国产视频

In Short

Hacking: Not Just for the Feds!

The next big battles over law enforcement use of technology will involve local police.

Police Tape
Tony Webster / CC2.0

The threats that came to a Washington state high school in June 2007 were听. One message read, 鈥渢here are 4 bombs planted throughout Timberline High School. One in the math hall, library hall, and one portable. The bombs will go off in 5 minute intervals at 9:15am.鈥

In response, the FBI deployed a secret surveillance tool to unmask the identity of the suspect, who was using an anonymous MySpace account linked to the bomb threats. By pretending to be an听, an FBI agent was able to get the suspect to click on a fake news story, which installed spyware that revealed, among other things, the suspect鈥檚 true IP address. The 15-year-old pleaded guilty to making bomb threats and other charges, though his lawyer听听was all 鈥渁 prank from the get-go.鈥

The whole incident made one thing clear: The FBI can hack. Now, imagine your local police department. What if it could do that, too?

Many members of the public first became aware of the FBI鈥檚 interest in hacking in February, when the bureau and Apple听听over a locked iPhone belonging to one of the San Bernardino, California, shooters. That spat ended abruptly when the FBI announced it had hacked into the iPhone without Apple鈥檚 assistance.

What lots of people didn鈥檛 realize is that the FBI has a decadeslong history of hacking for investigative purposes. Though the bureau鈥檚 methods are shrouded in secrecy,听听听show that law enforcement has been hacking since at least the 1990s. The most recent public conversations have focused on largely on encryption strength and whether tech companies should be required to install so-called backdoors for law enforcement to access with warrants, a move the tech community argues would broadly undermine device security. But law enforcement has long had many other tricks up its sleeves, like installing malware that can听听by logging keystrokes and using a Computer and Internet Protocol Address Verifier to听听of a suspect who has anonymized his or her location.

The present debate around law enforcement hacking is, for good reason, focused mostly on the FBI. At present, the most sophisticated law enforcement hacking capabilities belong to the federal government and remain classified. And although state and local police certainly investigate some serious crimes within their jurisdictions, the FBI routinely handles serious crimes鈥攃hild pornography, human trafficking, financial crime resulting in the loss of millions of dollars. By many measures, the gravity of the crimes the FBI investigates makes it understandable that when we consider extraordinary hacking measures used by law enforcement, we would start with the FBI.

But law enforcement hacking is not just a matter for the feds, thanks to two trends in particular.

First, just like law-abiding citizens, criminals have access to legal services that allow them to encrypt communications, browse privately, and otherwise minimize their digital footprints.听, but as these tools become easier to use and the commercial default, it isn鈥檛 difficult to imagine that criminals鈥攅ven those who aren鈥檛 technologically sophisticated鈥攚ill use them, too.

Second, state and local police departments are very interested in hacking capabilities that could, as they see it, improve their ability to fight crime.听听from the past several years show that law enforcement agencies around the country have received demonstrations of spyware being sold by the controversial Italian-based company听, whose听听is to 鈥減rovide effective, easy-to-use offensive technology to the worldwide law enforcement and intelligence communities.鈥 Hacking Team听听of听听that helps law enforcement 鈥渉ack into [their] targets with the most advanced infection vectors available.鈥

The federal government is also sharing cybercrime-related knowledge with state and local police departments. The听, a听, is 鈥渃ommitted to training state and local officials in cyber crime investigations鈥 and offers tuition-free education on many elements of policing in a high-tech crime era. And after unlocking the San Bernardino iPhone, the FBI听听local partners that it would share technical assistance whenever possible.

Many of the same concerns held about FBI hacking also apply at the state and local levels. For instance, the听听ended because of the involvement of an outside group, which the bureau paid to help it access the device. What rules should govern such third-party involvement? What kinds of compensation should third parties be allowed to receive, and what incentives would such a marketplace create? 听Does a law enforcement agency have a responsibility to disclose any vulnerabilities it exploited to the software developer so that it can be patched? If law enforcement inserts malware on platform in order to track a suspect, does it have an obligation to clean up the malware after the investigation?

And perhaps most importantly, do we even want state and local law enforcement to have hacking capabilities? The FBI may do a reasonably good job at keeping the vulnerabilities it uses under wraps so they don鈥檛 fall into the hands of malicious actors. But state and local departments may have neither the inclination nor the capacity to be so vigilant. For some, this is an argument for hacking operations, if they happen at all at the state and local levels, to be conducted in conjunction with, or under the supervision of, the FBI. For instance, cybersecurity experts Adam Segal and Alex Grigsby听听that a decryption lab could be housed within the FBI to assist state and local law enforcement, in much the same way that the FBI currently assists them with fingerprint and biometric analysis.

Law enforcement hacking also presents disclosure challenges for our adversarial justice system. Assistant Federal Public Defender Andrew Grindrod is concerned about the challenge of preparing a fair and thorough defense when law enforcement insists on keeping hacking methods classified. In an email, he warned that 鈥渋f law enforcement is not prepared to produce its hacking technology in discovery, we should think hard about whether we are comfortable depriving people of liberty through prosecutions that put this untestable technology front and center.鈥

These aren鈥檛 concerns for a distant future. In November, Manhattan District Attorney Cyrus Vance Jr. said at an event:

In my Office alone, 423 Apple iPhones and iPads lawfully seized since October 2014 remain inaccessible due to default device encryption. Approximately 10% of our warrant-proof devices pertain to homicide or attempted murder cases, and 9% to sex crimes. And while we鈥檝e been locked out of approximately 34% of all Apple devices lawfully recovered since October 2014, that number jumped to approximately 42% of the devices recovered in the past three months.

Earlier this year, he made use of the FBI-Apple standoff to emphasize that the move toward 鈥渄efault device encryption affects virtually all criminal investigations, the overwhelming majority of which are handled by state and local law enforcement.鈥

But the waters ahead for state and local law enforcement hacking are still murky鈥攍egally, operationally, and ethically. Hacking Team itself was hacked in July 2015, and emails released revealed that the Metropolitan Bureau of Investigation based in Orlando, Florida, had contacted Hacking Team about its spyware products. But the bureau recognized at least the legal uncertainty ahead, worrying that using a piece of surveillance software could make it difficult to comply with search warrants. The email dump also revealed that on many occasions, after receiving spyware demonstrations from the Hacking Team, local police departments decided not to purchase spyware, saying the products did not meet their needs at the time. But the question remains: What about next time?

This听听was originally published in听, a collaboration among听, 国产视频, and听.

More 国产视频 the Authors

Emefa Addo Agawu
Emefa Addo Agawu
Hacking: Not Just for the Feds!