Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Judge rules cops' hacker went too far
C|Net — News.com ^ | November 14, 2002 | Lisa M. Bowman

Posted on 11/15/2002 11:08:24 AM PST by TexRef

A federal judge has ruled that law enforcement officials went too far when they tried to use evidence gathered by a known hacker to convict someone of possessing child pornography.

The decision, handed down earlier this month, is believed to be the first to say that hacking into an Internet-connected home PC without a warrant violates the Fourth Amendment, which prohibits unreasonable searches and seizures.

"This makes it clear that law enforcement needs a search warrant to do this," said Orin Kerr, an associate professor at George Washington University Law School. Kerr said the ruling was the first of its kind.

The Virginia judge suppressed evidence of child porn possession after the defendant's lawyers argued the evidence had been illegally obtained by a hacker whose methods had received approval from law enforcement officials.

The decision came out of a case in which a hacker uploaded a file to a child porn newsgroup that made it possible to track who downloaded files from the service. The uploaded file contained the SubSeven virus, which the hacker used to remotely search people's computers for porn.

The hacker then played the role of a cybervigilante, sending anonymous tips to law enforcement officials alerting them to child porn files the hacker had found on people's PCs.

In one case, the hacker tipped off officials in Alabama about a doctor in that state who had downloaded files from the newsgroup. The doctor was eventually sentenced to 17 years in prison. The hacker later contacted the same officials about a Virginia man who the hacker suspected was involved with child porn.

The Alabama officials told the FBI of the hacker's suspicions. The bureau, through the Alabama officials, encouraged the hacker to send more information. Based on that further data, U.S. attorneys and state prosecutors filed numerous charges against the Virginia man, William Adderson Jarrett, related to creating and receiving child porn.

Jarrett pleaded guilty. However, his attorneys also argued that the FBI had violated Jarrett's Fourth Amendment rights when they retrieved the information, via the hacker, without a warrant.

The judge agreed with that assertion, ruling that the evidence could not be used in court because the FBI had approved of hacking as a means of obtaining it, a move that violates protections against unreasonable search and seizure.

"By requesting that (the hacker) send the information," the judge's ruling said, "the FBI indicated its approval of whatever methods (the hacker) had used to obtain the information."

The decision put Jarrett's guilty plea on hold.

Although U.S. prosecutors are likely to appeal the ruling, the case could be a cautionary tale for agencies that try to use hackers as an arm of law enforcement without first obtaining a warrant.

The ruling also could open the door for other defendants to use similar arguments in their cases.


TOPICS: Constitution/Conservatism; Crime/Corruption; Government; News/Current Events; Technical
KEYWORDS: hacking; internet; police
Navigation: use the links below to view more comments.
first 1-2021-29 next last

1 posted on 11/15/2002 11:08:24 AM PST by TexRef
[ Post Reply | Private Reply | View Replies]

To: TexRef
Expect a swarm of posters into this thread ready to brand anyone applauding this ruling upholding the 4th Amendment as being in favor of child pornography.
2 posted on 11/15/2002 11:14:45 AM PST by dirtboy
[ Post Reply | Private Reply | To 1 | View Replies]

To: TexRef
Glad to see that some judges endorse the 4th ammendment.

Total Information Awareness....ping
3 posted on 11/15/2002 11:20:19 AM PST by HEY4QDEMS
[ Post Reply | Private Reply | To 1 | View Replies]

To: TexRef
There is no exemption for the possession of child pornography. Therefore tht FBI should have charged the hacker as well.

As well, it is an offense under various Federal laws to hack into someone's computer.

The judge was right to throw out the evidence.

4 posted on 11/15/2002 11:20:57 AM PST by ikka
[ Post Reply | Private Reply | To 1 | View Replies]

To: ikka
There is no exemption for the possession of child pornography. Therefore tht FBI should have charged the hacker as well

Problem was, I think, the hacker was living in Turkey!

5 posted on 11/15/2002 11:28:13 AM PST by Procyon
[ Post Reply | Private Reply | To 4 | View Replies]

To: TexRef
Here's other scenarios that put the trespasser behind the eight ball.

Trespasser sends an eMail with child porn included.  Person opens up eMail, presto chango, child porn pictures exist on the receiver's computer.

