine undercover police walking into every home that left their door unlocked and having a snoop around. They could do that and get some convictions out of it.


No. That does not follow at all. What it means is that the undercover police illegally collecting evidence is convicted, _and_ the child pornographer is convicted.


How do you trust the evidence of someone who you can prove(to the point of conviction) is willing to do illegal things to gather the evidence?


It's still evidence, just less credible evidence. Hopefully the prosecutor has other evidence as well.

It could also be the case that it's evidence that was collected by someone who didn't commit the crime, but would currently be excluded by the fruit of the poisoned tree doctrine.


The only proof you have that it IS evidence is the word of someone who you know is willing to break the rules to secure a conviction.


Sure, and that is an argument you can make in court after the evidence has been submitted.


I thought an evidence was an objective piece of data, not someone's word.


An objective piece of data like what? A digital photo? A network traffic log? A printed photograph? A phone call recording?

These are _all_ based on someone's word, in a world of Photoshop, text editors, hex editors, scanners and printers, voice synthesis, etc.


The credibility of the police is usually not the main basis of assessing evidence. It's not really that often that the authenticity of evidence is called into question at all. But sure, it could happend.


We are talking about them breaking the law. The reason there credibility usually isn't questioned is because they know that if they do that the evidence will be rejected so they are compelled to be honest. Once that is out why wouldn't they be questioned they are proving a willingness to do something illegal to get a conviction. Manufacturing evidence isn't unbelievable at that point.


The evidence is the evidence. A criminal is a criminal. Someone up this chain of thread was making that point.


Evidence is not the evidence. It can be faked.

When you gather evidence illegally, it's easier to fake it.


And illegal is illegal. The investigation agencies have to make their case within the bounds of the law, they are not above it.


Yeah, meanwhile, you're going to have cases where you sent someone to prison(or perhaps killed them) and have absolutely no reason to believe the verdict was undeserved. Everyone thinks that the court cases will go like this.

Judge: Did you obtain this evidence illegally? Prosecution: Yes we did, your honor. Judge: Okay, trial on that starts Monday.

No...you'll have to legally make it so the exclusionary rule is not a defense...i.e, the number of times that this is even brought up will inevitably diminish to 0. Admittedly, it does exist, but the legal system tries it damnest to remove gray areas. At the very least, you will need a legal test to prove that the evidence was not manufactured. You know of any?


I don't see that happening. Maybe just the child pornographer and 10 innocent black men.


I think it's part of a general principle of making evidence be "clean". A huge paper trail, specific needs to define how the evidence was gotten, etc. All of these make it much harder to do things like forge evidence.

Evidence gotten through illegal means also get a lot of doubt just by default. Imagine a police officer paying somebody to steal evidence for them. The person now how has an incentive to forge evidence.

An important detail of this system is that evidence brought to the table cannot be trusted without a transparent system. Defendants will almost always contest evidence, but this system makes that argument hold a lot less water.

(There's still the issue that police might not be interested in collecting evidence that goes against a prosecutor's case. Don't know how that's solved)


> In general if a criminal goes free despite having evidence against him just because the evidence was not obtained legally

So does the investigation agency who broke the law.


Then I would encourage to get yourself over to your local community college and learn why things are the way they are in the legal system. You'll spend a fair amount of time talking about the different schools of thought on law in what law is and is supposed to do. First of all, you need a conviction or a confession to call him a criminal. This, or any other case, has nothing to do with any _one_ person or party. It has everything to do with _everyone_ else. You're not seeing the lasting consequences beyond The People v. Random Pedo. To be honest, society doesn't really need your input on how law should work if your only criteria to strip someone of their freedom or to execute them is whether or not one has been accused. You'd function more appropriately in 17th century colonial Massachusetts. The exclusionary rule in this country has only existed in its (mostly) current form since 1920, but has been a legal concept for many centuries. The main question to be answered in Silverthorne Lumber Co. v. United States involved the applications of 4th amendment. In general, if our system of law allows for derivatives which are illegal obtained then you have no need for the 4th amendment protection. I shouldn't need to tell you what happens when militarized drug agencies execute a no-knock warrant on the wrong house. I shouldn't need to tell you what happens when a sheriff beats the shit out of a guy they picked up off the street to force a confession. I shouldn't need to tell you how this could be used to destroy the life or credibility of a political opponent, or to shutup a media organization. I shouldn't have to tell you that this would be a grand method for imprisoning more minorities on the basis of race, or that this would all but ensure a fair trial is impossible. But...your argument is about _legitimate_ evidence obtained illegally. I may have to tell you that if your solution were to be implemented then you'll need to tell the rest of us how we go about prosecuting the prosecution. Who's going to bring that lawsuit against them? And you may have to tell the rest of us what the legal test is to ensure that illegally obtained evidence is also not _manufactured_ evidence, because insofar as I am aware, no such legal test exists.


