207:
166:
The "activating" computer's Media Access
Control ("MAC") address. The equipment that connects a computer to a network is commonly referred to as a network adapter. Most network adapters have a MAC address assigned by the manufacturer of the adapter that is designed to be a unique identifying number.
85:
has the right to review the code, the government also has the right to keep it secret (two other federal judges in related cases have ruled to suppress evidence found as a result of the NIT); On May 25, 2016, however, he ruled that "For the reasons stated orally on the record, evidence of the NIT.,
167:
A unique MAC address allows for proper routing of communications on a network. Because the MAC address does not change and is intended to be unique, a MAC address can allow law enforcement to identify whether communications sent or received at different times are associated with the same adapter.
454:
162:
The "activating" computer's Host Name. A Host Name is a name that is assigned to a device connected to a computer network that is used to identify the device in various forms of electronic communication, such as communications over the
346:
372:
144:"The NIT will reveal to the government environmental variables and certain registry-type information that may assist in identifying the computer, its location, and the user of the computer...."
446:
424:
101:
released a 188-page guide to enable meaningful 4th
Amendment analysis. In April a Minnesota judge ruled that the warrant was invalid from the moment it was signed, given that the FBI agent
398:
342:
268:
51:
78:
98:
320:
294:
197:
343:"Mozilla Asks Court To Force FBI To Turn Over Information On Hacking Tool It Used In Child Porn Case: from the only-criminals-use-patched-browsers-amirite? dept"
368:
395:"Once more, a judge rules against gov't in Tor-enabled child porn case: DOJ may appeal: "We are disappointed with the ruling and considering our options.""
138:
151:
A unique identifier (e.g., a series of numbers, letters, and/or special characters) to distinguish the data from that of other "activating" computers.
369:"Judge says suspect has right to review code that FBI has right to keep secret: At issue is Tor malware that enabled the FBI to bust child porn ring"
513:
420:
77:
web browsers potentially puts millions of users at risk. It asked that the exploit be told to them before it is told to the defendant, thus raising
394:
86:
the search warrant issued based on the NIT., and the fruits of that warrant should be excluded and should not be offered in evidence at trial..."
291:"The FBI must provide details on the network investigative technique used to hack more than 1000 computers in a case involving child pornography"
156:
The type of operating system running on the computer, including type (e.g., Windows), version (e.g., Windows 7), and architecture (e.g., x 86);
125:
successfully litigated (see ) the release of U.S. sealed court records that revealed details about a NIT deployed in 2016 on 23 separate
508:
503:
264:
58:
issues. The FBI has to date, despite a court order, declined to provide the complete code in a child sex abuse case involving the
290:
483:
421:"To fight Tor hack prosecutions, activist groups offer up legal help: Guide is intended to help level the legal playing field"
242:
94:
90:
316:
110:
31:
148:
The "activating" computer's actual IP address, and the date and time that the NIT determines what that IP address is;
81:
issues as well. Also, US District Judge Robert J. Bryan in Tacoma, Washington has ruled that while the defendant in
488:
59:
134:
122:
447:"Judge Says FBI's NIT Warrant Invalid, Points Out FBI Agent Knew It Was Invalid When He Requested It"
185:
180:
39:
159:
Information about whether the NIT has already been delivered to the "activating" computer;
126:
497:
130:
67:
137:
submitted by a
Special Agent of the FBI (affidavit template formerly written by the
234:
176:
There is a growing list of government operations that are known to have used NITS.
55:
206:
478:
212:
202:
106:
74:
71:
63:
27:
265:"This Technicality Could Spoil the FBI's Dark Web Hacking Operations"
235:"Visit the Wrong Website, and the FBI Could End Up in Your Computer"
109:. All evidence gathered after that warrant was served was hence the
153:
That unique identifier will be sent with and collected by the NIT;
35:
42:
computer program designed to provide access to a computer.
317:"FBI Refuses to Divulge How It Tracked Pedophiles on Tor"
105:that it exceed the jurisdictional requirements of
141:) indicated the NIT had the following abilities:
99:National Association of Criminal Defense Lawyers
70:brief inasmuch as the FBI's exploit against the
198:Computer and Internet Protocol Address Verifier
484:Ferrell warrant describing some aspects of NIT
263:Franceschi-Bicchierai, Lorenzo (2016-04-21).
8:
225:
7:
117:Examples of government deployed NITs
289:Paganini, Pierluigi (2016-02-22).
14:
205:
514:Federal Bureau of Investigation
457:from the original on 2017-04-09
427:from the original on 2024-07-29
401:from the original on 2016-05-25
375:from the original on 2016-05-19
349:from the original on 2016-05-12
323:from the original on 2024-07-29
315:Condliffe, Jamie (2016-03-30).
