The WSJ's Jennifer Valentino-DeVries broke this story yesterday, unfortunately behind the WSJ's paywall:
https://twitter.com/jenvalentino/status/327172745332916225

For a solid summary, see @rj_gallagher's coverage at Slate:

Slate (Apr 25) - "Judge Rejects FBI Attempt to Use Spyware to Infiltrate Unknown Suspect's Computer" by Ryan Gallagher:
http://www.slate.com/blogs/future_tense/2013/04/25/texas_judge_denies_fbi_request_to_use_trojan_to_infiltrate_unknown_suspect.html

Or go straight to the Memorandum and Order, which is quite the read:
http://www.scribd.com/doc/137842124/Texas-Order-Denying-Warrant

Magistrate Judge Stephen Smith of the Southern District of Texas was presented with an FBI affidavit requesting a Rule 41 search and seizure warrant targeting an unknown computer at an unknown location used by an unknown suspect(s). The lack of specificity was sufficient grounds for declining to issue the warrant, and Judge Smith goes through each of Rule 41's five territorial limits which the government's application failed to satisfy. Although it's interesting to see that the FBI hoped to satisfy the territorial limit by performing the search on the computer's data once it was brought into the Judge's territory, the interesting part concerns just how the FBI hoped to acquire and transport that data: by cracking or phishing into the unknown target computer, installing a sophisticated piece of malware, searching for and gathering information for 30 days, while exfiltrating significant quantities of data out of the system.

What kind of data? Although the original affidavit and the revised affidavit were sealed (the FBI having been given at least one opportunity to clarify their intent), Magistrate Judge Smith was kind enough to cite the section of the affidavit which details exactly what information the FBI intended to acquire from the unknown computer:

(1) records existing on the Target Computer at the time the software is installed, including:

records of Internet Protocol addresses used;

records of Internet activity, including firewall logs, caches, browser history and cookies, "bookmarked" or "favorite" Web pages, search terms that the user entered into any Internet search engine, and records of user-typed Web addresses;

records evidencing the use of the Internet Protocol addresses to communicate with the [victim’s bank’s] e-mail servers;

evidence of who used, owned, or controlled the TARGET COMPUTER at the time the things described in this warrant were created, edited, or deleted, such as logs registry entries, configuration file, saved user names and passwords, documents, browsing history, user profiles, e-mail contents, e-mail contacts, "chat," messaging logs, photographs, and correspondence;

evidence of software that would allow others to control the TARGET COMPUTER;

evidence of times the TARGET COMPUTER was used; and

records of applications run.

(2) prospective data obtained during a 30-day monitoring period, including:

accounting entries reflecting the identification of new fraud victims;

photographs (with no audio) taken using the TARGET COMPUTER's built-in camera after the installation of the NEW SOFTWARE, sufficient to identify the location of the TARGET COMPUTER and identify persons using the TARGET COMPUTER;

information about the TARGET COMPUTER's physical location, including latitude and longitude calculations the NEW SOFTWARE causes the TARGET COMPUTER to make;

records of applications run.


Later in the Memorandum, Judge Smith takes the FBI to task for having the gall to state:

Steps will be taken to assure that data gathered through the technique will be minimized to effectuate only the purposes for which the warrant is issued. The software is not designed to search for, capture, relay, or distribute personal information or a broad scope of data. The software is designed to capture limited amounts of data, the minimal necessary information to identify the location of the TARGET COMPUTER and the user of TARGET COMPUTER.


I applaud Magistrate Judge Stephen Smith for his principled action in this circumstance, which is one amongst many significant actions he has taken to resist court secrecy, the abuse of secret "gag" orders, and the application of the Constitution to electronic surveillance requests:
http://www.fclr.org/fclr/articles/html/2009/jmffedctslrev5.pdf
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2071399
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2143339

Please consider sharing this information with others.
gf

--
Gregory Foster || gfos...@entersection.org
@gregoryfoster <> http://entersection.com/

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to