Skip to main content

The Feds Are Dropping Child Porn Cases Instead of Revealing Info on Their Surveillance Systems

http://bit.ly/2W6SKEy The Department of Justice has been dismissing child pornography cases in order to not reveal information about the software programs used as the basis for the charges. An array of cases suggest serious problems with the tech tools used by federal authorities. But the private entities who developed these tools won't submit them for independent inspection or hand over hardly any information about how they work, their error rates, or other critical information. As a result, potentially innocent people are being smeared as pedophiles and prosecuted as child porn collectors, while potentially guilty people are going free so these companies can protect "trade secrets." The situation suggests some of the many problems that can arise around public-private partnerships in catching criminals and the secretive digital surveillance software that it entails (software that's being employed for far more than catching child predators). With the child pornography cases, "the defendants are hardly the most sympathetic," notes Tim Cushing at Techdirt. Yet that's all the more reason why the government's antics here are disturbing. Either the feds initially brought bad cases against people whom they just didn't think would fight back, or they're willing to let bad behavior go rather than face some public scrutiny. An extensive investigation by ProPublica "found more than a dozen cases since 2011 that were dismissed either because of challenges to the software's findings, or the refusal by the government or the maker to share the computer programs with defense attorneys, or both," writes Jack Gillum. Many more cases raised issues with the software as a defense. "Defense attorneys have long complained that the government's secrecy claims may hamstring suspects seeking to prove that the software wrongly identified them," notes Gillum. "But the growing success of their counterattack is also raising concerns that, by questioning the software used by investigators, some who trade in child pornography can avoid punishment." Courts have sought to overcome concerns that scrutiny would diminish the effectiveness of the software for law enforcement or infringe on intellectual property rights by ordering only secret and monitored third-party review processes. But federal prosecutors have rejected even these compromises, drawing worry that it's not legitimate concerns driving their secrecy but a lack of confidence in the software's efficacy or some other more nefarious reason. Human Rights Watch (HRW) has raised questions about how much data (not just on defendants but on all Americans) these programs have been accessing and storing. In February, HRW sent a letter to Justice Department officials expressing concerns about one such program, called the Child Protection System (CPS). TLO, the company behind the CPS system, has intervened in court cases to prevent disclosure of more information about the program or independent testing of it. "Since the system is designed to flag people as suspected of having committed crimes, both its error rates and its potential to exceed constitutional bounds have implications for rights," HRW states. Yet "it is unclear what information the Justice Department has about CPS' potential for error (and on what basis)." Prosecutors say they can't share any details about it "because it is proprietary and not in the government's possession," notes HRW, which since 2016 has been researching cases involving the CPS system. "We fear that the government may be shielding its methods from scrutiny by relying on its arrangements with the non-profit," states HRW. (Read more here.) Another tool used in these cases, Torrential Downpour, was developed by the University of Massachusetts. The school has been fighting against the release of more information about Torrential Downpour, too. But defendants' lawyers say it's necessary after the program alerted authorities about alleged child porn on computers that couldn't actually be found anywhere on the physical devices. "An examination of the software being used to build cases should be allowed, but the entities behind the software won't allow it and the government is cutting defendants loose rather than giving them a chance to properly defend themselves against these very serious charges," writes Cushing. "I supposed it ultimately works out for defendants, but it only encourages the government to tip the scales in its favor again when the next prosecution rolls around with the hopes the next defender of the accused isn't quite as zealous" Plus, if these defendants really are innocent, than the government has publicly and falsely smeared them as sickos and then balked at allowing them a true opportunity to clear their names. "These defendants are not very popular, but a dangerous precedent is a dangerous precedent that affects everyone," HRW's Sarah St.Vincent told ProPublica. "And if the government drops cases or some charges to avoid scrutiny of the software, that could prevent victims from getting justice consistently. The government is effectively asserting sweeping surveillance powers but is then hiding from the courts what the software did and how it worked."

Comments

Popular posts from this blog

Friends in all the wrong places

https://ift.tt/2BVSIXZ Striding past the glistening rows of duty-free liquor, watches and perfume, the two international travellers moved like men who could fight. Richard ''Gelly'' Gelemanovic had broad shoulders and a confident gait, while his companion, convicted heroin trafficker Amad ''Jay'' Malkoun, had a physique honed during his 16-year stint in prison. It was July 3, 2003, and Malkoun was recently out of jail, having gained public notoriety after being charged in 1988 as a key player in the state's biggest drug syndicate, which had been busted with $5.5 million of heroin. Amad 'Jay' Malkoun was described by police as 'a powerful standover man'. The federal police who were secretly watching Malkoun at Melbourne's international airport described him in a report as ''a powerful stand-over man … actively involved in the Melbourne drug trade''. The profession of his travelling companion, the man Jay called '

Kim Constable – Irish leader of NXIVM – jokes about working out in prison; shows results of badass workouts

http://bit.ly/2WTRg0f Kim Constable, 39 – one of Sara Bronfman’s ‘girls’ – is the leader of NXIVM in Ireland. She lives in Belfast and is also the leader of Rainbow Cultural Garden there. According to a source, she recruited at least one underage teen girl who was almost shipped to the USA with Allison Mack for the branding iron of DOS. Fortunately, the teen girl – with her mother’s help – escaped at the last minute. But not before there was a little violence and the threat of something truly sinister – which frightened the girl. I will tell more of that story later. For now, let us say hello to Kim. In addition to her NXIVM work, she is a vegan body-builder and sells courses on how to look like her. Her husband is a famous ex-athlete, Ulster rugby player Ryan Constable (46) who owns a sports management company. They have four children: Corey (12), Kai (11), Miya (8) and Jack (6). At one time, they all slept in the same 18-foot bed together. I am not clear where the Rainbow nannies sle