297:from the original on 2024-07-29
271:from the original on 2016-04-24
245:from the original on 2018-01-11
20:Network Investigative Technique
95:Electronic Frontier Foundation
91:American Civil Liberties Union
1:
445:Cushing, Tim (7 April 2017).
419:Farivar, Cyrus (2017-03-30).
393:Farivar, Cyrus (2016-05-25).
367:Farivar, Cyrus (2016-05-19).
172:List of Government Operations
38:since at least 2002. It is a
341:Cushing, Jim (2016-05-12).
111:fruit of the poisonous tree
530:
509:Digital forensics software
504:Computer security exploits
50:Its usage has raised both
453:(published 2017-04-07).
83:United States v. Michaud
16:Malware used by the FBI
489:Mozilla amicus curiae
123:Privacy International
60:Tor anonymity network
293:. Security Affairs.
186:Operation Pacifier
89:In March 2017 the
62:. On May 12, 2016
34:) employed by the
479:Playpen affidavit
181:Operation Torpedo
40:drive-by download
521:
466:
465:
463:
462:
442:
436:
435:
433:
432:
423:. Ars Technica.
416:
410:
409:
407:
406:
397:. Ars Technica.
390:
384:
383:
381:
380:
371:. Ars Technica.
364:
358:
357:
355:
354:
338:
332:
331:
329:
328:
312:
306:
305:
303:
302:
286:
280:
279:
277:
276:
260:
254:
253:
251:
250:
233:Poulsen, Kevin.
230:
215:
210:
209:
52:Fourth Amendment
529:
528:
524:
523:
522:
520:
519:
518:
494:
493:
475:
470:
469:
460:
458:
444:
443:
439:
430:
428:
418:
417:
413:
404:
402:
392:
391:
387:
378:
376:
366:
365:
361:
352:
350:
340:
339:
335:
326:
324:
314:
313:
309:
300:
298:
288:
287:
283:
274:
272:
267:. Motherboard.
262:
261:
257:
248:
246:
232:
231:
227:
222:
211:
204:
194:
174:
152:
145:
135:sworn affidavit
119:
79:Fifth Amendment
48:
26:) is a form of
17:
12:
11:
5:
527:
525:
517:
516:
511:
506:
496:
495:
492:
491:
486:
481:
474:
473:External links
471:
468:
467:
437:
411:
385:
359:
333:
307:
281:
255:
224:
223:
221:
218:
217:
216:
201:
200:
193:
190:
189:
188:
183:
173:
170:
169:
168:
164:
160:
157:
154:
149:
143:
127:onion services
118:
115:
56:jurisdictional
47:
44:
15:
13:
10:
9:
6:
4:
3:
2:
526:
515:
512:
510:
507:
505:
502:
501:
499:
490:
487:
485:
482:
480:
477:
476:
472:
456:
452:
448:
441:
438:
426:
422:
415:
412:
400:
396:
389:
386:
374:
370:
363:
360:
348:
344:
337:
334:
322:
318:
311:
308:
296:
292:
285:
282:
270:
266:
259:
256:
244:
240:
236:
229:
226:
219:
214:
208:
203:
199:
196:
195:
191:
187:
184:
182:
179:
178:
177:
171:
165:
161:
158:
155:
150:
147:
146:
142:
140:
136:
132:
131:Tor (network)
128:
124:
121:The ACLU and
116:
114:
112:
108:
104:
100:
96:
92:
87:
84:
80:
76:
73:
69:
68:amicus curiae
65:
61:
57:
54:concerns and
53:
46:Controversies
45:
43:
41:
37:
33:
29:
25:
21:
459:. Retrieved
450:
440:
429:. Retrieved
414:
403:. Retrieved
388:
377:. Retrieved
362:
351:. Retrieved
345:. TechDirt.
336:
325:. Retrieved
310:
299:. Retrieved
284:
273:. Retrieved
258:
247:. Retrieved
238:
228:
175:
120:
102:
88:
82:
49:
23:
19:
18:
319:. Gizmodo.
498:Categories
461:2017-04-08
431:2017-03-30
405:2016-05-25
379:2016-05-20
353:2016-05-12
327:2016-04-30
301:2016-04-30
275:2016-04-30
249:2016-04-30
220:References
213:Law portal
97:, and the
163:Internet;
66:filed an
455:Archived
451:TechDirt
425:Archived
399:Archived
373:Archived
347:Archived
321:Archived
295:Archived
269:Archived
243:Archived
192:See also
129:of the
107:Rule 41
75:Firefox
72:Mozilla
64:Mozilla
32:hacking
28:malware
133:. The
239:Wired
139:NAIC
103:knew
30:(or
36:FBI
24:NIT
500::
449:.
241:.
237:.
113:.
93:,
464:.
434:.
408:.
382:.
356:.
330:.
304:.
278:.
252:.
22:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.