{"id":69714,"date":"2017-03-26T07:06:09","date_gmt":"2017-03-26T11:06:09","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=69714"},"modified":"2017-03-26T07:07:59","modified_gmt":"2017-03-26T11:07:59","slug":"in-child-pornography-case-government-admits-cia-leaks-are-real","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=69714","title":{"rendered":"In Child Pornography Case, Government Admits CIA Leaks Are Real"},"content":{"rendered":"<p><!--more-->Written by C. Mitchell Shaw<br \/>\nNew American<\/p>\n<p><span class=\"itemImage\"><a class=\"modal modal_link cboxElement\" title=\"Click to preview image\" href=\"http:\/\/www.thenewamerican.com\/media\/k2\/items\/cache\/11efc0a492617ed7245bc1af59a54666_XL.jpg\" rel=\"{handler: 'image'}\" data-modal-title=\"11Efc0A492617Ed7245Bc1Af59A54666 Xl\" data-modal-done=\"1\"><img decoding=\"async\" class=\"alignright\" src=\"http:\/\/www.thenewamerican.com\/media\/k2\/items\/cache\/11efc0a492617ed7245bc1af59a54666_M.jpg\" alt=\"In Child Pornography Case, Government Admits CIA Leaks Are Real\" \/><\/a><\/span><\/p>\n<p>The fallout from the CIA hacking program \u2014 made public by WikiLeaks just over two weeks ago \u2014 just took a strange turn. In a case involving charges of child pornography, the federal government as good as admitted that the leaks contained in Vault 7 are genuine.<\/p>\n<div class=\"itemFullText\">\n<p>The case goes back to 2015 when the FBI operated a child pornography website for two weeks. Yes, you read that right. From February 20 to March 4, 2015, the FBI ran a website with more than 23,000 actual pictures and videos of children being sexually abused, including more than 9,000 of which could be downloaded by visitors to the site. According to court records, some of those children were almost too young to be in kindergarten.<\/p>\n<p>It began when the FBI discovered the location of the server for the so-called Playpen website, which was accessible only via the Tor network. The FBI raided the location, arrested the operator, and made the decision to leave the website up and running and allow visitors to the site to continue downloading images and videos. The FBI\u2019s reasoning (if it can rightly be called that) was that federal agents had the ability to inject malware into the server that would work its way back to the users\u2019 computers, defeating Tor\u2019s anonymity all along the way. The FBI tracked the site\u2019s visitors and later made more than 135 arrests including \u201ca pediatrician, a math teacher, a professor, a public school administrator, a preschool teacher, a former bank executive and a federal drug enforcement agent,\u201d according to a report from deepdotweb.com. Somehow, in the darkened mind of the FBI, the arrests justified spending two weeks peddling child pornography. And this is <a href=\"http:\/\/www.usatoday.com\/story\/news\/2016\/01\/21\/fbi-ran-website-sharing-thousands-child-porn-images\/79108346\/\" target=\"_blank\">at least the third time<\/a> the FBI has done this type of thing.<\/p>\n<p>But then, this is the same FBI that helped the NSA give us <a href=\"http:\/\/www.thenewamerican.com\/usnews\/crime\/item\/17270-fast-and-furious-fbi-now-linked-to-murder-of-u-s-border-agent\">Fast and Furious<\/a>.<\/p>\n<p>If the desire is to arrest and prosecute those who frequent child pornography sites, one might reasonably expect the agency to press on \u2014 even in the face of legal challenges \u2014 to get those convictions, right? Well, that all depends.<\/p>\n<p>When the lawyer representing Jay Michaud, a school administrator from Vancouver, Washington, challenged the government\u2019s case against his client, demanding to see the source code for the hack the FBI alleges led agents to his client, the government dropped the case. According to a <a href=\"http:\/\/www.zdnet.com\/article\/justice-dept-asks-to-drop-playpen-child-porn-case-to-prevent-releasing-tor-exploit\/\" target=\"_blank\">report<\/a> by ZDNet from March 6:<\/p>\n<p style=\"padding-left: 30px;\">The FBI used a &#8220;network investigative technique&#8221;\u00a0\u2014 a hacking tool that in any other hands than the feds would be <a href=\"http:\/\/www.zdnet.com\/article\/fbi-says-its-hacks-are-not-malware-because-they-are-used-to-catch-criminals\/\" target=\"_blank\">considered malware<\/a>\u00a0\u2014 to deanonymize the users of the Tor browser, a widely used app for easy access to the dark web, during its 2015 investigation into the website.