A United States federal judge this week threw out evidence obtained by the FBI through hacking, marking the first time a defendant’s challenge against federal malware was successful, Motherboard reports.
The Federal Bureau of Investigation’s defeat is a victory for privacy activists and groups like the Electronic Frontier Foundation (EFF), which argued that a single warrant should not allow the FBI to hack thousands of computers all over the world simultaneously.
The legal battle came in a trial against an accused member of a Dark Net child pornography site known as Playpen. The malware was used after the FBI seized the anonymous website, installed malware that infected visitors, and continued to run it in order to reveal the site’s visitors from Feb. 20 to March 4, 2015.
The order was issued by Judge William G. Young of the U.S. District Court of Massachusetts on evidence collected against one of the alleged Playpen users, Alex Levin.
Levin’s lawyer, a public defender, argued that because the FBI used a warrant issued by a Virginia magistrate judge and Levin’s computer and home are in Massachusetts, the investigators overreached the judge’s jurisdiction.
The EFF called the original warrant “unconstitutional.”
“Based on the foregoing analysis, the Court concludes that the NIT warrant was issued without jurisdiction and thus was void ab initio,” Judge Young wrote in his order suppressing the evidence. “It follows that the resulting search was conducted as though there were no warrant at all.”
Court rules that the FBI relied on an invalid search warrant when it added malware to a Tor network child porn site. pic.twitter.com/3BzZybCOyD— Brad Heath (@bradheath) April 20, 2016
If the FBI wants to hack computers to find out where they are, it needs to ask a district judge, not a magistrate. pic.twitter.com/bXeOULIJrn— Brad Heath (@bradheath) April 20, 2016
The evidence is now excluded from the trial.