Prøve GULL - Gratis
The Cyber Secrets That Are Too Good To Reveal
PC Pro
|June 2017
Security services are prepared to let dangerous criminals escape if it means protecting their hacking techniques, finds Stewart Mitchell
Spying, internet surveillance and hacking are secretive worlds, but sometimes the need for secrecy can get in the way of their ultimate goals. Being asked to show how you have obtained evidence can mean giving up an asset that is worth more than the actual evidence itself.
The predicament was highlighted in a recent case in the US, when FBI officials used a previously unknown exploit to infiltrate, take over and investigate a dark web child abuse ring.
The PlayPenweb group breach –where government officials reportedly used a Tor browser flaw to identify the IP addresses of members – led to the identification of 135 suspects in the US and 8,700 members in 120 countries.
However, as the case of one defendant came to trial, court rulings made it clear that, to seal a conviction, the officials would need to disclose how the evidence against the alleged paedophiles was obtained. Rather than reveal their exploits, federal prosecutors dropped the case, but were able to keep the possibility of further legal action alive – presumably in case the exploit was later made public and no longer had value as a stealth tool.
The ruling “deprived the government of the evidence needed to establish defendant Jay Michaud’s guilt beyond a reasonable doubt at trial,” the prosecutors said when dropping the case. “The government must now choose between disclosure of classified information and dismissal of its indictment. Disclosure is not currently an option.
“Dismissal without prejudice leaves open the possibility that the government could bring new charges should there come a time when the government be in a position to provide the requested discovery.”
Fragile evidence
Denne historien er fra June 2017-utgaven av PC Pro.
Abonner på Magzter GOLD for å få tilgang til tusenvis av kuraterte premiumhistorier og over 9000 magasiner og aviser.
Allerede abonnent? Logg på
FLERE HISTORIER FRA PC Pro
PC Pro
Carbon-aware computing
Some workloads are energy intensive - but as Steve Cassidy finds out, there are greener and cheaper ways to operate
2 mins
December 2025
PC Pro
Protect your endpoints
Laptops, phones and workstations are often the weakest link in any business's defence strategy, so give them the protection they need.
19 mins
December 2025
PC Pro
Apple AirPods Pro 3
Superb sound quality and amazing noise cancellation make these the standout earphones
3 mins
December 2025
PC Pro
Can humanold robots work?
Nicole Kobie introduces five humanoid robots that want to take our jobs, although only one has succeeded - so far
9 mins
December 2025
PC Pro
Tech firms rival fastfood companies when it comes to marketing disappointment, says Jon Honeyball
There are many things to be disappointed with in modern life.
3 mins
December 2025
PC Pro
"My client had been playing an annoying game with me, but it was actually a good exercise"
Contract length isn't everything: clear drafting and prioritising key issues matter most, as Olivia explains succinctly (but not too succinctly)
7 mins
December 2025
PC Pro
"There's an opportunity here.That is to get the virtualisation bug early in your planning"
As Windows 10's decade-long reign ends, firms must make big decisions on how to introduce Windows 11. Steve offers a novel suggestion
9 mins
December 2025
PC Pro
MICROSOFT DEFENDER VS THE WORLD'S BEST SECURITY SUITES
WITH MICROSOFT'S TOOL NOW OFFERING SOLID PROTECTION YEAR UPON YEAR, WE FIND OUT WHICH OF THE SECURITY SUITES JUSTIFIES ITS PRICE
1 mins
December 2025
PC Pro
Nvidia GeForce RTX 5050
Entry-level Blackwell card brings a much-needed performance boost, but not enough to justify its price
2 mins
December 2025
PC Pro
Confessions of an audio dentist
Extracting troublesome Bluetooth headphones with the help of a soldering iron and a steady hand results in one much happier web call participant
3 mins
December 2025
Translate
Change font size