It's called the Rule of Law, as in it's the Law that Rules this land. Nobody is supposed to be above it, despite evidence to the contrary in US politics.


I think most people would agree with that statement. But how do we decide if they are a criminal in the first place? Therein lies the rub.


if the law enforcement is not clean, then who would be?


One could also guess that they don't have as much confidence in the accuracy of their evidence-gathering method as they'd like. If they have to show how they gathered that evidence, and the defense is able to introduce enough doubt that their method targeted the right person, it would torpedo all related cases, and hurt the prosecution's credibility in future cases.

We're taking it as a given that this guy (and the others) actually committed the crime, but the prosecution cannot actually prove that without allowing us to verify that the evidence gathered actually comes from a place of fact.


I wouldn't jump to speculating the technique was illegal. The fact of the matter is that in a criminal trial the US Constitution gives those being prosecuted the right to face their accuser as well as examine tools the accuser used in an investigation. In this particular case the software which presumably uncovered their identity can come under scrutiny from the defense in the form of a source-code review. Without question the defense has the right to a source code review in an attempt to understand how the solution works and if it is trustworthy. Because it's the primary driver of the case and there is no case without it, the choice by the prosecution is to either hand over the source-code or drop the case. In this particular case they are valuing the closed source more than the criminal prosecution, likely to assure an analysis isn't leaked and provided to those who could patch against whatever exploit they are using.


If the site mentioned in the article had 150,000 members as they say, that's a lot of people to lock up for years for pointing a browser at a url.


Considering it was a Tor site, it's not like a user who didn't know what they were doing could end up there on accident. Also I'm not sure users means "only browsed the website" (could mean they had a profile, etc.).

EDIT: It appears that they did do more than just visit the site: https://news.ycombinator.com/item?id=13799213


I don't quite get why it is illegal.

Banning production I understand fully. But viewing, under the argument it promotes it? The TOR developers have done far more to promote it than any single viewer, especially if we consider those who never paid any money and use ad blockers. Would we say the TOR developers should face some sort of punishment for not working with governments to develop a version that works to stop this (such as integrating something which causes it to drop off the TOR network as soon as it detects an illegal file, probably biases the algorithm against false positives)?

At the very least, I think they should be using all the resources to go after producers and those paying for it.


> If the site mentioned in the article had 150,000 members as they say, that's a lot of people to lock up for years for pointing a browser at a url.

You don't stumble on "kiddy stuff" on TOR accidentally. You actively seek it. 150.000 is a lot of pedos in the wild.


Lots of people visit links on the clear web showing illegal and horrific acts. If the full extent of a crime is filling out an http form with a fake email to see some pictures and video, it's still not clear that this is so far beyond the pale that years of prison for hundreds of thousands of people is the best solution.


It could also be because their method doesn't really prove who the individual really was...


Apparently "innocent until proven otherwise" also doesn't resemble "How the world should be" in this comment.


Questions about what methods investigators can legitimately use aside, the practical implications are clear. You can not count on Tor alone for real anonymity.

So what might these NITs be doing? In the simplest case, they'd be dropping malware that reports ISP-assigned IP address, local IP address, network hardware MAC, and whatever to FBI servers. And it's probably Windows malware.

To protect against that, you isolate userland and the Tor process in separate machines, or at least VMs. So adversaries that compromise browsers etc can't discover ISP-assigned IP addresses, and can't reach the Internet except through Tor. Also, you don't use Windows or OSX. Whonix does this, and you can run it in Qubes.

It's possible that these NITs are exploiting a bug in Tor itself. Even if that were so, however, isolating the Tor process from userland would mitigate that risk.

Perhaps the FBI has access to substantial numbers of malicious Tor relays, operated by the NSA etc. To mitigate that risk, you can hit Tor through nested chains of VPN services. Even if they identify the final VPN exit in your chain, they will probably need to track back through the chain to identify you. And by including unfriendly jurisdictions in your chain, you can make that harder.

