NIT
FBI: Our Malware Sends Unencrypted Evidence, and That's a Good Thing
In fact, it's good for the defendants in the Playpen case, FBI agent says.
A Judge Just Made It Harder for the FBI to Use Hacking
A judge has thrown out evidence obtained by the FBI, because the agency refused to provide the malware code to the defense.
Pressure Mounts on FBI To Reveal Tor Browser Exploit
More lawyers argue for information on an exploit the FBI used in a dark web child porn bust.
It's Not ‘Malware’ When We Have a Warrant, FBI Says
The government is trying to downplay the hacking code it used to identify thousands of anonymous Tor users under a single warrant.
FBI Is One Step Closer To Getting Legal Authority To Hack Computers Everywhere
Privacy activists are calling for Congress to reject the change.
Lawyers: FBI Must Reveal Malware for Hacking Child Porn Users or Drop Its Case
Defense says the government has to either reveal its network investigative technique or drop a case against an alleged child pornography user.
This Technicality Could Spoil the FBI’s Dark Web Hacking Operations
The rule says that if the feds don't know where the target computer is, they can't legally hack it.
Why a Judge Threw Out Evidence From an FBI Mass Hacking Campaign
It involves the seniority of the judge and where exactly the malware's search took place.
The Other Reason the FBI Doesn't Want to Reveal Its Hacking Techniques
The FBI wants to keep its malware under wraps not just to stay ahead of criminals, but also to avoid confrontations from other parts of the government.
Transcript Shows Why a Judge Ordered the FBI to Reveal Its Mass Hacking Malware
“You say you caught me by the use of computer hacking, so how do you do it? How do you do it? A fair question.”
Judge Rules FBI Must Reveal Malware It Used to Hack Over 1,000 Computers
Defense lawyers have been trying to get the code for the FBI’s network investigative technique since September.
FBI: Hacking Tool Only Targeted Child Porn Visitors
An FBI agent involved in the investigation of Playpen says that the hacking tool used was more limited in scope than some may have believed.