Network Investigative Technique
   HOME

TheInfoList



OR:

Network Investigative Technique, or NIT, is a form of
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depri ...
(or hacking) employed by the
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and its principal Federal law enforcement in the United States, federal law enforcement age ...
since at least 2002. It is a
drive-by download Drive-by download is of two types, each concerning the unintended download of computer software from the Internet: # Authorized drive-by downloads are downloads which a person has authorized but without understanding the consequences (e.g. down ...
computer program designed to provide access to a computer.


Controversies

Its usage has raised both Fourth Amendment concerns and
jurisdiction Jurisdiction (from Latin 'law' + 'declaration') is the legal term for the legal authority granted to a legal entity to enact justice. In federations like the United States, areas of jurisdiction apply to local, state, and federal levels. Jur ...
al issues. The FBI has to date, despite a court order, declined to provide the complete code in a child sex abuse case involving the Tor anonymity network. On May 12, 2016
Mozilla Mozilla (stylized as moz://a) is a free software community founded in 1998 by members of Netscape. The Mozilla community uses, develops, spreads and supports Mozilla products, thereby promoting exclusively free software and open standards, wi ...
filed an
amicus curiae An ''amicus curiae'' (; ) is an individual or organization who is not a party to a legal case, but who is permitted to assist a court by offering information, expertise, or insight that has a bearing on the issues in the case. The decision on ...
brief inasmuch as the FBI's exploit against the
Mozilla Mozilla (stylized as moz://a) is a free software community founded in 1998 by members of Netscape. The Mozilla community uses, develops, spreads and supports Mozilla products, thereby promoting exclusively free software and open standards, wi ...
Firefox Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements current and ...
web browsers potentially puts millions of users at risk. It asked that the exploit be told to them before it is told to the defendant, thus raising Fifth Amendment issues as well. Also, US District Judge Robert J. Bryan in Tacoma, Washington has ruled that while the defendant in ''United States v. Michaud'' has the right to review the code, the government also has the right to keep it secret (two other federal judges in related cases have ruled to suppress evidence found as a result of the NIT); On May 25, 2016, however, he ruled that "For the reasons stated orally on the record, evidence of the NIT., the search warrant issued based on the NIT., and the fruits of that warrant should be excluded and should not be offered in evidence at trial..." In March 2017 the
American Civil Liberties Union The American Civil Liberties Union (ACLU) is a nonprofit organization founded in 1920 "to defend and preserve the individual rights and liberties guaranteed to every person in this country by the Constitution and laws of the United States". T ...
,
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ci ...
, and the
National Association of Criminal Defense Lawyers The National Association of Criminal Defense Lawyers (NACDL) is an American criminal defense organization. Members include private criminal defense lawyers, public defenders, active U.S. military defense counsel, law professors, judges, and defe ...
released a 188-page guide to enable meaningful 4th Amendment analysis. In April a Minnesota judge ruled that the warrant was invalid from the moment it was signed, given that the FBI agent ''knew'' that it exceed the jurisdictional requirements of Rule 41. All evidence gathered after that warrant was served was hence the fruit of the poison tree.


See also

*
Computer and Internet Protocol Address Verifier The Computer and Internet Protocol Address Verifier (CIPAV) is a data gathering tool that the Federal Bureau of Investigation (FBI) uses to track and gather location data on suspects under electronic surveillance. The software operates on the tar ...
*
Operation Pacifier Playpen was a notorious darknet child pornography website that operated from August 2014 to March 2015. The website operated through the Tor network which allowed users to use the website anonymously. After running the website for 6 months, the w ...
*
Operation Torpedo Operation Torpedo was a 2011 operation in which the Federal Bureau of Investigation (FBI) compromised three different hidden services hosting child pornography, which would then target anyone who happened to access them using a network investigati ...


References

{{reflist


External links


Playpen affidavit
* ttps://www.documentcloud.org/documents/2830408-MozillaMotion.html#document/p1 Mozilla amicus curiae Computer security exploits Digital forensics software Federal Bureau of Investigation