Tag Archive for: seized

Mobile phone seized from inmate lodged in high-security cell in Nagpur central jail


A mobile phone handset was seized from an inmate of high-security ‘anda cell’ of the Nagpur central jail by jail staff, police said on Saturday. The phone was seized from Shekhu alias Gulanwaz Khan Izaz Khan (32) on Thursday and handed over to Dhantoli police for investigation, an official said.

Shekhu, history-sheeter, was arrested by the police in December 2019 for smuggling liquor. He, along with five others, were booked under the Maharashtra Control of Organised Crime Act (MCOCA) and lodged in the jail.

(This story has not been edited by Devdiscourse staff and is auto-generated from a syndicated feed.)

Source…

DarkSide Ransomware Gang Quits After Servers, Bitcoin Stash Seized – Krebs on Security


The DarkSide ransomware affiliate program responsible for the six-day outage at Colonial Pipeline this week that led to fuel shortages and price spikes across the country is running for the hills. The crime gang announced it was closing up shop after its servers were seized and someone drained the cryptocurrency from an account the group uses to pay affiliates.

“Servers were seized (country not named), money of advertisers and founders was transferred to an unknown account,” reads a message from a cybercrime forum reposted to the Russian OSINT Telegram channel.

“A few hours ago, we lost access to the public part of our infrastructure,” the message continues, explaining the outage affected its victim shaming blog where stolen data is published from victims who refuse to pay a ransom.

“Hosting support, apart from information ‘at the request of law enforcement agencies,’ does not provide any other information,” the DarkSide admin says. “Also, a few hours after the withdrawal, funds from the payment server (ours and clients’) were withdrawn to an unknown address.”

DarkSide organizers also said they were releasing decryption tools for all of the companies that have been ransomed but which haven’t yet paid.

“After that, you will be free to communicate with them wherever you want in any way you want,” the instructions read.

The DarkSide message includes passages apparently penned by a leader of the REvil ransomware-as-a-service platform. This is interesting because security experts have posited that many of DarkSide’s core members are closely tied to the REvil gang.

The REvil representative said its program was introducing new restrictions on the kinds of organizations that affiliates could hold for ransom, and that henceforth it would be forbidden to attack those in the “social sector” (defined as healthcare and educational institutions) and organizations in the “gov-sector” (state) of any country. Affiliates also will be required to get approval before infecting victims.

The new restrictions came as some Russian cybercrime forums began distancing themselves from ransomware operations altogether. On Thursday, the administrator of the…

Source…

Yes, officials plugged in the malware-laden USB seized at Mar-a-Lago – Mashable

  1. Yes, officials plugged in the malware-laden USB seized at Mar-a-Lago  Mashable
  2. Secret Service Agent Infects Own Computer With Mar-a-Lago Malware, and Tech Community Snickers  The Daily Beast
  3. Chinese woman arrested at Mar-a-Lago had device to detect hidden cameras, officials say  NBC News
  4. No one, not even the Secret Service, should randomly plug in a strange USB stick  TechCrunch
  5. Secret Service agent put Mar-a-Lago intruder’s USB into computer, triggering immediate download of malware  The Independent
  6. View full coverage on read more

“malware news” – read more

Court Rejects Evidence From Warrantless Search Of Phone Six Years After The Gov’t Seized It

There are a number of exceptions to warrant requirements, and the government is willing to utilize every one of them to salvage evidence obtained from an illegal search. Sometimes the arguments work. Other times — like in this instance where six years elapsed between searches — there’s no credible argument for failing to seek a warrant. (via FourthAmendment.com)

Jason Gandy’s cellphone was seized and searched “at an international border” in 2012. The phone was held for 48 hours for a forensic search. This did not reveal the contents of the phone, but created an electronic record of what was contained on the phone. The court’s description says the search only produced a “technical description” of the phone’s contents, but did not expose the contents themselves.

Like it or not, this search — even a forensic search — fell under the “border exception” to the Fourth Amendment, which allows law enforcement to search devices for border/national security reasons without having to come up with reasonable suspicion, much less probable cause.

That search was lawful. It was the second search that broke the rules, including one handed down by the Supreme Court in 2014. From the decision [PDF]:

In July 2018, six years after the initial border search, the government conducted a warrantless search of Gandy’s cell phone. On July 11 and 13, 2018, the government produced to the defense the evidence discovered during the search and stated the intent to offer the evidence as evidence.

Maybe the government thought it was grandfathered in to the pre-Riley warrantless phone search standard. Maybe the government just didn’t care. Maybe it thought the long list of exceptions would save it, especially the one related to searches at international borders. But it definitely realized it had screwed up when Gandy moved to suppress the evidence, because it did this:

On July 13, after Gandy moved to suppress the newly produced text messages, the government applied for and obtained a warrant to search the phone. The agent who signed the search-warrant affidavit was not the same agent who conducted the 2012 search. The affidavit merely states that the cell phone had been in the Department of Homeland Security’s custody since it was seized at the border in 2012.

The government argued it could perform a warrantless search six years after the phone was seized while nowhere near the border under the border search exception. The court responds with, “Well, why don’t we just get rid of the Fourth Amendment altogether, then?”

The government’s second, warrantless search of Gandy’s phone did not occur at a border or at the time of the crossing. It happened six years after Gandy returned to the United States after being denied entry to the United Kingdom. Gandy and his phone have both been in custody since 2012, within the United States. Searching Gandy’s phone had no connection to the government’s interest in preventing illegal entry or contraband smuggling at an international border. Extending the border-search exception to the government’s warrantless search would “both undervalue the core Fourth Amendment protection afforded” cell phones under Riley and “‘untether’ the [border-search] exception ‘from the justifications underlying it.’”

The court also notes that holding a phone for six years before performing a warrantless search removes any question of “exigency” from the discussion. It also refuses to entertain the government’s “independent source” argument.

The independent source doctrine does not apply. The government has not shown that the search done—again—after the government got the search warrant was untainted by the earlier, warrantless search. […] The government has not shown that “there is a reasonable probability that the contested evidence would have been discovered by lawful means in the absence of police misconduct.”

And there’s no “good faith” here either. The law was completely settled by the time agents warrantlessly searched Gandy’s phone.

The good-faith exception does not apply to the government’s second, warrantless search of Gandy’s phone. That search occurred in July 2018. Under the “law existing at the time of [the July 2018] unconstitutional search,” it is clear that the search was not justified by the border-search exception. The government conducted the search years after the Riley Court clearly held that “what police must do before searching a cell phone seized incident to an arrest is accordingly simple—get a warrant.”

It’s a strong opinion that expresses very clearly the multiple ways the government screwed up. Unfortunately, the “border exception” remains intact. This allows the government to seize devices, hold onto them for months or years, and search them at its leisure. If the border exception were truly about preventing the smuggling of contraband or drug/human trafficking, you’d think searches would be performed as soon as possible, rather than allowing more than a half-decade to elapse between searches. But as long as people’s property remains solely in the control of the government, the more likely it is that searches will be performed whether or not the government truly has an articulable reason to do so.

Permalink | Comments | Email This Story

Techdirt.