{"id":13961,"date":"2016-04-01T19:55:59","date_gmt":"2016-04-02T00:55:59","guid":{"rendered":"http:\/\/hcstx.org\/?p=13961"},"modified":"2016-04-01T19:55:59","modified_gmt":"2016-04-02T00:55:59","slug":"cyber-news-fbi-is-pushing-back-against-judges-order-to-reveal-tor-browser-exploit","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/04\/01\/cyber-news-fbi-is-pushing-back-against-judges-order-to-reveal-tor-browser-exploit\/","title":{"rendered":"Cyber-News: FBI Is Pushing Back Against Judge&#8217;s Order to reveal TOR Browser Exploit"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-large wp-image-13963\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/04\/tor.jpg?w=620\" alt=\"TOR\" width=\"620\" height=\"412\" \/><\/p>\n<p>Last month, the <a href=\"https:\/\/motherboard.vice.com\/read\/judge-rules-fbi-must-reveal-malware-used-to-hack-over-1000-computers-playpen-jay-michaud\" target=\"_blank\" rel=\"noopener\">FBI was ordered<\/a> to reveal the full malware code used to hack visitors of a dark web child pornography site. The judge behind that decision, Robert J. Bryan,<a href=\"https:\/\/motherboard.vice.com\/read\/transcript-shows-why-a-judge-ordered-the-fbi-to-reveal-mass-hacking-malware-playpen-jay-michaud\" target=\"_blank\" rel=\"noopener\">said it was a \u201cfair question\u201d<\/a> to ask how exactly the FBI caught the defendant.<\/p>\n<p>But the agency is pushing back. On Monday, lawyers for the Department of Justice filed a sealed motion asking the judge to reconsider, and also provided a public declaration from an FBI agent involved in the investigation.<\/p>\n<p>In short, the FBI agent says that revealing the exploit used to bypass the protections offered by the Tor Browser is not necessary for the defense and their case. The defense, in previous filings, has said they want to determine whether the network investigative technique (NIT)\u2014the FBI&#8217;s term for a hacking tool\u2014carried out additional functions beyond those authorised in the warrant.<\/p>\n<p>DoJ attorneys have also asked to submit a filing ex parte and in camera, meaning that only the judge would be presented with evidence under the motion.<\/p>\n<p>\u201cTsyrklevich claims that he requires access to the government&#8217;s \u2018exploit\u2019 to determine if the government \u2018executed additional functions outside the scope of the NIT warrant,\u2019\u201d Special Agent Daniel Alfin writes. He is referring to Vlad Tsyrklevich, a malware expert held by the defense to analyse the NIT. In January, the defense did receive some of the NIT code, but not sections that would ensure that the identifier issued to the suspect&#8217;s NIT-infection was unique, and the exploit used to break into the computer.<\/p>\n<p>This specific case concerns Jay Michaud, a public school administration worker from Vancouver, Washington, who was arrested in July 2015. In February 2015, the FBI seized a dark web child pornography site and ran it from their <a href=\"https:\/\/motherboard.vice.com\/read\/judge-rules-fbi-running-child-porn-site-for-13-days-was-not-outrageous-conduct-playpen\" target=\"_blank\" rel=\"noopener\">own servers for 13 days<\/a>. During this time, the agency deployed a NIT against people who visited <a href=\"https:\/\/motherboard.vice.com\/en_au\/read\/fbi-hacking-tool-only-targeted-child-porn-visitors\" target=\"_blank\" rel=\"noopener\">specific, child pornography threads<\/a>, which grabbed their real IP address, among other technical details.<\/p>\n<blockquote class=\"quote\">\n<h3>\u201cKnowing how someone unlocked the front door provides no information about what that person did after entering the house.\u201d<\/h3>\n<\/blockquote>\n<p>Tsyrklevich has written a declaration after analysing the parts of the NIT that have been disclosed, but the full text of that document remains under seal.<\/p>\n<p>\u201cHe is wrong,\u201d Alfin continues. \u201cDiscovery of the \u201cexploit\u201d would do nothing to help him determine if the government exceeded the scope of the warrant because it would explain how the NIT was deployed to Michaud&#8217;s computer, not what it did once deployed.\u201d<\/p>\n<p>Here, Alfin starts an analogy for software vulnerabilities: that of a flaw in a lock.<\/p>\n<p>\u201cIn layman&#8217;s terms, an \u2018exploit\u2019 could be thought of as a defect in a lock that would allow someone with the proper tool to unlock it without possessing the key,\u201d he writes.<\/p>\n<p>\u201cKnowing how someone unlocked the front door provides no information about what that person did after entering the house. Determining whether the government exceeded the scope of the warrant thus requires an analysis of the NIT instructions delivered to Michaud&#8217;s computer, not the method by which they were delivered.\u201d<\/p>\n<p>Alfin also claims that the identifiers attached to each NIT-infection, another point of contention for Tsyrklevich, are indeed unique.<\/p>\n<p>\u201cI have reviewed the list of unique identifiers generated during the operation and confirmed that there were in fact no duplicate identifiers generated,\u201d Alfin adds.<\/p>\n<p>NIT code has been disclosed in the past. In a 2012 case, the government provided details of its technique which turned out to involve the<a href=\"http:\/\/www.wired.com\/2014\/12\/fbi-metasploit-tor\/\" target=\"_blank\" rel=\"noopener\"> hacking-toolkit Metasploit<\/a>. The FBI used a Flash applet to make a direct connection over the internet, instead of routing the targets\u2019 traffic through Tor.<\/p>\n<p>Peter Carr, a spokesperson for the Department of Justice, told Motherboard in an email \u201cWe&#8217;ll decline to comment beyond our public filings.\u201d<\/p>\n<p>Read the Original Article at<strong><a href=\"http:\/\/motherboard.vice.com\/read\/fbi-is-pushing-back-against-judges-order-to-reveal-tor-browser-exploit\"> Motherboard<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last month, the FBI was ordered to reveal the full malware code used to hack visitors of a dark web child pornography site. The judge behind that decision, Robert J. Bryan,said it was a \u201cfair question\u201d to ask how exactly the FBI caught the defendant. But the agency is pushing back. On Monday, lawyers for&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[74,5653,1317,4912,4126,1928,1635,3553,65,3712],"tags":[10804,4178,10811,10812,1815,10813],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/13961"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=13961"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/13961\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=13961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=13961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=13961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}