Knowledge (XXG)

Network Investigative Technique

Source 📝

207: 166:
The "activating" computer's Media Access Control ("MAC") address. The equipment that connects a computer to a network is commonly referred to as a network adapter. Most network adapters have a MAC address assigned by the manufacturer of the adapter that is designed to be a unique identifying number.
85:
has the right to review the code, the government also has the right to keep it secret (two other federal judges in related cases have ruled to suppress evidence found as a result of the NIT); On May 25, 2016, however, he ruled that "For the reasons stated orally on the record, evidence of the NIT.,
167:
A unique MAC address allows for proper routing of communications on a network. Because the MAC address does not change and is intended to be unique, a MAC address can allow law enforcement to identify whether communications sent or received at different times are associated with the same adapter.
454: 162:
The "activating" computer's Host Name. A Host Name is a name that is assigned to a device connected to a computer network that is used to identify the device in various forms of electronic communication, such as communications over the
346: 372: 144:"The NIT will reveal to the government environmental variables and certain registry-type information that may assist in identifying the computer, its location, and the user of the computer...." 446: 424: 101:
released a 188-page guide to enable meaningful 4th Amendment analysis. In April a Minnesota judge ruled that the warrant was invalid from the moment it was signed, given that the FBI agent
398: 342: 268: 51: 78: 98: 320: 294: 197: 343:"Mozilla Asks Court To Force FBI To Turn Over Information On Hacking Tool It Used In Child Porn Case: from the only-criminals-use-patched-browsers-amirite? dept" 368: 395:"Once more, a judge rules against gov't in Tor-enabled child porn case: DOJ may appeal: "We are disappointed with the ruling and considering our options."" 138: 151:
A unique identifier (e.g., a series of numbers, letters, and/or special characters) to distinguish the data from that of other "activating" computers.
369:"Judge says suspect has right to review code that FBI has right to keep secret: At issue is Tor malware that enabled the FBI to bust child porn ring" 513: 420: 77:
web browsers potentially puts millions of users at risk. It asked that the exploit be told to them before it is told to the defendant, thus raising
394: 86:
the search warrant issued based on the NIT., and the fruits of that warrant should be excluded and should not be offered in evidence at trial..."
291:"The FBI must provide details on the network investigative technique used to hack more than 1000 computers in a case involving child pornography" 156:
The type of operating system running on the computer, including type (e.g., Windows), version (e.g., Windows 7), and architecture (e.g., x 86);
125:
successfully litigated (see ) the release of U.S. sealed court records that revealed details about a NIT deployed in 2016 on 23 separate
508: 503: 264: 58:
issues. The FBI has to date, despite a court order, declined to provide the complete code in a child sex abuse case involving the
290: 483: 421:"To fight Tor hack prosecutions, activist groups offer up legal help: Guide is intended to help level the legal playing field" 242: 94: 90: 316: 110: 31: 148:
The "activating" computer's actual IP address, and the date and time that the NIT determines what that IP address is;
81:
issues as well. Also, US District Judge Robert J. Bryan in Tacoma, Washington has ruled that while the defendant in
488: 59: 134: 122: 447:"Judge Says FBI's NIT Warrant Invalid, Points Out FBI Agent Knew It Was Invalid When He Requested It" 185: 180: 39: 159:
Information about whether the NIT has already been delivered to the "activating" computer;
126: 497: 130: 67: 137:
submitted by a Special Agent of the FBI (affidavit template formerly written by the
234: 176:
There is a growing list of government operations that are known to have used NITS.
55: 206: 478: 212: 202: 106: 74: 71: 63: 27: 265:"This Technicality Could Spoil the FBI's Dark Web Hacking Operations" 235:"Visit the Wrong Website, and the FBI Could End Up in Your Computer" 109:. All evidence gathered after that warrant was served was hence the 153:
That unique identifier will be sent with and collected by the NIT;
35: 42:
computer program designed to provide access to a computer.