<\/p>\n<p style=\"padding-left: 30px;\">Little is known about the hacking tool, but it was known to be able to gather real-world information on Playpen visitors, such as IP addresses\u00a0\u2014 details of which should have been protected by Tor.<\/p>\n<p style=\"padding-left: 30px;\">But the government refused to reveal the full source code of the exploit in court, and so the judge <a href=\"http:\/\/www.zdnet.com\/article\/fbi-refuses-to-release-tor-exploit-details-evidence-thrown-out-in-court\/\" target=\"_blank\">tossed out the evidence<\/a>, rendering a significant set-back to the government&#8217;s case.<\/p>\n<p>The government then dropped its case but is &#8220;asking the case to be reopened once the exploit is no longer classified.\u201d Let that sink in. The government used a tool it refuses to divulge, but wanted the \u201cfruit of the secret tree\u201d to be admissible as evidence. When that failed, the government that knowingly \u2014 <em>willingly<\/em> \u2014 hosted a website rife with the types of pictures and videos that make up the darkest nightmares any decent person could imagine, simply <a href=\"http:\/\/en.wikipedia.org\/wiki\/Mulligan_(games)\" target=\"_blank\">called a Mulligan<\/a> and walked away \u2014 hoping to come back later and try again.<\/p>\n<p>And Motherboard is <a href=\"http:\/\/motherboard.vice.com\/en_us\/article\/whoops-the-doj-may-have-confirmed-some-of-the-wikileaks-cia-dump\" target=\"_blank\">reporting<\/a> that in a recent court filing, Colin Fieman, a federal public defender in Washington, wanted to admit some of the <a href=\"http:\/\/www.thenewamerican.com\/tech\/computers\/item\/25553-cia-weapons-let-hackers-use-your-computer-phone-and-tv-to-spy-on-you\">WikiLeaks disclosures from Vault 7<\/a> as evidence in the case against his client who was charged in the Playpen case. Fieman wanted to show that \u2014\u00a0because of the hacking tools the CIA developed (and lost control of) \u2014\u00a0it would be impossible for even a computer forensic expert to show whether someone using the CIA\u2019s cyberweapons planted the child pornography on his client\u2019s computer.<\/p>\n<p>The documents and files Fieman wanted to introduce are those that are \u2014 thanks to WikiLeaks \u2014 widely available on the Internet. As District Judge Robert Bryan wrote in his court filing, those documents and files may show that the government possesses &#8220;the ability to hack into a computer without leaving any trace.\u201d<\/p>\n<p>In fact, in an article about those cyberweapons, this writer recently <a href=\"http:\/\/www.thenewamerican.com\/tech\/computers\/item\/25545-wikileaks-cia-cyber-weapons-are-loose-in-the-wild\">observed<\/a>:<\/p>\n<p style=\"padding-left: 30px;\">Since the hackers would then have remote access control over any such device, all files and folders would be available to the hacker. Worse yet, having control of the device would also allow the hacker to either remove or add files and folders. If the hacker wanted to bring an adversary down, it would be a simple matter to create a hidden folder containing illegal files \u2014 including child pornography \u2014 on the victim\u2019s device to be \u201cdiscovered\u201d at a later date by investigators serving a warrant. Such a sting operation would look \u2014 for all the world \u2014 like a legitimate law-enforcement activity. Even if it did not end in a prosecution and prison, the victim could be branded for life. After all, this is almost exactly what happened to former CBS News correspondent Sharyl Attkisson. In her case, the hidden files that were secretly placed on her computer were classified government documents for which Atkisson could have been charged under the Espionage Act for possessing.<\/p>\n<p>As a direct result of the government creating tools capable of that, the new reality is that anyone accused of possessing any type of illegal computer file \u2014 even child pornography \u2014 has a much greater benefit of the doubt now than ever before. In fact, in the absence of a confession, this writer would \u2014 if serving on a jury \u2014 vote not guilty in such a case.<\/p>\n<p>As it stands though, the government \u2014 again \u2014 gets to have it both ways. In the case in Washington, the government lawyers were able to keep the Vault 7 materials from being admitted as exhibits. Their argument? The files are \u201cclassified.