Law enforcement

Post pics

Posts

US Government Seizes 130 domain

On November 26, 2011, in Internet, Law enforcement, United States, by Jorge Espinosa

On Friday November 25, 2011, the Department of Justice (DOJ) working with Immigration and Customs Enforcement (ICE) seized 130 domains operated by alleged counterfeiters.  The seizures seem to be a continuation of last year’s  “Operation In Our Sites v. 2.0” an initiative designed to crack down on online piracy and counterfeiting by seizing the domain names under which they operate.  In last year’s seizures over 82 domains were seized.

The seizure seems to have been timed to anticipate “Cybermonday,” the follow-up to “Black Friday” when consumers are encourage to shop on-line.  The domains seized include clothing resellers such as 100jerseys.com,  purse and bag resellers such as Louisvuiton-bags-forcheap.com, shoe resellers such as Reeboksite.com and even an auto software cite autocd.com.  Attempts to log into to the sites results in a message which states:

This domain has been seized by ICE- Homeland Security Investigations, pursuant to a seizure warrant issued by a United States District Court under the authority of 18 U.S.C. §§ 981 and 2323.

Such seizures have been criticized in the past by consumer advocates as excessive and violations of first amendment rights. At least one senator has expressed his displeasure with these tactics in the past.  Senator Ron Wyden (D-OR) wrote to ICE and stated:

In contrast to ordinary copyright litigation, the domain name seizure process does not appear to give targeted websites an opportunity to defend themselves before sanctions are imposed. As you know, there is an active and contentious legal debate about when a website may be held liable for infringing activities by its users. I worry that domain name seizures could function as a means for end-running the normal legal process in order to target websites that may prevail in full court. The new enforcement approach used by Operation In Our Sites is alarmingly unprecedented in the breadth of its potential reach…

For the Administration’s efforts to be seen as legitimate, it should be able to defend its use of the forfeiture laws by prosecuting operators of domain names and provide a means to ensure due process. If the federal government is going to take property and risk stifling speech, it must be able to defend those actions not only behind closed doors but also in a court of law.

The Senator’s letter also focused on the scant evidence and investigation required to obtain the seizure warrants and how they resulted in wrongful seizure in at least one case.

Aside from their legality, the effectiveness of such seizures has also been questioned.  Also, popular web browser Firefox has a plug-in which allows users to find the website despite the domain seizure. Nevertheless, for the average consumer who is not technically sophisticated, the domain seizures provide an effective means for sending a message against the purchase of counterfeit goods.  No press release has been issued by ICE regarding the new seizures.

 

FBI seizes servers and knocks out service to numerous companies

On June 22, 2011, in Cloud Computing, Law enforcement, United States, by Jorge Espinosa

Your cloud data may be relatively protected from disasters such as floods, storms and earthquakes.  However, it has no protection from the overreaching hand of law enforcement.

Early yesterday morning the FBI raided an Internet hosting facility in Renton, Va., and seized several of its servers.  The facility is owned by DigitalOne, a company based in Switzerland. The raid and seizure seem to be related to the FBI’s search for a wanted hacking organization Lulz Security Group (“LulzSec”).  LulzSec is associated with a series of Internet denial of service attacks against CIA and other government agencies.  At the same time that the Virginia raids were taking place Scotland Yard arrested Ryan Cleary in the United Kingdom for alleged involvement with the organization.

Although the FBI was only interested in one of DigitalOne’s clients whose data was hosted on one of the seized servers and who may have had ties to LulzSec, various servers were seized thereby shutting down access for “tens of clients” who also maintained data on the server.  In an email to a client, published by the New York Times, DigitalOne’s chief executive, Sergej Ostroumow, said that in the “night FBI has taken three enclosures with equipment plugged into them, possibly including your server.  .  .  After FBI.’s unprofessional ‘work’ we can not restart our own servers, that’s why our website is offline and support doesn’t work.”  The New York Times reported that Mr Ostroumow said DigitalOne had provided the FBI with details of how to find servers linked to an IP address they were investigating, but agents also seized unrelated equipment.  The DigitalOne website was still not accesible this morning, a day after the raid.

This seizure is reminiscent of a raid undertaken by the FBI in 2009 where it seized servers belonging to Core IP Networks in Dallas, Texas.  In the 2009 raid the FBI was investigating two companies who had allegedly defrauded AT&T and other telecom companies of service fees.  The seizure of the servers effectively shut down dozens of a companies.  One company in particular, Liquid Motors, a provider of data services for car dealerships was effectively shut down by the raid.  A legal suit for return of the servers filed by Core IP Networks before the U.S. District Court for the Northern District of Texas failed where the Court found that there was probable cause the servers had served as an instrumentality of a crime.