granick Profile picture
14 Apr, 8 tweets, 2 min read
I have so many questions about the FBI's warrant to patch compromised Microsoft Exchange servers: washingtonpost.com/politics/2021/…
The changes to Rule 41 from several years ago allow magistrate judges to authorize searches outside of their districts in cases such as this one, but they don't authorize the FBI to patch or delete code on other people's machines.
@Riana_Crypto and I hosted a series of conversations about government hacking @StanfordCIS , including a discussion of these changes to Rule 41: cyberlaw.stanford.edu/events/governm…
Notably, at the time the govt argued that the changes were procedural and are needed for the effective *investigation* of cybercrime. Privacy experts said it was a dangerous expansion of law enforcement’s hacking authority. Guess we were right.
I don't think Rule 41 authorizes what the FBI did. It doesn't change the fundamental rule that searches and seizures must be searches, or seizures, and be based on probable cause that evidence will be found. This intrusions weren't only searches, they were alterations in code.
And the DOJ says that this maneuver was to "disrupt hacking activity", not to collect evidence. justice.gov/usao-sdtx/pr/j…
Another thing: The FBI got permission to delay notice to "individual victim users". On what basis?
Are there any analog examples of the FBI secretly fixing/altering something in the name of helping the victim?

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with granick

granick Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @granick

14 Apr
Super fascinating details about the company that helped unlock the San Bernadino shooter's iPhone in the Apple v. FBI case. washingtonpost.com/technology/202… by @nakashimae
Everyone assumed it was Cellebrite, but it wasn't.
The chain of exploits required to unlock the phone was pretty cool.
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!