Finally, it's possible that the NSA has sufficient global intercepts and logs to deanonymize any network connection, no matter how complicated and indirect. It's impossible to say.


> To protect against that, you isolate userland and the Tor process in separate machines, or at least VMs.

This applies as well to people who run Tor hidden services that are doorkicker bait (like drug cryptomarkets).

It should be impossible for a compromised browser or hidden service server or Tor process to know anything about your hardware or MAC address, your internal IP address (the RFC1918 one), or your globally routable IP address.

also yeah the Feeb loves to exploit browsers (especially firefox :^) and make them execute the NIT (which just sends, unencrypted/unauthenticated data of the MAC address, ethernet interface's IP addresses, username, and stuff like that, to a computer run by the FBI)

once one of their exploits got leaked, it was pretty fucking lulzy https://blog.mozilla.org/security/2016/11/30/fixing-an-svg-a... https://lists.torproject.org/pipermail/tor-talk/2016-Novembe...


The NIT used in Freedom Hosting pwnage was originally a Tor/VPN leak test on Metasploit ;)


Is there a benefit of running Whonix in Qubes? Or just that running Qubes is a good idea in general?


There's arguably better isolation between the Tor gateway and workstation VMs. See https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_V...


In case it isn't obvious to everyone, the government runs or has tapped most or all TOR exit nodes. This has been going on forever.

Nobody knows exactly what the attack is...but if they're willing to drop cases to cover it up, its probably something that either: 1) completely breaks TOR permanently 2) is easy to bypass/block

Since TOR has withstood a lot of scrutiny I'm betting on option #2. They found a total break but it's really brittle. Either an exploit in software, or more likely, some protocol hiccup that allows them to de-anonymize users running certain popular software or OS.


I was under the impression from reporting on the sting that Playpen was an onion site, not a clearnet site. If that's the case, traffic wouldn't be going through an exit node to get there, right?


Right, no exit involved. Both user and onion site build normal three-relay circuits to a rendezvous relay, picked by the onion site.


Do you have any evidence for the claim that TOR is so badly compromised? My understanding of the article is not that TOR was hacked, but rather that a tor user was tricked into opening a non-tor site and thus giving away his/her IP address.

Also if just the exit node is compromised, encrypted connections are still safe (TTBOMK).


https://www.google.com/amp/s/nakedsecurity.sophos.com/2015/0...

Not the FBI per se, but it shows that someone is clearly attempting to compromise TOR users.

Also there's been whispers about it forever. Much like the "black rooms" at datacentres before all the NSA leaks.

The FBI has a long history of tracking down and compromising CC theft and CP rings, along with silk road and the hoards of clones. Most of these sites are primarily or only accessible over TOR.

Running compromised TOR nodes would be an extremely cheap way to monitor a large portion of illicit Internet traffic. The frequent busts are usually attributed to other reasons to shift attention away from TOR, but this is classic parallel construction.

The feds will nearly always get you on secondary evidence when the primary means is too sensitive... See stingrays. The sheer number of TOR based site busts however is telling.

Anyone relying on TOR for security is a fool. It's more heavily monitored than the regular net.


While a compromised exit node is bad, isn't the situation improved if your TOR session is encrypted? With an encrypted session over tor, and a trusted endpoint, what is your risk profile beyond your exposure to the endpoint?


< Anyone relying on TOR for security is a fool. It's more heavily monitored than the regular net.

this is why we should encourage more tor traffic for regular, normal use. making the cost of deanonymization more costly.


I believe that Tor Project ought to encourage bulk data transfer through and among onion services. That would add chaff to protect other users. There's resistance because it would increase network load. However, there's considerable excess capacity for middle relays, because they attract so little attention. There's even excess capacity for entry guards, and policy could be changed to increase that. It's exit relays that are rate-limiting, and onion sites don't use them.

Using multiple Tor instances with MPTCP, I've managed 50 Mbps between onion sites with gigabit uplinks.


Here's how it could have worked. User logs into Playpen onion site, which the FBI is running (and still serving child porn, I note). Then malware gets downloaded. Maybe it was a classic dropper, or maybe part of an image file or whatever. OK, so Tor browser doesn't affect Internet connectivity for other apps. So the FBI malware just phones home, pwning the user.


> Do you have any evidence for the claim that TOR is so badly compromised?

