Child porn case dropped when FBI won’t reveal online identification methods to court

Child porn case dropped when FBI won’t reveal online identification methods to court
Credit: IndiaToday

[Ed. – This one is tough.  But we’re talking about 200 really bad defendants potentially walking because the FBI doesn’t want to reveal cyber-forensic methods.  Interestingly, this was the same FBI that was adamant that Apple had to show them how to break iPhone security.]

US prosecutors have dropped a case against a man accused of using a child porn site because the government refused to divulge how it revealed his identity.

The Playpen site was located on the Tor network which is used to anonymise web-browsing activity.

The FBI found a way around this to reveal the users’ real IP addresses and led to 200 prosecutions.

But it refused to reveal to the court how it managed the feat.

The site was located on the Tor network which many people use to browse the web anonymously. It conceals their location and identity by routing their connections through a chain of different computers and encrypting data in the process.

To get round this the FBI used what it called “network investigative techniques” and revealed people’s identities.

But it refused a request for information on its technological investigation techniques.

Continue reading →


Commenting Policy

We have no tolerance for comments containing violence, racism, vulgarity, profanity, all caps, or discourteous behavior. Thank you for partnering with us to maintain a courteous and useful public environment where we can engage in reasonable discourse.

You may use HTML in your comments. Feel free to review the full list of allowed HTML here.