The Feds Are Dropping Child Porn Cases Instead of Revealing Info on Their Surveillance Systems

[reason.com – 4/24/19]

The Department of Justice has been dismissing child pornography cases in order to not reveal information about the software programs used as the basis for the charges.

An array of cases suggest serious problems with the tech tools used by federal authorities. But the private entities who developed these tools won’t submit them for independent inspection or hand over hardly any information about how they work, their error rates, or other critical information. As a result, potentially innocent people are being smeared as pedophiles and prosecuted as child porn collectors, while potentially guilty people are going free so these companies can protect “trade secrets.”

The situation suggests some of the many problems that can arise around public-private partnerships in catching criminals and the secretive digital surveillance software that it entails (software that’s being employed for far more than catching child predators).

With the child pornography cases, “the defendants are hardly the most sympathetic,” notes Tim Cushing at Techdirt. Yet that’s all the more reason why the government’s antics here are disturbing. Either the feds initially brought bad cases against people whom they just didn’t think would fight back, or they’re willing to let bad behavior go rather than face some public scrutiny.

An extensive investigation by ProPublica “found more than a dozen cases since 2011 that were dismissed either because of challenges to the software’s findings, or the refusal by the government or the maker to share the computer programs with defense attorneys, or both,” writes Jack Gillum. Many more cases raised issues with the software as a defense.

“Defense attorneys have long complained that the government’s secrecy claims may hamstring suspects seeking to prove that the software wrongly identified them,” notes Gillum. “But the growing success of their counterattack is also raising concerns that, by questioning the software used by investigators, some who trade in child pornography can avoid punishment.”

 

Read more

 

Related posts

Subscribe
Notify of

We welcome a lively discussion with all view points - keeping in mind...

 

  1. Your submission will be reviewed by one of our volunteer moderators. Moderating decisions may be subjective.
  2. Please keep the tone of your comment civil and courteous. This is a public forum.
  3. Swear words should be starred out such as f*k and s*t and a**
  4. Please avoid the use of derogatory labels.  Use person-first language.
  5. Please stay on topic - both in terms of the organization in general and this post in particular.
  6. Please refrain from general political statements in (dis)favor of one of the major parties or their representatives.
  7. Please take personal conversations off this forum.
  8. We will not publish any comments advocating for violent or any illegal action.
  9. We cannot connect participants privately - feel free to leave your contact info here. You may want to create a new / free, readily available email address that are not personally identifiable.
  10. Please refrain from copying and pasting repetitive and lengthy amounts of text.
  11. Please do not post in all Caps.
  12. If you wish to link to a serious and relevant media article, legitimate advocacy group or other pertinent web site / document, please provide the full link. No abbreviated / obfuscated links. Posts that include a URL may take considerably longer to be approved.
  13. We suggest to compose lengthy comments in a desktop text editor and copy and paste them into the comment form
  14. We will not publish any posts containing any names not mentioned in the original article.
  15. Please choose a short user name that does not contain links to other web sites or identify real people.  Do not use your real name.
  16. Please do not solicit funds
  17. No discussions about weapons
  18. If you use any abbreviation such as Failure To Register (FTR), Person Forced to Register (PFR) or any others, the first time you use it in a thread, please expand it for new people to better understand.
  19. All commenters are required to provide a real email address where we can contact them.  It will not be displayed on the site.
  20. Please send any input regarding moderation or other website issues via email to moderator [at] all4consolaws [dot] org
  21. We no longer post articles about arrests or accusations, only selected convictions. If your comment contains a link to an arrest or accusation article we will not approve your comment.
  22. If addressing another commenter, please address them by exactly their full display name, do not modify their name. 
ACSOL, including but not limited to its board members and agents, does not provide legal advice on this website.  In addition, ACSOL warns that those who provide comments on this website may or may not be legal professionals on whose advice one can reasonably rely.  
 

11 Comments
Inline Feedbacks
View all comments

The databases ability to continuously search the general population is being utilized to advance political agendas. Only fools would presume these powerful machines wouldn’t succumb to human nature. The National Center for Missing and Exploited children has turned into a police force offering tips to other LEO agencys. The local agencies make arrests after warrant is issued, under informant initiatives.

In 2011, I questioned SOR AGENT concerning email address and internet ID’s during my FTR.
Q1 Agent does WI DOC intend to communicate with registered persons via email?
A1 NO!

Q2 ‘Agent the government intends to utilize the email provided for reasons outside an email address normal use to communicate?
A2 Yes

Nuff said. Except Judge Matsch Made it clear enough. The info demanded is for keystroke targeting by surveillance saints.

Interesting to see the selective process of how and when “saving just one child” is applied.

SAMI = Sources And Methods Intelligence.

It’s the same reason why there will never be a 100% unredacted Muller report.

What do you want to bet that the software used actually plants the CP images on the target computer in one of those caches that can’t be reached or deleted?

Almost makes one wish they had faced federal vs state charges.

It looks like the feds are more crooked than the people they entrap.

Its really simple, we have a CORRUPT government that should be eliminated by a civil war from the citizens.

Anyone remotely surprised that government representatives don’t want to reveal sources and methods has not been paying enough attention. Moreover a lot of difficult to catch tricks can be utilized in arguing something meets the definition of CP or requires an enhancement on the federal sentencing range. Unfortunately these factors result in many cases built on shaky ground which doesn’t automatically mean someone is completely innocent, but it also does not mean everything brought against them is what the government claims. Even successfully challenging the tiniest details of a case can be the difference between years in prison to a year or less to a term of supervised release or even a dropped prosecution.

Any chance some of our convictions could be overturned if an attorney approached it with this in mind?