Only that it would be incredibly cheap and valuable to do so.


yea, this is my theory. Occam's razor applies here more than ever.

If i recall, this case is one of the first times the term NIT was used and it could mean literally anything.


The prosecutors said they may file charges later (according to the article).

They may just want to keep from revealing the details as long as possible -- but could re-file the same charges years later, right before the Statute of Limitations.


This actually bothers me greatly. Not carrying through once charges are filed should be equivalent to "not guilty".


So, in a timeline this:

* "We have an eyewitness! File the charges."

* "Our eyewitness recanted, dismiss."

* "We now have DNA evidence, refile the charges."

You actually think the trial should not be allowed to go forward?


> You actually think the trial should not be allowed to go forward?

Actually, yes. If you filed a case on something so flimsy and it collapses, the case should get dismissed.

It would sure make prosecutors go the extra mile to make sure that there is concrete evidence before filing charges.

Simply filing charges can destroy someone's life. The prosecution should have to put something at risk when they do so.


Should've waited for the DNA evidence. The idea we convict with just eyewitness testimony alone is enough of a nightmare.

Also, this is how it happens already if they go through the entire trial.

* "We have an eyewitness. File the charges!"

* "Jury finds the defendant not guilty because they didn't think the eyewitness' testimony was proof beyond a reasonable doubt."

* "We found DNA evidence and even a video that someone recorded but didn't admit to just now."

Double jeopardy means they can't go ahead, no matter what evidence they find. This is just extending that a little further, which I see as a good thing.


Many countries solve that:

You can't present the exact same case again after you filed to dismiss...

...unless a major change has happened, such as a massive amount of new incriminating evidence.


Well, they're requesting the case be dismissed without prejudice. The judge doesn't have to grant the request. Whether it will be dismissed with or without prejudice remains to be seen


I think they want to to disclose. I think prosecutors expected that they would be allowed to do so by now. They probably assumed the exploit would have been patched away, or that some better tool would have come allong by this point in time. Id bet good money that this tool is still in active use by some three-letter agency. Should it be discovered or patched before the SOL, its intel value will drop and prosecutions will begin again.


That was my thought as well. Especially since they dismissed the case in such a way that they can bring it back later. Might as well use it to collect evidence while they can, and then bring all the charges when the exploit is fixed and it's not useful any more.

It sucks that the pervert in the case is going free (for now), but I would guess the experience scared him enough that he won't be doing it again any time soon.


Dont go too nutz about him not going to jail. An arrest on child porn charges destroys one's life. Guilt or innocence doesnt matter. Jobs are lots. Families are broken apart. Neighbours now hate you. This man's life will never be the same. And he hasnt had any day in court. We should not judge too harshly.


SOL?


Statute of limitations. The period of time during which charges can be brought.


Why is an exploit against a Tor user so valuable? Assuming the attackers can access the server, which for the FBI seems a reasonable assumption (they can seize the server, operate it as a honeypot, etc.), all they need is a browser vulnerability.

Perhaps they did use a valuable exploit in this case, or they used something not legal (such as something not covered by their warrant or NSA surveillance).


They might be actively using it in other investigations that might be compromised if this exploit were fixed.


But can't those cases just be dismissed also? Unless they decide that case is worth the release of information.


They're probably using it for higher-priority investigations, like keeping track of terrorist communications.


This is what that is.


I don't quite see why they can't use the same method they use in espionage cases in this situation - if there's classified evidence, the defence lawyers need to get security clearances and are under the same obligation not to further disclose the information as anyone else (even to their own client).


It isn't a national security issue so there is no justification for those measures. In criminal cases there is a strong constitutional and natural justice basis for the accused being able to examine and attempt to rebut the evidence.


As I understand it those issues are covered by the accused's lawyers being able to examine the evidence on behalf of the accused, which would extend to having it examined by an expert witness who can attempt to impeach it.


It reads straight out of Kafka you can't be present at your own trial, because the evidence against you is secret.

I might be willing to grant that legitimate cases of national security warrant this, but routine criminal proceedings? Fuck no. That kind of exclusion of the accused is terrifying and delegitimizes the proceedings in my eyes. The state can't try you in secret just because they don't want to talk about the evidence, and we know the state routinely abuses secrecy laws to cover malfeasance.


Right. How is the accused supposed to provide an honest account to their lawyer if they can't even know what evidence exists against them? They'll have nothing to refute, and their lawyer can't ask them pertinent questions about their own defense.


