Switch to ADA Accessible Theme
Close Menu
Free Consultations Calls answered and returned 24/7
New City Criminal Defense Attorney
Free Consultations Calls answered and returned 24/7
845-639-6600

Is Your Computer Illegally Gathering Evidence Against You? New Report Offers Advice

InternetCrime

A report recently released by the ACLU, EFF, and the National Association of Criminal Defense Attorneys highlights a serious issue in our criminal justice system that few are aware of: the installation of computer malware in order to illegally seize evidence of violation of the Fourth Amendment and federal laws in an effort to convict criminal defendants; an operation known as “Network Investigative Technique.”

The government has increasingly turned to hacking and the use of malware as a technique to gather evidence in prosecutions, and it isn’t just local law enforcement and district attorney’s offices: According to the report, the Federal Bureau of Investigation (FBI) has been found deploying software designed to infiltrate and surveil computer activity since at least 2002.

To this end, the above-mentioned report analyzes recent case law concerning this constitutional controversy and provides recommendations on how to ensure that this evidence is suppressed.

“Bulk Hacking”

The FBI in particular has developed a technique which enables it to conduct “bulk hacking,” where teams of agents hack thousands of computers in one single operation on the basis of one warrant. Malware effectively allows agents to detect who is using privacy-enabling software to hide their IP addresses and/or using technologies such as Virtual Private Network or Tor to shield their locations and identities. The malware even allows them to access encrypted communications under some circumstances.

“Watering Hole Operations”

In what arguably involves some level of entrapment, the most frequently used form of government bulk hacking is what’s known as a “watering hole operation,” which involves the government effectively operating a website associated with criminal activity, thus using it to deliver malware to thousands of users connected with the site. The malware, delivered or installed on the user’s computer after they have visited the page and/or clicked on something, then takes control of that computer and begins to search for any and all information sought by law enforcement, delivering that information back to law enforcement’s server.

How Is This Possible?

The FBI does this via obtaining a warrant, relying upon Rule 41 of the Federal Rules of Criminal Procedure. This one warrant not only enables it to search thousands of computers all over the country, but also all over the world. However, the practice clearly has numerous constitutional and legal violations associated with it, and as a result, many criminal defense attorneys have argued to suppress any evidence gathered as a result, and some judges have also simply rejected hacking warrant applications.

Criminal Defense Attorneys Representing Fourth Amendment Rights

If you are the victim of illegally-obtained evidence, get in touch with our office of criminal defense attorneys right away. Serving New York and New Jersey for over 25 years, the office of Phillip J. Murphy is prepared to ensure that your rights are protected.

Resource:

aclu.org/report/challenging-government-hacking-criminal-cases?redirect=malware-report

Contact Our Firm

Phillip J. Murphy,
Attorney At Law
Free Consultations Calls Answered and returned 24/7 Phone: (845) 639-6600 Fax: (845) 639-6620

Locations & Directions

10 Esquire Road, Suite 10
New City, New York 10956

We Accept

  • Master Card
  • American Express
  • Discover
  • Visa

Phillip J. Murphy, Attorney At Law is located in New City, New York and serves clients in and around New York, New Jersey & Connecticut. Contact our experienced criminal defense law firm.
- Home - Site Map -

MileMark Media - Practice Growth Solutions

© 2015 - 2024 Phillip J. Murphy, Attorney At Law. All rights reserved.
This law firm website is managed by MileMark Media.
Disclaimer

Contact Form Tab