Trespasser sends an eMail that claims discount coupons are a click away.  Computer owner clicks to pick up the coupons and accesses a page with large child porn photos.  Presto chango, child porn pictures exist on the receiver's computer.

Trespasser is under the gun from law enforcement.  Either give up someone or you go to prison.  It is established that the trespasser can find graphics on computers via the internet using background methods.  What isn't mentioned is that the trespasser can also pass data to the host computer.

The trespasser or a friend could do these or any of a number of other acts to put photos on someone's computer.

I don't like the idea of a child porn user getting away with it, but I do want to be damn sure he's not just a convenient foil for someone under the gun either.

One other thing bugs me about this story.  Once again the term hacker is bastardized into something it's not.

Hacking is when a non-professional or untrained person fiddles around with his own computer to learn how it works.  He's a hack computer user. Just like an amature golfer is a hack golfer.  Thus he's a hacker.  A hacker is not a trespasser, an invader, a poacher or anything else remotely considered to be abusive to anther person's computer.

6 posted on 11/15/2002 11:29:50 AM PST by DoughtyOne
[ Post Reply | Private Reply | To 1 | View Replies]

To: DoughtyOne
I agree with everything you said, except:

Once again the term hacker is bastardized into something it's not. Hacking is when a non-professional or untrained person fiddles around with his own computer to learn how it works. He's a hack computer user. Just like an amature golfer is a hack golfer. Thus he's a hacker. A hacker is not a trespasser, an invader, a poacher or anything else remotely considered to be abusive to anther person's computer.

The term "hacker" came from the early days (even pre-Internet) of someone trying to "hack" (that is, agreesively break through) operating system protections. The term precedes the internet and applied to mainframes. I was using the term in 1976 when I was an applications developer. I know of what I speak.

7 posted on 11/15/2002 11:33:15 AM PST by freedumb2003
[ Post Reply | Private Reply | To 6 | View Replies]

To: Procyon
Problem was, I think, the hacker was living in Turkey!

So they say.

That's a problem I tried to point out when this was originally posted. If this were allowed, then law enforcement could just have people on their pay roll that there is no record of doing this type of stuff. They could always just pull the old "He doesn't work for us - just did this on his own". It would be too easy for cops to just hack computers themselevs, and claim the hacker was just some good samaritan civilian.

8 posted on 11/15/2002 11:40:45 AM PST by FreeTally
[ Post Reply | Private Reply | To 5 | View Replies]

To: freedumb2003
Actually, I'd put DoughtyOne at 100% - the term "hacker" is even older than that - it refers to "hacking" code, that is, throwing together undocumented, nonstandard code to solve a particular function and leaving it in place. Not that I would ever do such a thing...

It came to mean an OS cracker somewhat later. Purists still prefer "cracker" as more descriptive. Me, I like "@#$$%$@!#%$!#%%!!!" It's more evocative.

9 posted on 11/15/2002 11:41:28 AM PST by Billthedrill
[ Post Reply | Private Reply | To 7 | View Replies]

To: freedumb2003
hacker
(Originally, someone who makes furniture with an axe)

1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.

2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.

3. A person capable of appreciating hack value.

4. A person who is good at programming quickly.

5. An expert at a particular program, or one who frequently does work using it or on it; as in "a Unix hacker". (Definitions 1 through 5 are correlated, and people who fit them congregate.)

6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example.

7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.

8. (Deprecated) A malicious meddler who tries to discover sensitive information by poking around. Hence "password hacker", "network hacker". The correct term is cracker.

The term "hacker" also tends to connote membership in the global community defined by the net (see The Network and Internet address). It also implies that the person described is seen to subscribe to some version of the hacker ethic.

9. (University of Maryland, rare) A programmer who does not understand proper programming techniques and principles and doesn't have a Computer Science degree. Someone who just bangs on the keyboard until something happens. For example, "This program is nothing but spaghetti code. It must have been written by a hacker".

