Skip to main content

The Feds Are Dropping Child Porn Cases Instead of Revealing Info on Their Surveillance Systems

http://bit.ly/2W6SKEy The Department of Justice has been dismissing child pornography cases in order to not reveal information about the software programs used as the basis for the charges. An array of cases suggest serious problems with the tech tools used by federal authorities. But the private entities who developed these tools won't submit them for independent inspection or hand over hardly any information about how they work, their error rates, or other critical information. As a result, potentially innocent people are being smeared as pedophiles and prosecuted as child porn collectors, while potentially guilty people are going free so these companies can protect "trade secrets." The situation suggests some of the many problems that can arise around public-private partnerships in catching criminals and the secretive digital surveillance software that it entails (software that's being employed for far more than catching child predators). With the child pornography cases, "the defendants are hardly the most sympathetic," notes Tim Cushing at Techdirt. Yet that's all the more reason why the government's antics here are disturbing. Either the feds initially brought bad cases against people whom they just didn't think would fight back, or they're willing to let bad behavior go rather than face some public scrutiny. An extensive investigation by ProPublica "found more than a dozen cases since 2011 that were dismissed either because of challenges to the software's findings, or the refusal by the government or the maker to share the computer programs with defense attorneys, or both," writes Jack Gillum. Many more cases raised issues with the software as a defense. "Defense attorneys have long complained that the government's secrecy claims may hamstring suspects seeking to prove that the software wrongly identified them," notes Gillum. "But the growing success of their counterattack is also raising concerns that, by questioning the software used by investigators, some who trade in child pornography can avoid punishment." Courts have sought to overcome concerns that scrutiny would diminish the effectiveness of the software for law enforcement or infringe on intellectual property rights by ordering only secret and monitored third-party review processes. But federal prosecutors have rejected even these compromises, drawing worry that it's not legitimate concerns driving their secrecy but a lack of confidence in the software's efficacy or some other more nefarious reason. Human Rights Watch (HRW) has raised questions about how much data (not just on defendants but on all Americans) these programs have been accessing and storing. In February, HRW sent a letter to Justice Department officials expressing concerns about one such program, called the Child Protection System (CPS). TLO, the company behind the CPS system, has intervened in court cases to prevent disclosure of more information about the program or independent testing of it. "Since the system is designed to flag people as suspected of having committed crimes, both its error rates and its potential to exceed constitutional bounds have implications for rights," HRW states. Yet "it is unclear what information the Justice Department has about CPS' potential for error (and on what basis)." Prosecutors say they can't share any details about it "because it is proprietary and not in the government's possession," notes HRW, which since 2016 has been researching cases involving the CPS system. "We fear that the government may be shielding its methods from scrutiny by relying on its arrangements with the non-profit," states HRW. (Read more here.) Another tool used in these cases, Torrential Downpour, was developed by the University of Massachusetts. The school has been fighting against the release of more information about Torrential Downpour, too. But defendants' lawyers say it's necessary after the program alerted authorities about alleged child porn on computers that couldn't actually be found anywhere on the physical devices. "An examination of the software being used to build cases should be allowed, but the entities behind the software won't allow it and the government is cutting defendants loose rather than giving them a chance to properly defend themselves against these very serious charges," writes Cushing. "I supposed it ultimately works out for defendants, but it only encourages the government to tip the scales in its favor again when the next prosecution rolls around with the hopes the next defender of the accused isn't quite as zealous" Plus, if these defendants really are innocent, than the government has publicly and falsely smeared them as sickos and then balked at allowing them a true opportunity to clear their names. "These defendants are not very popular, but a dangerous precedent is a dangerous precedent that affects everyone," HRW's Sarah St.Vincent told ProPublica. "And if the government drops cases or some charges to avoid scrutiny of the software, that could prevent victims from getting justice consistently. The government is effectively asserting sweeping surveillance powers but is then hiding from the courts what the software did and how it worked."

Comments

Popular posts from this blog

Friends in all the wrong places

https://ift.tt/2BVSIXZ Striding past the glistening rows of duty-free liquor, watches and perfume, the two international travellers moved like men who could fight. Richard ''Gelly'' Gelemanovic had broad shoulders and a confident gait, while his companion, convicted heroin trafficker Amad ''Jay'' Malkoun, had a physique honed during his 16-year stint in prison. It was July 3, 2003, and Malkoun was recently out of jail, having gained public notoriety after being charged in 1988 as a key player in the state's biggest drug syndicate, which had been busted with $5.5 million of heroin. Amad 'Jay' Malkoun was described by police as 'a powerful standover man'. The federal police who were secretly watching Malkoun at Melbourne's international airport described him in a report as ''a powerful stand-over man … actively involved in the Melbourne drug trade''. The profession of his travelling companion, the man Jay called ...

Chicago police release new video of Jussie Smollett

https://ift.tt/2RVeTEh The Chicago Police Department has released new video of “Empire” actor Jussie Smollett related to an alleged hate crime incident. The video appears to show Smollett walking to an elevator and throwing something into a trash can before leaving the building. What appears to be a white rope could be seen around his neck. Police say that this video is from just prior to when Smollett alleges the attack occurred. RELATED: Police release new video of Jussie Smollett with white rope around neck But Smollett’s attorney says that a rope is not around Smollett’s neck and that he was not throwing anything out in the trash, but looking in the mirror to examine his injuries. Smollett alleges that he was the victim of a racist and homophobic hate crime attack in January. But Chicago police say that Smollett staged the attack. Smollett was indicted on 16 felony counts, but prosecutors unexpectedly dropped all charges. According to prosecutors, Smollett forfeited his $10,000 bai...

Turkish intelligence agency MIT got away with illegal wiretapping of prominent journalist - Nordic Monitor

https://ift.tt/2ZRtSmM A panel of judges acquitted Turkey’s National Intelligence Organization (MIT) of falsifying documents in order to illegally wiretap the telephone of Turkish journalist, academic and author Mehmet Hasan Altan. According to documents obtained by Nordic Monitor, the intelligence agency falsified the legal briefs submitted to the court to secure authorization for the wiretapping of Altan’s two mobile phones on October 30, 2008. In its brief MIT claimed that it wanted to identify an international espionage network and terrorist activities and listed Altan as a suspect under the fake code name “pastor.” The Istanbul 14th High Criminal Court judge approved the request without knowing that the suspect mentioned by MIT was actually a prominent journalist. MIT requested an extension of the wiretap on February 9, 2009 from a judge at the the 11th High Criminal Court and a second extension on May 8, 2009 from the 14th High Criminal Court. Both requests were approved. MIT fil...