Black Hat Briefings
FBI’s Hacking Tool “NIT” Is Not A Malware

However, in the recent Playpen case which involved the identification of a few suspe.cts in a child porn ring site, Daniel Alfin, an FBI agent has argued that the hacking tool called Network Investigative Technique (NIT) used to identify the Playpen userscannot be considered as “malware.”
In many of the related cases, the warrant that was employed by the FBI to deploy the NIT has been considered invalid as per the jurisdictional limits imposed by Rule 41.
NIT Malware?
It was last year that FBI hacked a dark web child-porn site called Playpen and identified thousands of users. The FBI employed a hacking tool, NIT, which used one single warrant to uncover close to 1,300 hidden IP addresses of the users. These addresses were then traced back to the individuals.
In this context, during testimony earlierlast month by FBI agent Daniel Alfin, he argued that the hacking tool used to identify many suspects of the child-porn ring Playpen, including Jay Michaud, cannot be considered as malware because it had the authorization of the court and did not damage the computer’s security.
FBI’s NIT worked as follows: The NIT software was installed in the machines in such a way that when anyone accessed the Playpen website using the Tor browser, their IP addresses were returned.
The FBI took full control of the Playpen site to install the NIT, distribute child abuse images for two weeks and later identify the computers from which the site was accessed. Though Alfin’s argument can be thought of as correct in a limited sense, the allegation was that NIT stripped the users’ protection of maintaining anonymity without their knowledge.
Some users used Tor to mask their identities most likely when seeking illegalcontents. The NIT can be considered as “malware” by definition because it was installed to remove the protection that was consciously deployed by the users.
Senator Ron Wyden of Oregon announced the bill “Stop Mass Hacking Act,” which would curtail the FBI from using one single warrant to install and run “malware” on thousands of computers that are at unknown locations.
Recently, Judge Robert Bryan reversed his previous position, ruling that the FBI doesn’t have to disclose the Tor exploit code while simultaneously stating that theFBI should face sanctions for its stand in refusing to provide evidence.
However, the government argued back saying that as the defendant was already in possession of enough amount of evidence, there was no need for the FBI to disclose details of the so-called “malware” exploit and that no sanctions should be imposed on this account.
Malware

Malware refers to any software program that installs itself and runs on a computer without the consent of the machine’s owner.
However, Alfin’s argument was that the NIT software did not make any changes to the security settings when he loaded the NIT on one of his machines.
When loaded, the NIT did not render his computer more vulnerable than it was before the installation nor did it leave behind any other residual malware, Alfin added.
Comments
Post a Comment