Sophisticated computer hacking software is finding
its way to law enforcement agencies around the world, and neither the
courts nor Congress is ready to handle the consequences, a Yale University panel said Tuesday.
It’s the sort of technology that can infect laptops, activate
personal webcams and extract data from cellphones and tablets. Yet
according to experts, it is not known how many law enforcement agencies
have the software, how many times they’ve used it and whether or not
such actions are constitutional.
“We don’t have a secure Internet, and I think we need one,” said Christopher Soghoian, principal technologist for the American Civil Liberties Union.
The multi-panel conference looked at the history of hacking
technology, its current use by police and government groups and the
legal implications. Wall Street Journal reporter Jennifer
Valentino-Devries moderated the event.
Texas magistrate Judge Steve Smith told of a search warrant
application for police hacking he received recently. It involved a
person suspected of obtaining the password for another person’s bank
card.
Investigators wanted to install “data extraction software” that
would search through all the data stored on a particular computer and
activate its webcam so investigators could take a photo of the
computer’s user.
The problem, Smith said, was that investigators didn’t know the
identity of the computer’s owner and didn’t know where the computer was
located. Smith turned down the warrant request.
Georgetown University Law Center professor Laura Donahue said at
least four FBI units, as well as the ATF and NSA, are using computer
hacking tools. She’s identified dozens of law enforcement hacking cases
around the country, from California to New York — many of them sealed
from public scrutiny.
“These obviously raise Fourth Amendment concerns,” Donahue said.
Often, hacking warrants seek to sift through someone’s computer for up
to a month, searching for proof of criminal activity.
But Donahue and other panelists said the potential for abuse is
high. What if the computer is located at an Internet cafe, a public
library or a university? Do you search the activity of every person who
used that computer? What if the hacking virus infects other computers in
a network?
“These law enforcement techniques are stretching the bounds of
statutory language and Congressional oversight,” said Stephanie Pell, a
former national security prosecutor. This is particularly true when
hacking software allows law enforcement to bypass Internet service
providers to get at data.
“When government is accessing information directly, it is doing it invisibly,” Pell said.
There also is some question about whether evidence gathered
through law enforcement hacking is always accurate. Panelists said the
hacking technology sometimes provides a “back door” for other parties to
manipulate the data being extracted, for example.
Such vulnerability is rampant throughout the spectrum of personal
digital products, according to Matt Blaze, a computer security expert
from the University of Pennsylvania.
“I have no idea how to defend these devices against outside attack,” Blaze said of cellphones.
Soghoian agreed. “Phones are just a disaster,” he said.
Meanwhile, politicians and the judiciary are struggling with the
problem. As Judge Smith noted, secrecy at all levels tends to keep the
issue hidden from view.
“It’s difficult for me to find out what’s going on in another
district,” he said. “We’re basically crying out for authority. Tell us
what to do.”
No comments:
Post a Comment