Feds use malware to ensnare child porn users

WASHINGTON — The user’s online handle was Pewter, and while logged onto a website called Playpen, he allegedly downloaded images of young girls being sexually molested.

Pewter had carefully covered his tracks. To reach the site, he first had to install free software called Tor, the world’s most widely-used tool for giving users anonymity online.

In order to uncover Pewter’s true identity and location, the FBI quietly turned to a technique more typically used by hackers. The agency, with a warrant, surreptitiously placed computer code, or malware, on all computers that logged into the Playpen site. When Pewter connected, the malware exploited a flaw in his browser, forcing his computer to reveal its true Internet protocol address. From there, a subpoena to Comcast yielded his real name and address.

Pewter was unmasked last year as Jay Michaud, a 62-year-old administrator in the Vancouver, Wash., public schools. With a second warrant, agents searched the suspect’s home and found a thumb drive that allegedly contained multiple images of children engaged in sex acts. Last July, Michaud was arrested and charged with possession of child pornography.

Michaud’s is the lead case in a sweeping national investigation into child porn on the so-called dark Web, the universe of sites that are off Google’s radar and where users can operate with anonymity.

As criminals become savvier about using technology such as Tor to hide their tracks, investigators are turning to hacking tools to thwart them. In some cases, law enforcement is placing malware on sites that might have thousands of users. Some privacy advocates and analysts worry that in doing so, investigators may also wind up hacking and identifying the computers of law-abiding people who are seeking to remain anonymous, people who can also include political dissidents and journalists.

“As the hacking techniques become more ambitious, failure in execution can lead to large-scale privacy and civil liberties abuses at home and abroad,” said Ahmed Ghappour, a professor at the University of California Hastings College of Law. “It’s imperative that Congress step in to regulate exactly who and how law enforcement may hack.”

But Justice Department officials said that the government investigates crime based on evidence of illegal activities. “When we obtain a warrant, it’s because we have convinced a judge that there is probable cause that we’ll be able to find evidence in a particular location,” said a senior department official, who spoke on condition of anonymity under ground rules set by the department.

In the Playpen case, the government activated malware on a site with 215,000 members as of last February and obtained Internet protocol addresses of 1,300 computers. Out of that group, the government said it has charged 137 people.

“It’s a lot of people,” said Colin Fieman, a public defender in Tacoma representing Michaud. “There never has been any warrant I’ve seen that allows searches on that scale. It is unprecedented.”

Michaud is arguing that his charges be dismissed on grounds that the government’s use of the tool violated the Fourth Amendment. Fieman argues that some people might have gone to the site seeking to express fantasies, which while repugnant, are legal. The site, he said, doesn’t clearly advertise itself as devoted to child pornogaphy.

He likened the government’s warrant to a “general warrant,” referring to the British practice during the colonial era of allowing government searches without any individualized suspicion.

A judge in the case is scheduled on Friday to hear a defense motion to throw out the charges against Michaud.

“This is a gray area in the law,” said Thomas Brown, a former federal prosecutor in the Southern District of New York who handled cases involving the use of hacking techniques. “It’s another instance where you’ve got technology outstripping the law.”

Fieman also said that rules established by the federal courts, grounded in constitutional principles, require that a warrant be deployed in the district in which it is issued – in this case, the Eastern District of Virginia. Michaud’s computer was in Vancouver.

But prosecutors argue that the technique is lawful and that in general a warrant may be issued even when the location to be searched is unknown, as long as there is probable cause that the search will turn up evidence of a crime.

“The Supreme Court has made clear that the Fourth Amendment … does not preclude use of warrants where the purpose of the search is to discover the location of the place to be searched,” said David Bitkower, then a deputy assistant attorney general, in a Dec. 2014 letter to a federal courts committee weighing changes to the rule that governs how search warrants are issued.

In the Playpen case, the government argued that it had probable cause to search the computers of anyone who navigated to the site – whether one person or 10,000 people – on the grounds that the site was devoted to child porn and anybody who knew how to get to it likely did so with the intent to view the content. The site can’t be found through a Google search and can only be reached by users who know its exact, algorithm-generated Web address and are using special software that connects to the Tor network.

In such a case, “we have an obligation to investigate all 10,000 1/8people3/8, not just one,” prosecutor Keith Becker told Judge Robert J. Bryan of the U.S. District Court at a hearing in the Western District of Washington at Tacoma in December.

The FBI seized Playpen last year, and after operating it for two weeks, shut it down. During those two weeks, according to court documents, it deployed what it obliquely calls a “network investigative technique,” or NIT, to capture the IP address of anyone who logged into the website.

“In general, the constitution doesn’t say that we have to stop investigating just because we need to use a computer technique to identify suspects rather than opening a letter or entering a private house,” said the senior department official. “The law doesn’t give online pedophiles immunity from court-authorized search warrants just because they’re using modern software.”

Fieman also argued that the government itself violated the law when it seized Playpen last year and then rather than shut it down immediately or find ways to reroute visitors, continued to operate the child porn site.

