- Tickle The Wire - https://www.ticklethewire.com -

Government Technology: Stop Letting Cybercriminals Hide from FBI

hacker-istock-photo [1]By Editorial Board
Government Technology

Imagine that a criminal investigator has identified one or more computers that are part of ongoing criminal activity. Unfortunately, the people operating these computers are hiding them. The machines could be anywhere in the world, using anonymous email or tools like Tor [2] to conceal their location.

The investigator also has a tool, a carefully engineered piece of software, which she calls a “Network Investigatory Technique,” or NIT, that will cause a targeted computer to reveal itself. Once she sends the software to the computer she’s investigating, it will reply with a message saying, “I am at this location.” The rest of the security world calls the NIT “malicious code” (“malcode” for short) and deploying it “hacking,” because the software exploits a vulnerability in the target’s computer, the same way a criminal would.

Federal court rules currently say she can use this tool only if she gets an electronic search warrant from a judge. But the computer could be anywhere: to which court should she go to get the warrant?

This is not a hypothetical problem. Online investigations face this problem all the time, when tracking down fraudsters or those issuing threats using anonymous emails [3], botmasters who have compromised thousands of computers around the planet or purveyors of drugs [4] or child pornography [5]. The current federal rules of criminal evidence (in particular a section known as Rule 41 [6]) require investigators to seek warrants from a magistrate judge in the federal court district where the target computer is located.

But if investigators don’t know where in the country, or indeed the world, the computer is, the existing rules effectively dictate that there is no judge who could approve a warrant to actually find out its specific location. In essence, the rule is, “The investigator can get a warrant to hack these computers to reveal their location only when she knows where they already are.” That rule might have made sense before the digital age, but in today’s digital world it forces an end to promising investigations.

To read more click here.  [7]

Other Stories of Interest