Prosecutors say tools that cloak online identities are complicating their efforts to police all kinds of crime.
Take the case of a former head of cybersecurity for the Department of Health and Human Services, Timothy DeFoggi. Prosecutors say they found graphic images of children on a laptop computer in his home.
DeFoggi once led cybersecurity efforts for HHS, but in this case, the Justice Department says, he used his expertise to hide from the law, along with other users of child porn sites, on a network called Tor.
Tor provides popular software that helps people hide their location and their viewing habits by bouncing messages all over the world. Supporters say it can be used for perfectly legitimate reasons: to protect the privacy of protesters and artists in repressive regimes, for example.
But it’s also drawn attention from people like Leslie Caldwell, who runs the criminal division at the Justice Department.
“A lot of what we thought of as traditional, unsophisticated criminals are now on the Internet selling drugs, selling guns, selling murder-for-hire schemes, selling child pornography,” she says.
And those criminals, Caldwell says, have gotten a lot smarter about covering their tracks. “Technology is trending toward even greater anonymization, which is something that is just going to make our job more difficult,” she adds.
In the DeFoggi case, prosecutors say he took substantial steps to avoid detection. In court papers, authorities say he used software programs to erase his Web searches and had to be physically removed from his laptop when the FBI searched his home.
DeFoggi’s lawyer at the time of his trial, John Berry, didn’t return phone calls. But Berry told Omaha’s KETV last year: “Just because you have a screen name and IP address, that does not tell you who is behind the computer, especially when there are multiple people who live in a residence.”
And that’s the anonymity problem in a nutshell — except for this: Prosecutors in this case were able to unmask many users of those graphic sites. The FBI seized the sites and watched for weeks, tapping communications and using other investigative techniques, according to court filings.
Assistant Attorney General Caldwell didn’t want to share details, for fear criminals would work around them. But she says the government gets judicial approval to take those steps.
“Certainly in the criminal context, there are a lot of checks and balances, and we work with the courts and under the supervision of the courts,” Caldwell says.
Skeptics of government surveillance wonder if prosecutors tell judges exactly what they’re doing — and whether courts understand those steps.
“There is a problem of the gap in knowledge between the people implementing and deploying high-tech search methods and the judges that are supposed to be authorizing them,” says Julian Sanchez, a senior fellow at the Cato Institute.
Sanchez says there are important trade-offs to balance between crime-fighting and privacy, and unknowns, such as whether the U.S. has found a way to crack the Tor network.
“That’s something that’s important for the world to know; it’s important for democracy activists in repressive regimes to know. Because if we can do it, probably China’s intelligence agency can do it too,” Sanchez says.
Last week, a computer science researcher at a conference in Germany reported that 4 out of 5 visits to Tor-hidden sites relate to child abuse or pedophilia, a study first reported by Wired magazine.
But no one knows how many of those visits come from law enforcement, patrolling the Web for criminals.
DeFoggi was sentenced to 25 years in prison on Monday.