“What the government did is comparable to flooding a neighborhood with heroin in the hope of snaring an assortment of low-level drug users,” Fieman said in a motion to dismiss filed in November.

Justice Department spokesman Peter Carr said that “at no time in an operation like this does the FBI post any images, videos or links to images of child pornography.” Any such postings are done by website users, not the FBI, he said. Also, he said, immediately shutting down a website would prevent law enforcement from identifying the offenders and frustrate efforts to identify and rescue child victims from abuse.

Without using the hacking technique, officials say, it would be very difficult to locate pedophiles who go to great lengths to hide their tracks.

The issue, said Ghappour, the law professor, is not the use of the malware per se, but “whether hacking warrants are written narrowly enough to guarantee that only those culpable set the trigger 1/8to launch the NIT3/8, and consequently get hacked,” he said. “Given the scale of these operations, the smallest mistake could result in hundreds, if not thousands, of privacy violations.”

Privacy advocates concerned about the government doing mass hacks point to the case of TorMail, an anonymous email service, now shuttered. TorMail, which despite the name is not affiliated with the group behind Tor, was used by a range of people, from criminals to dissidents and journalists.

In the summer of 2013, reports surfaced of people trying to log in to TorMail and finding a Down for Maintenance message instead, and finding suspicious-looking code included in the TorMail Web page. Security researchers who analyzed the code concluded that it was likely placed there by the FBI.

At the time, the government would not confirm that the bureau was behind the hack. This week, people familiar with the investigation confirmed the FBI had used an NIT on TorMail. But, they said, the bureau obtained a warrant that listed specific email accounts within TorMail for which there was probable cause to believe the true user was engaged in illicit child pornography activities. In that way, the sources said, only suspects whose accounts had in some way been linked to involvement in child porn would have their computers infected.

An FBI official said the bureau recognizes that the use of the NIT is “intrusive” and should only be used “in the most serious cases.” He said the FBI uses the tool only against offenders who are “the worst of the worst.”

Talk to us

More in Local News

Marysville firefighters respond to a 12-year-old boy who fell down a well Tuesday May 30, 2023 in Marysville, Washington. (Photo provided by Marysville Fire District)
Marysville firefighters save boy who fell 20 feet into well

The 12-year-old child held himself up by grabbing on to a plastic pipe while firefighters worked to save him.

Highway 9 is set to be closed in both directions for a week as construction crews build a roundabout at the intersection with Vernon Road. (Washington State Department of Transportation)
Weeklong closure coming to Highway 9 section in Lake Stevens

Travelers should expect delays or find another way from Friday to Thursday between Highway 204 and Lundeen Parkway.

Students arriving off the bus get in line to score some waffles during a free pancake and waffle breakfast at Lowell Elementary School on Friday, May 26, 2023, in Everett, Washington. (Ryan Berry / The Herald)
800 free pancakes at Everett’s Lowell Elementary feed the masses

The annual breakfast was started to connect the community and the school, as well as to get people to interact.

Marysville Mayor Jon Nehring speaks at the groundbreaking event for the I-5/SR 529 Interchange project on Tuesday, May 23, 2023 in Marysville, Washington. (Olivia Vanni / The Herald)
$123M project starting on Highway 529 interchange, I-5 HOV lane

A reader wondered why the highway had a lane closure despite not seeing work done. Crews were waiting on the weather.

Justin Bell was convicted earlier this month of first-degree assault for a December 2017 shooting outside a Value Village in Everett. (Caleb Hutton / Herald file)
Court: Snohomish County jurors’ opaque masks didn’t taint verdict

During the pandemic, Justin Bell, 32, went on trial for a shooting. Bell claims his right to an impartial jury was violated.

Gary Fontes uprights a tree that fell over in front of The Fontes Manor — a miniature handmade bed and breakfast — on Friday, May 12, 2023, at his home near Silver Lake in Everett, Washington. (Ryan Berry / The Herald)
Everett’s mini-Frank Lloyd Wright builds neighborhood of extra tiny homes

A tiny lighthouse, a spooky mansion and more: Gary Fontes’ miniature world of architectural wonders is one-twelfth the size of real life.

Will Steffener
Inslee appoints Steffener as Superior Court judge

Attorney Will Steffener will replace Snohomish County Superior Court Judge Janice Ellis, who is retiring in June.

Panelists from different areas of mental health care speak at the Herald Forum about mental health care on Wednesday, May 31, 2023 in Snohomish, Washington. (Olivia Vanni / The Herald)
At panel, mental health experts brainstorm answers to staff shortages

Workforce shortages, insurance coverage and crisis response were in focus at the Snohomish forum hosted by The Daily Herald.

Marysville
Police: Marysville man fist-bumped cop, exposing tattoos of wanted robber

The suspect told police he robbed three stores to pay off a drug debt. He’d just been released from federal prison for another armed robbery.

Most Read