\u201d Never mind that they are publicly available to anyone with Internet access. Never mind that they show exactly what Fieman asserts they show. They are \u201cclassified\u201d and cannot be admitted.<\/p>\n<p>This is the clearest admission of the validity of these documents and files so far. This writer noted in a <a href=\"http:\/\/www.thenewamerican.com\/tech\/computers\/item\/25574-intel-community-white-house-s-own-words-admit-validity-of-cia-leaks\">previous article<\/a> that the CIA had as much as admitted their validity:<\/p>\n<p style=\"padding-left: 30px;\">And the CIA published a statement Wednesday [March 8] that began by stating that the agency has \u201cno comment on the authenticity of purported intelligence documents released by Wikileaks or on the status of any investigation into the source of the documents.\u201d The statement then went on to defend the agency\u2019s efforts to \u201caggressively collect foreign intelligence overseas to protect America from terrorists, hostile nation states and other adversaries.\u201d While neither explicitly confirming nor denying the validity of the \u201cpurported\u201d documents and files, the statement condemns WikiLeaks\u2019 disclosure of the information, saying that it is \u201cdesigned to damage the Intelligence Community\u2019s ability to protect America against terrorists and other adversaries.\u201d The statement added, \u201cSuch disclosures not only jeopardize U.S. personnel and operations, but also equip our adversaries with tools and information to do us harm.\u201d<\/p>\n<p style=\"padding-left: 30px;\">Let\u2019s unpack that just a bit, because it says more than the CIA likely intended to say.<\/p>\n<p style=\"padding-left: 30px;\">If \u2014 as the CIA would have the American public believe \u2014 the authenticity of the leaked documents and files is questionable, how could their disclosure possibly \u201cjeopardize U.S. personnel and operations\u201d or \u201cequip our adversaries with tools and information to do us harm\u201d? Add to that the germane fact that \u2014 in a departure from previous leaks published by WikiLeaks \u2014 the whistleblower organization chose to redact the documents and files before publishing them on its website for the express purpose of keeping those tools and that information from harming anyone. The software tools (read: cyber weapons) WikiLeaks reported on were not released to any and all, but were made available only to the manufacturers of hardware and software affected by those \u201ctools,\u201d so that the manufacturers could develop and release security patches to nullify the effectiveness of those weapons.<\/p>\n<p style=\"padding-left: 30px;\">The CIA \u2014 in an attempt to demonize WikiLeaks \u2014 has, by its own words, admitted that the disclosures are genuine. But that is what happens when \u2014 after being caught developing tools to turn computers, mobile devices, televisions, and other electronic devices against their users \u2014 the agency then attempts to duck and cover by talking out of both sides of its face.<\/p>\n<p>Now, with government lawyers arguing \u2014 and a judge agreeing \u2014 that the documents and files are classified, there can be no question of their validity. If they are not real, they are not classified. Since the government admits they are classified, they must be real.<\/p>\n<p>Since the evidence is becoming clearer that the intelligence community is a pack of gun-running, child pornography-pedaling, computer-hacking, pathological liars, is there one good reason to keep them around?<\/p>\n<p>___<br \/>\n<a href=\"http:\/\/www.thenewamerican.com\/usnews\/crime\/item\/25688-in-child-pornography-case-government-admits-cia-leaks-are-real\">http:\/\/www.thenewamerican.com\/usnews\/crime\/item\/25688-in-child-pornography-case-government-admits-cia-leaks-are-real<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-69714","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/69714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=69714"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/69714\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=69714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=69714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=69714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}