317:"FBI Refuses to Divulge How It Tracked Pedophiles on Tor" 105:that it exceed the jurisdictional requirements of 141:) indicated the NIT had the following abilities: 99:National Association of Criminal Defense Lawyers 70:brief inasmuch as the FBI's exploit against the 198:Computer and Internet Protocol Address Verifier 484:Ferrell warrant describing some aspects of NIT 263:Franceschi-Bicchierai, Lorenzo (2016-04-21). 8: 225: 7: 117:Examples of government deployed NITs 289:Paganini, Pierluigi (2016-02-22). 14: 205: 514:Federal Bureau of Investigation 457:from the original on 2017-04-09 427:from the original on 2024-07-29 401:from the original on 2016-05-25 375:from the original on 2016-05-19 349:from the original on 2016-05-12 323:from the original on 2024-07-29 315:Condliffe, Jamie (2016-03-30). 297:from the original on 2024-07-29 271:from the original on 2016-04-24 245:from the original on 2018-01-11 20:Network Investigative Technique 95:Electronic Frontier Foundation 91:American Civil Liberties Union 1: 445:Cushing, Tim (7 April 2017). 419:Farivar, Cyrus (2017-03-30). 393:Farivar, Cyrus (2016-05-25). 367:Farivar, Cyrus (2016-05-19). 172:List of Government Operations 38:since at least 2002. It is a 341:Cushing, Jim (2016-05-12). 111:fruit of the poisonous tree 530: 509:Digital forensics software 504:Computer security exploits 50:Its usage has raised both 453:(published 2017-04-07). 83:United States v. Michaud 16:Malware used by the FBI 489:Mozilla amicus curiae 123:Privacy International 60:Tor anonymity network 293:. Security Affairs. 186:Operation Pacifier 89:In March 2017 the 62:. On May 12, 2016 34:) employed by the 479:Playpen affidavit 181:Operation Torpedo 40:drive-by download 521: 466: 465: 463: 462: 442: 436: 435: 433: 432: 423:. Ars Technica. 416: 410: 409: 407: 406: 397:. Ars Technica. 390: 384: 383: 381: 380: 371:. Ars Technica. 364: 358: 357: 355: 354: 338: 332: 331: 329: 328: 312: 306: 305: 303: 302: 286: 280: 279: 277: 276: 260: 254: 253: 251: 250: 233:Poulsen, Kevin. 230: 215: 210: 209: 52:Fourth Amendment 529: 528: 524: 523: 522: 520: 519: 518: 494: 493: 475: 470: 469: 460: 458: 444: 443: 439: 430: 428: 418: 417: 413: 404: 402: 392: 391: 387: 378: 376: 366: 365: 361: 352: 350: 340: 339: 335: 326: 324: 314: 313: 309: 300: 298: 288: 287: 283: 274: 272: 267:. Motherboard. 262: 261: 257: 248: 246: 232: 231: 227: 222: 211: 204: 194: 174: 152: 145: 135:sworn affidavit 119: 79:Fifth Amendment 48: 26:) is a form of 17: 12: 11: 5: 527: 525: 517: 516: 511: 506: 496: 495: 492: 491: 486: 481: 474: 473:External links 471: 468: 467: 437: 411: 385: 359: 333: 307: 281: 255: 224: 223: 221: 218: 217: 216: 201: 200: 193: 190: 189: 188: 183: 173: 170: 169: 168: 164: 160: 157: 154: 149: 143: 127:onion services 118: 115: 56:jurisdictional 47: 44: 15: 13: 10: 9: 6: 4: 3: 2: 526: 515: 512: 510: 507: 505: 502: 501: 499: 490: 487: 485: 482: 480: 477: 476: 472: 456: 452: 448: 441: 438: 426: 422: 415: 412: 400: 396: 389: 386: 374: 370: 363: 360: 348: 344: 337: 334: 322: 318: 311: 308: 296: 292: 285: 282: 270: 266: 259: 256: 244: 240: 236: 229: 226: 219: 214: 208: 203: 199: 196: 195: 191: 187: 184: 182: 179: 178: 177: 171: 165: 161: 158: 155: 150: 147: 146: 142: 140: 136: 132: 131:Tor (network) 128: 124: 121:The ACLU and 116: 114: 112: 108: 104: 100: 96: 92: 87: 84: 80: 76: 73: 69: 68:amicus curiae 65: 61: 57: 54:concerns and 53: 46:Controversies 45: 43: 41: 37: 33: 29: 25: 21: 459:. Retrieved 450: 440: 429:. Retrieved 414: 403:. Retrieved 388: 377:. Retrieved 362: 351:. Retrieved 345:. TechDirt. 336: 325:. Retrieved 310: 299:. Retrieved 284: 273:. Retrieved 258: 247:. Retrieved 238: 228: 175: 120: 102: 88: 82: 49: 23: 19: 18: 319:. Gizmodo. 498:Categories 461:2017-04-08 431:2017-03-30 405:2016-05-25 379:2016-05-20 353:2016-05-12 327:2016-04-30 301:2016-04-30 275:2016-04-30 249:2016-04-30 220:References 213:Law portal 97:, and the 163:Internet; 66:filed an 455:Archived 451:TechDirt 425:Archived 399:Archived 373:Archived 347:Archived 321:Archived 295:Archived 269:Archived 243:Archived 192:See also 129:of the 107:Rule 41 75:Firefox 72:Mozilla 64:Mozilla 32:hacking 28:malware 133:. The 239:Wired 139:NAIC 103:knew 30:(or 36:FBI 24:NIT 500:: 449:. 241:. 237:. 113:. 93:, 464:. 434:. 408:. 382:. 356:. 330:. 304:. 278:. 252:. 22:(

Index

malware
hacking
FBI
drive-by download
Fourth Amendment
jurisdictional
Tor anonymity network
Mozilla
amicus curiae
Mozilla
Firefox
Fifth Amendment
American Civil Liberties Union
Electronic Frontier Foundation
National Association of Criminal Defense Lawyers
Rule 41
fruit of the poisonous tree
Privacy International
onion services
Tor (network)
sworn affidavit
NAIC
Operation Torpedo
Operation Pacifier
Computer and Internet Protocol Address Verifier
icon
Law portal
"Visit the Wrong Website, and the FBI Could End Up in Your Computer"
Archived
"This Technicality Could Spoil the FBI's Dark Web Hacking Operations"

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.