Poging GOUD - Vrij
The Cyber Secrets That Are Too Good To Reveal
PC Pro
|June 2017
Security services are prepared to let dangerous criminals escape if it means protecting their hacking techniques, finds Stewart Mitchell
Spying, internet surveillance and hacking are secretive worlds, but sometimes the need for secrecy can get in the way of their ultimate goals. Being asked to show how you have obtained evidence can mean giving up an asset that is worth more than the actual evidence itself.
The predicament was highlighted in a recent case in the US, when FBI officials used a previously unknown exploit to infiltrate, take over and investigate a dark web child abuse ring.
The PlayPenweb group breach –where government officials reportedly used a Tor browser flaw to identify the IP addresses of members – led to the identification of 135 suspects in the US and 8,700 members in 120 countries.
However, as the case of one defendant came to trial, court rulings made it clear that, to seal a conviction, the officials would need to disclose how the evidence against the alleged paedophiles was obtained. Rather than reveal their exploits, federal prosecutors dropped the case, but were able to keep the possibility of further legal action alive – presumably in case the exploit was later made public and no longer had value as a stealth tool.
The ruling “deprived the government of the evidence needed to establish defendant Jay Michaud’s guilt beyond a reasonable doubt at trial,” the prosecutors said when dropping the case. “The government must now choose between disclosure of classified information and dismissal of its indictment. Disclosure is not currently an option.
“Dismissal without prejudice leaves open the possibility that the government could bring new charges should there come a time when the government be in a position to provide the requested discovery.”
Fragile evidence
Dit verhaal komt uit de June 2017-editie van PC Pro.
Abonneer u op Magzter GOLD voor toegang tot duizenden zorgvuldig samengestelde premiumverhalen en meer dan 9000 tijdschriften en kranten.
Bent u al abonnee? Aanmelden
MEER VERHALEN VAN PC Pro
PC Pro
LG UltraFine 6K Evo
Thunderbolt 5 connectivity and a 6K resolution both impress, but at this price we want OLED technology
3 mins
April 2026
PC Pro
Motorola signature
One of the most stylish phones in the universe, but that comes with a matching price and two compromises
3 mins
April 2026
PC Pro
Geekom X14 Pro
The CPU may be ageing, but Geekom's debut laptop delivers in every other area - if you can find it for sale
3 mins
April 2026
PC Pro
Asus Zenbook Duo (2026)
With a next-gen processor and numerous design improvements, this is the best dual-screen laptop yet
3 mins
April 2026
PC Pro
Dell UltraSharp 52 Thunderbolt Hub Monitor
A superb choice for anyone who currently finds themselves with three or more monitors sitting on their desk
5 mins
April 2026
PC Pro
Investors may still believe in Elon Musk, but Jon Honeyball isn't buying any of it
My day started badly. Still bleary-eyed at 6am, with a bucket of coffee sitting untouched beside me, I dropped the SIM-removal tool into my keyboard.
3 mins
April 2026
PC Pro
Green cloud
Don't entrust your jobs to dirty, energy-hungry servers:
2 mins
April 2026
PC Pro
"I've said it before, and I'll say it again: the biggest obstacle to security is inconvenience"
Have you seen those password books on Amazon? They're not a cybersecurity abomination, despite what you may think
7 mins
April 2026
PC Pro
"Cyber resilience is now treated as a matter of governance rather than pure technical compliance"
Rule Britannia, Britannia waives the rules... or why the shoulder-shrugging Cyber Security and Resilience Bill causes such problems for UK businesses
6 mins
April 2026
PC Pro
"Not to point any fingers here; I seriously doubt the fault lies with our esteemed editor"
Whether it's PDFs from PC Pro's editor, Outlook messages or his partner's photos, space is at a premium for Steve this month
9 mins
April 2026
Translate
Change font size

