meta_pixel
Tapesearch Logo
Log in
Tech Policy Podcast

#104: Legal Hacking

Tech Policy Podcast

TechFreedom

Technology

4.845 Ratings

🗓️ 18 July 2016

⏱️ 26 minutes

🧾️ Download transcript

Summary

Is encryption really a problem for law enforcement? If so, what’s the solution? In recent months, the FBI has faced legal pushback over its use of hacking to obtain evidence. What do these legal challenges mean for the future of law enforcement hacking? Evan is joined by Adam Klein, Visiting Fellow at the Center for a New American Security and International Affairs Fellow at the Council on Foreign Relations. They discuss the FBI’s legal woes and whether “legal hacking” is the future of the crypto debate. Does a defendant have a right to know how law enforcement hacked them? Does the government have a legitimate interest in keeping its methods a secret?

Transcript

Click on a timestamp to play from that location

0:00.0

Welcome to the Tech Policy Podcast. I'm Evan Swartzrop. On today's show, what happens when the FBI uses hacking to obtain evidence? Can that evidence be used against a defendant? What does this mean for the broader debate about how government should employ hacking for law enforcement purposes?

0:22.5

What does this mean for the larger debate about government surveillance?

0:25.6

Joining me to discuss this is Adam Klein, visiting fellow at the Center for a New American Security,

0:30.9

and he is also the International Affairs Fellow at the Council on Foreign Relations.

0:34.8

Adam, thanks for joining the show.

0:36.0

Thank you for having me.

0:37.2

So there is a particular case that sparked my interest in this issue and why I invited you on the

0:44.0

show. In 2015, the FBI took control of a child pornography site called Playpen, and it basically

0:51.8

ran the site from a government server in order to kind of find out

0:56.0

who was using it. And before we delve into that, can you just explain to our listeners what the

1:01.8

Tor browser is? Because I'm guessing most average internet users don't use the Tor browser,

1:07.5

and they often hear the term dark web or the deep web. Do you just explain briefly what

1:12.3

that is? Sure. I should add the caveat that I'm far from a technical expert, although perhaps

1:18.3

that will make my explanation more comprehensible to the average user. Absolutely. So Tor is a system,

1:24.1

it's a browser plugin that you can add to your Firefox browser, and it basically

1:29.5

routes your traffic through a series of other servers to the final destination, and then back

1:34.9

in such a way that the user's IP address is hidden from law enforcement.

1:43.0

So because the internet traffic kind of bounces all over the world.

1:46.2

Correct.

1:46.6

It's difficult.

1:47.5

It's not just like when I use a website and they can clearly tell that I'm in Washington, D.C.

1:52.0

And probably figure out who I am quite easily.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from TechFreedom, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of TechFreedom and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.