Tag Archive for: raid

Comparing house security with computer security – IT fundamentals



Swiss police raid over hack on U.S. security-camera company – WAVY.com


GENEVA (AP) — Swiss authorities on Monday confirmed a police raid at the home of a Swiss software engineer who took credit for helping to break into a U.S. security-camera company’s online networks, part of what the activist hacker cited as an effort to raise awareness about the dangers of mass surveillance.

The Federal Office of Justice said regional police in central Lucerne, acting on a legal assistance request from U.S. authorities, on Friday carried out a house search involving hacker Tillie Kottmann.

The hacker said online that electronics devices were seized during the raid. The Swiss office declined to specify the location or comment further, deferring all questions to “the relevant U.S. authority.”

The FBI said in a statement Friday it was “aware of the law enforcement activity conducted in Switzerland” but had no further comment.

Kottmann had identified as a member of a group of “hacktivists” who say they were able to view live camera feeds and peer into hospitals, schools, factories, jails and corporate offices for much of Monday and Tuesday last week after gaining access to the systems of California startup Verkada. They said the action was aimed at raising awareness about mass surveillance.

Verkada later locked them out by disabling all internal administrator accounts that the hackers had accessed using valid credentials found online. The company alerted law enforcement and its customers.

Kottmann, who uses they/them pronouns, said on the social media site Mastodon last week that the raid wasn’t specifically about the Verkada hack but was tied to an earlier FBI investigation. Kottmann has previously attracted attention for leaking hacked material to expose security flaws, including from U.S. chipmaker Intel last year.

It’s common for professional cybersecurity researchers to probe online systems for security flaws, though “hacktivists” often take that a step further by publicly exposing security risks or leaked materials to effect social change.

Kottmann didn’t…

Source…

Officer Charged With Felony Murder Now Facing Seven More Charges Over Deadly No-Knock Raid

The botched drug raid in Houston that left two homeowners dead and one cop paralyzed from the waist down has resulted in additional criminal charges… against the cops.

Officer Gerald Goines — already facing felony murder charges for the raid that left Rhogena Nicholas and Dennis Tuttle dead — claimed an informant purchased heroin from Tuttle and saw guns in the house. One no-knock raid later, Nicholas and Tuttle were dead, killed by cops whose actions were set in motion by a warrant affidavit full of lies.

The heroin supposedly sold to Goines’ informant? Pulled from the console of Goines’ cruiser. The controlled buy didn’t happen either. No one has been able to locate the informant Goines claimed saw heroin and guns in the Tuttle residence. As a result, more than 1,400 cases Goines had a hand in have been placed under review. Two dozen have already been dismissed. The DA’s office and the FBI have also opened their own investigations.

The raid produced nothing the cops were looking for. There was no heroin. There were a couple of guns, but the gun Tuttle supposedly used to shoot at officers wasn’t in the search inventory. All the officers found was personal use amounts of cocaine and marijuana. An independent forensic examination of the scene came to the conclusion that either the state’s forensic unit sucks at what it does or that it was attempting to make the evidence fit the false narrative crafted by the officers who participated in the raid.

Charges are being added to existing charges Officer Goines faces as the fallout from the raid continues, the Houston Chronicle reports.

A federal grand jury on Wednesday charged two former Houston police officers at the center of a failed January drug raid with civil rights violations, falsifying records and lying about use of confidential informants, marking the latest turn in one of the worst HPD scandals in decades.

[…]

Authorities allege [Gerald Goines] fabricated an informant and lied on a search warrant affidavit, an offense report and the tactical plan made in preparation for the bust that turned into a gun battle that ended with the deaths of Nicholas and Tuttle and with five HPD officers injured.

And it wasn’t just Officer Goines lying. The investigation of the Tuttle residence began with a 911 call — supposedly from Rhogena Nicholas’ mother — saying the couple were doing drugs and had guns in the house.

But it wasn’t someone’s overly-concerned mother. It was actually a neighbor. This neighbor is now facing charges for her part in the tragedy.

Federal investigators said they believe they have the 911 caller who made false accusations that led to the botched raid of a Harding Street home, leaving two dead and two former officers looking at prison time.

Patricia Garcia, a 53-year-old woman, was picked up Wednesday morning from the house directly across the street from the scene of the deadly Jan. 8 raid. Garcia is alleged to have falsely stated her daughter was at the home located at 7815 Harding St. and that she believed there were guns and drugs inside of the residence.

This isn’t the end of this debacle, but every new development says nothing good about the Houston PD’s narcotics unit or the department’s leadership. Chief Art Acovedo spoke out against these officers, but only after the original narrative — the one Goines is charged with creating — became impossible to defend.

Permalink | Comments | Email This Story

Techdirt.