I don't really see how that applies to the situation at issue here - the facts that the state wants to protect seem to be around the technical details of the way in which the evidence was acquired (the article talks about source code). The lawyers for the accused don't need to disclose the source code to their client to be able to say "The state's expert witness is going to testify that at such-and-such date and time an IP address which the ISP says was assigned to your account at the time logged into the site under such-and-such account name and access such-and-such content", which is the part the accused can refute. Their testimony on the source code itself wouldn't be accepted anyway.


How comes they are charged with "accessing the website"? Is it illegal or what?


Yes, but there are a few details that ars is not mentioning. They didnt just "access" the website. The website needed registration. These people had registered accounts. They did not stumble upon it by accident. Then the malware was limited to those accessing the "hardcore" section. Those accessing only legally grey-area material (ie nude but no sex acts, or images where age was questionable) were not caught up. Deliberately trying to access material you know is illegal, then actually doing so, is a crime.

There were no doubt other steps taken to limit the field of people to charge. Shared computers and shared IP addresses (vpns, school networks etc) seem to have been deselected. The man living on his own, with his name attached to a non-proxied internet connection, makes for an easy prosecution. They must have a far longer list of suspects ... who may now be on some sort of watch list. I suggest they think twice about boarding an international flight with a laptop. Expect to be randomly searched.


In many countries, even trying to access child pornography (even without necessarily having success in doing so), is a crime. I'd assume the US to be the same.


- "tor hack," or tor browser user who didn't turn off javascript?

- is this only an issue for the prosecution because it happened before the changes to rule 41?


i believe thise case was initiated prior to those changes.


This is what happens when the net is more important than the fish.


which is pretty crazy, because crimes involving CP are some of the biggest whales that exist in our society.


Not really. CP possession convictions happen routinely. They're treated as a serious crime but usually not as serious as, say, premeditated murder.

Producing it is of course another matter.


This is routine. The accused has money for a lawyer, otherwise this would have been a plea deal and a conviction with no reveal requested.


The lawyer is a public defender in Tacoma.


why not jail the guy and pay a fine too.

they jail innocent people all the time a give huge payouts or put people away in guantanamo and then also pay huge amounts of compensation.

how about the judge fines the law enforce and gives the fine to orphanages or to the victims.


Won't someone think of the children?



Are you serious or being facetious?

If you are being serious, I'd like to direct you to the wikipedia page on the topic: https://en.wikipedia.org/wiki/Think_of_the_children

"In debate, however, as a plea for pity, used as an appeal to emotion, it is a logical fallacy"


Snarky, mostly. So often the people who want to ram through additional surveillance will do so using "think of the children" rhetoric, as though they were the most important thing in the world.

And now we find that when it comes time to actually use these tools to protect the children, the secrecy of the tools is more important.


The general rule of thumb is if a politician is pushing a law to "protect the children," it's a tell that it's a bad law. That's the only way they can sell it. By bad law, I mean permanently lose your rights kind of law. There have been many, but the war on drugs is a big one. It led to the militarization of the police, no knock raids, out of proportion sentencing, stop and frisk, asset forfeiture with no evidence, aggressive prosecution, etc. These laws that were sold to protect children against drug dealers creep into other offenses as well, like RICO and of course the patriot act. Terrorism is another big seller.

>And now we find that when it comes time to actually use these tools to protect the children, the secrecy of the tools is more important.

I don't want to get into too shaky ground, but if you can de-emotionalize the issue, prosecuting the consumer of the material isn't directly protecting anybody. That picture was taken no matter how many people look at it. You wouldn't expect the government to prosecute everyone who looked at the stolen pictures of celebrities that came out a few years ago. The government is now using this to legitimize surveillance, actively attempt to circumvent security (which is illegal), and to hide the circumvention methods. That's bad for everybody. Child porn is horrible, and horrible things happen to children, but an authoritarian government with massive, legal surveillance power is worse. The road to hell was paved with good intentions.


From the Wikipedia article, "Community, Space and Online Censorship (2009) argued that classifying children in an infantile manner, as innocents in need of protection, is a form of obsession over the concept of purity."

I believe I see what you mean, however in a case of child pornography do you not think that it's in a human's best interest to keep something from abuse of naivety?


Best public defender ever?


Does this mean that one of the four horsemen of the infocalypse has been proven a fake?




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: