FBI needs a warrant to hack your computer, judge rules

A US federal judge has ruled that computer hacking legally counts as a search

Hacking someone's computer legally counts as a search when done by law enforcement, a Texas federal judge has ruled.

The decision comes as part of the ongoing court case relating to a dark web child porn site called Playpen. As part of the investigation, the FBI covertly implanted malware known as a Network Investigative Technique - or NIT - onto the computers of anyone who visited the site.

Advertisement - Article continues below

Jeffrey Torres of San Antonio, Texas, was one of the people caught in the FBI's cyber-sting. He filed a motion to suppress evidence seized from his home, based on the argument that the FBI's initial search of his computer was unlawful.

Judge David Alan Ezra ultimately denied the motion, ruling that the search was covered by the FBI's initial warrant. However, the ruling does clearly state that law enforcement hacking counts as a search under the fourth amendment of the US constitution.

"The NIT placed code on Mr. Torres' computer without his permission, causing it to transmit his IP address and other identifying data to the government," Ezra wrote in his ruling, stating that "this was unquestionably a 'search' for Fourth Amendment purposes".

This means that US authorities must possess a valid search warrant before hacking a suspect's computer - which marks a major win for privacy campaigners.

Advertisement
Advertisement - Article continues below

Legal opinion on this topic has been divided, however, and as part of a case relating to the same FBI operation, a Virginia District Judge ruled that the government needed no warrant in order to hack a defendant's computer.

The issue has presented a tricky problem for the courts, and according to Ezra, "has brought to light the need for Congressional clarification" regarding a judge's ability to issue warrants in cyber crime cases where the suspects may be using services like Tor to obscure their location.

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now
Advertisement

Recommended

Visit/security/hacking/355774/nigerian-hackers-swindle-millions-of-dollars-from-unemployment-systems
hacking

Nigerian hackers swindle millions of dollars from unemployment systems

22 May 2020
Visit/security/hacking/355773/hackers-take-on-unsuspecting-airliners-exposing-customer-data
hacking

Hackers take on unsuspecting airliners, exposing customer data

22 May 2020
Visit/security/hacking/355749/hackers-targets-game-developers-with-advanced-malware
hacking

Hackers target game developers with advanced malware

21 May 2020
Visit/security/hacking/355738/security-service-of-ukraine-arrests-infamous-hacker-sanix
hacking

Security Service of Ukraine arrests infamous hacker Sanix

21 May 2020

Most Popular

Visit/security/34616/the-top-ten-password-cracking-techniques-used-by-hackers
Security

The top ten password-cracking techniques used by hackers

5 May 2020
Visit/mobile/5g/355712/nokia-5g-speed-record
5G

Nokia breaks 5G record with speeds nearing 5Gbps

20 May 2020
Visit/cloud/cloud-computing/355742/microsoft-launches-public-cloud-service-for-health-care
cloud computing

Microsoft launches public cloud service for health care

21 May 2020