Network Investigative Techniques
The attempt failed, but so-called "network investigative techniques" are not limited to the FBI, according to newly unsealed court records.
In an attempt to identify someone tricking a company into handing over cash, the FBI created a fake FedEx website, as well as deployed booby-trapped Word documents to reveal fraudsters' IP addresses.
Finally, the warrants and affidavits related to the FBI’s use of malware on TorMail have been unsealed.
The rule says that if the feds don't know where the target computer is, they can't legally hack it.
The Department of Justice isn't keeping tabs on how many times the FBI and other agencies have been authorized, or asked for permission, to use such techniques.
It involves the seniority of the judge and where exactly the malware's search took place.
The bureau didn’t call it that way, but it used techniques usually associated with hackers.