Gov’t Used An Ambiguously-Worded Tweet As The Basis For The Raid Of NSA Contractor’s House

The prosecution of former NSA contractor Hal Martin continues. Martin somehow managed to exfiltrate sensitive documents and code for nearly 20 years without the NSA noticing. It finally started paying attention after its hacking tools and exploits made their way into the hands of the public via the “Shadow Brokers.” These tools then made their way into the computers of the public, wreaking worldwide havoc and giving the leaky agency — whose literal middle name is “Security” — another PR black eye.

Hal Martin was suspected of handing over tools to the Shadow Brokers but the charges against him are solely related to the mishandling of classified info, indicating the feds no longer believe Martin was involved. But this original suspicion was apparently enough to justify the FBI raid of Martin’s residence, according to the federal judge handling his case. The probable cause appears to have been generated by a tweet from Martin’s Twitter account, at least according to what can be gleaned from the redacted order [PDF] handed down by Judge Richard Bennett. Josh Gerstein of Politico has the details.

Passages in the decision from U.S. District Court Judge Richard Bennett were deleted from a version made public by the court, but the remaining details suggest that investigators believed Martin was offering sensitive information to someone online shortly before a nebulous internet-based entity, the Shadow Brokers, released NSA hacking tools in August 2016 through the attention-grabbing technique of an online auction.

“In these messages, @HAL_999999999 asked for a meeting with the [redacted] and stated ‘shelf life, three weeks,’” Bennett wrote, describing the government’s assertions in court filings still under seal. “The Defendant’s Twitter messages … were sent just hours before what was purported to be stolen government property was advertised and posted on multiple online- content-sharing sites, including Twitter.”

These details have been made public as the result of Martin’s attempt to suppress the evidence gathered against him. The court notes the tweet could have had a more innocuous meaning, but given the circumstances and the timing, it was not unreasonable for the FBI to believe Martin may have been involved in the leaking of classified NSA exploits.

That’s not the only rejection handed to Martin. The court also denies his request to have cell-site location info obtained without a warrant suppressed, noting that the government obtained this data before the Supreme Court handed down its decision in Carpenter.

However, a key bit of evidence is no longer the government’s to use: Martin’s own statements. The court says the government illegally obtained these statements by not properly Mirandizing Martin prior to questioning him. There is no doubt Martin was in custody at the time he was questioned without a Miranda warning. The government denies Martin was ever taken into custody, but the court points out a person who doesn’t feel they’re free to go is being held against their will, which is all it takes to define “custody.”

In this case, the facts demonstrate ~at a reasonable person in the Defendant’s position would have perceived a police dominated atmosphere before and during the interrogation. The Defendant was initially approached by nine SWAT agents dressed in protective gear, some of whom had their guns drawn at the Defendant… Multiple other officers were also on the scene, including eight FBI agents and three State Trooper vehicles – a fact that “goes a long way towards making the suspect’s home a police dominated atmosphere.” The Defendant was immediately placed face down on the ground and handcuffed, “demonstrating that the officers sought out [the Defendant] and had physical dominion over him.”

Although the Defendant’s handcuffs were removed prior to the interrogation, “the experience of being singled out and handcuffed would color a reasonable person’s perception of the situation and create a reasonable fear that the handcuffs could be reapplied at any time.”

Further, after his initial detention, the Defendant was interrogated by three agents for approximately four hours.ll During the interrogation, the agents confronted the Defendant with incriminating evidence discovered on his property, which may certainly cause a reasonable person to feel compelled to cooperate with the police. Moreover, the Defendant’s freedom of movement was significantly restricted during the interrogation. Indeed, he was only permitted to leave the interrogation space once — i.e., when he went to his home office to help Hajeski access his computer equipment — at which time he was accompanied by agents. In addition, the Defendant was isolated from his partner until the end of the interrogation — a tactic that the Supreme Court has recognized as one of the distinguishing features of a custodial interrogation.

[…]

Taken together, these facts demonstrate that a reasonable person in the Defendant’s position would have felt that he was not free to leave.

The government still records a win on most of the suppression motion. It’s difficult to tell how solid the underlying warrant affidavit actually is since it — along with several other filings — are still under seal. It’s also unclear how much ammo Martin’s defense had when mounting this challenge. If the government was granted the opportunity to engage in ex parte presentations of evidence, Martin’s team could be working blind.

His team may be working partially blind anyway. There’s reason to believe the government is now a whole lot more cagier about its classified/sensitive evidence after accused CIA hacking tool leaker Josh Shulte was found to be leaking documents from prison — documents he apparently obtained as part of the government’s discovery obligations. It will likely be months before the public sees any part of the government’s warrant affidavit. It may be years before anyone other than this court sees all of it. Still, an ambiguously-worded tweet seems like pretty thin probable cause, even if its timing seemed to align with the Shadow Brokers’ actions at the time the warrant was sought.

Permalink | Comments | Email This Story

Techdirt.