4.8 • 45 Ratings
🗓️ 18 July 2016
⏱️ 26 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Welcome to the Tech Policy Podcast. I'm Evan Swartzrop. On today's show, what happens when the FBI uses hacking to obtain evidence? Can that evidence be used against a defendant? What does this mean for the broader debate about how government should employ hacking for law enforcement purposes? |
| 0:22.5 | What does this mean for the larger debate about government surveillance? |
| 0:25.6 | Joining me to discuss this is Adam Klein, visiting fellow at the Center for a New American Security, |
| 0:30.9 | and he is also the International Affairs Fellow at the Council on Foreign Relations. |
| 0:34.8 | Adam, thanks for joining the show. |
| 0:36.0 | Thank you for having me. |
| 0:37.2 | So there is a particular case that sparked my interest in this issue and why I invited you on the |
| 0:44.0 | show. In 2015, the FBI took control of a child pornography site called Playpen, and it basically |
| 0:51.8 | ran the site from a government server in order to kind of find out |
| 0:56.0 | who was using it. And before we delve into that, can you just explain to our listeners what the |
| 1:01.8 | Tor browser is? Because I'm guessing most average internet users don't use the Tor browser, |
| 1:07.5 | and they often hear the term dark web or the deep web. Do you just explain briefly what |
| 1:12.3 | that is? Sure. I should add the caveat that I'm far from a technical expert, although perhaps |
| 1:18.3 | that will make my explanation more comprehensible to the average user. Absolutely. So Tor is a system, |
| 1:24.1 | it's a browser plugin that you can add to your Firefox browser, and it basically |
| 1:29.5 | routes your traffic through a series of other servers to the final destination, and then back |
| 1:34.9 | in such a way that the user's IP address is hidden from law enforcement. |
| 1:43.0 | So because the internet traffic kind of bounces all over the world. |
| 1:46.2 | Correct. |
| 1:46.6 | It's difficult. |
| 1:47.5 | It's not just like when I use a website and they can clearly tell that I'm in Washington, D.C. |
| 1:52.0 | And probably figure out who I am quite easily. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from TechFreedom, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of TechFreedom and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.