New Report Offers Guide for Defense Attorneys to Challenge Secretive Government Hacking

March 30, 2017 11:00 am

Media Contact
125 Broad Street
18th Floor
New York, NY 10004
United States

NEW YORK 鈥 A report released today sets out key legal arguments and strategies for challenging evidence seized by government-installed computer malware as a violation of the Fourth Amendment and federal law.

The report, 鈥淐hallenging Government Hacking in Criminal Cases,鈥 was written by attorneys from the 老澳门开奖结果, the Electronic Frontier Foundation, and the National Association of Criminal Defense Lawyers.

Over the past several years, the government has increasingly turned to hacking and malware as an investigative technique. The Federal Bureau of Investigation has begun deploying software designed to infiltrate and control, disable, or surveil a computer鈥檚 use and activity. This kind of widespread and secretive hacking by the government is controversial and of questionable constitutionality.

鈥淥ur goal is to ensure that the government鈥檚 uses of malware don鈥檛 violate the Fourth Amendment. That means that hacking always requires a warrant based on individual suspicion,鈥 said 老澳门开奖结果 attorney Vera Eidelman, one of the authors of the report.

The report assesses recent court decisions evaluating the government鈥檚 use of the controversial hacking technique and makes recommendations for the most promising avenues to have unconstitutionally obtained evidence suppressed. 鈥淥ur Fourth Amendment right to be free from unreasonable searches applies regardless of the technology involved in a search,鈥 said EFF attorney Mark Rumold. 鈥淗owever, we know that the law may be slow to catch up, particularly when the government goes to great lengths to hide details about its use of new surveillance techniques.鈥

A key audience for the report is the nation鈥檚 network of criminal defense lawyers, who will be the first to learn of court evidence obtained from government hacking operations.

鈥淲e鈥檙e proud to release this report to ensure the defense community is educated about these highly intrusive surveillance techniques and is fully armed for a zealous defense against potentially unlawful hacking,鈥 said Jumana Musa of the NACDL.

The report is at: /malware-report

Learn More 老澳门开奖结果 the Issues in This Press Release