From the FOLDOC online Computer Dictionary
10 posted on 11/15/2002 12:01:31 PM PST by SpaceBar
[ Post Reply | Private Reply | To 7 | View Replies]

To: dirtboy
Not from me. There are rules to play by and the cops broke them in this case. If they wanted to search the guy's computer, all they had to do was show probable cause and get a warrant.
11 posted on 11/15/2002 12:05:43 PM PST by Blood of Tyrants
[ Post Reply | Private Reply | To 2 | View Replies]

To: freedumb2003
I don't deny the term has been around for a long long time, used in the incorrect reference. That doesn't make it right. By continuing to utilize that term, people deligitimize what I and countless other computer users are. I've been using home computers since the first 8k TRS-80 that had to load it's programs from audio tape, was out there. I've never hacked someone elses computer. I am still a computer hacker after a couple of decades at the keyboard. What am I, a novice? Perhaps you'll catch my drift, perhaps not.

It's not that big a deal. Thanks for your view on it and I'm not claiming mine is the only valid view. Take it easy.

12 posted on 11/15/2002 12:06:31 PM PST by DoughtyOne
[ Post Reply | Private Reply | To 7 | View Replies]

To: DoughtyOne
Trespasser sends an eMail with child porn included. Person opens up eMail, presto chango, child porn pictures exist on the receiver's computer.

And in a disturbing note, that alone makes the recipient guilty of posession by the letter of the law. Intent is irrelevant.
13 posted on 11/15/2002 12:28:15 PM PST by Dimensio
[ Post Reply | Private Reply | To 6 | View Replies]

To: Blood of Tyrants; dirtboy; Dimensio
Glad to see people realize this was an important, and good ruling. This ruling touches on one of my most serious concerns with the new Homeland Security act. Does it give the government the right to access our computers on a whim, or does it require them to obtain a warrant. I will always opt for the warrant approach.
14 posted on 11/15/2002 12:38:03 PM PST by DoughtyOne
[ Post Reply | Private Reply | To 11 | View Replies]

To: DoughtyOne
I get at least a dozen emails a day on my msn dial up account with html & nude pictures of girls that may or may not be of age.

I have checked around, and most people I know with msn or aol get these emails.

Most of them seem to be coming from overseas.

15 posted on 11/15/2002 12:40:25 PM PST by Ford Fairlane
[ Post Reply | Private Reply | To 6 | View Replies]

To: DoughtyOne
This ruling touches on one of my most serious concerns with the new Homeland Security act. Does it give the government the right to access our computers on a whim, or does it require them to obtain a warrant.

I agree with your sentiments here, D1, but for the life of me I cannot find a provision for warrantless searches of financial records in either H.R. 5710, the Homeland Security Bill, or a companion bill on computer security. It wouldn't surprise me if such was in there somewhere, but I haven't seen it. Likewise, Safire claims that the Homeland Security Bill provides for all credit card data, medical records and other person data to be hoovered into a massive central database. I haven't seen that either, and me and the poster M1911 have been poring over that bill for two days now. So put me into the somewhat confused column at this point, until either I find the verbiage, someone else posts it or we determine that it simply isn't there.

16 posted on 11/15/2002 12:42:11 PM PST by dirtboy
[ Post Reply | Private Reply | To 14 | View Replies]

To: DoughtyOne
Oh, BTW, there's an article about Cochise County, AZ you'll probably want to see - I'll ping you on it.
17 posted on 11/15/2002 12:43:21 PM PST by dirtboy
[ Post Reply | Private Reply | To 14 | View Replies]

To: dirtboy
Luckily this man pleaded guilty, otherwise he would have been let out because of the illegal search. If they need a warrant to search my unlocked shed in the back yard, it is reasonable to expect the same requirement to search my computers tied to the internet.
18 posted on 11/15/2002 12:47:58 PM PST by HamiltonJay
[ Post Reply | Private Reply | To 2 | View Replies]

To: HamiltonJay
Not quite true - from the article:

The decision put Jarrett's guilty plea on hold.

19 posted on 11/15/2002 12:49:00 PM PST by dirtboy
[ Post Reply | Private Reply | To 18 | View Replies]

To: freedumb2003
I was using the term in 1976 when I was an applications developer.

Oooooooooh - punchcards. Remember dropping a stack of those?

20 posted on 11/15/2002 12:52:15 PM PST by Chancellor Palpatine
[ Post Reply | Private Reply | To 7 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-29 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson