A US judge on Wednesday blocked federal prosecutors from searching data on a Washington Post reporter’s electronic devices seized during what one press freedom group called an “unconstitutional and illegal” raid last week.

US Magistrate Judge William B. Porter in Alexandria, Virginia—who also authorized the January 14 raid of Post reporter Hannah Natanson’s home—ruled that “the government must preserve but must not review any of the materials that law enforcement seized pursuant to search warrants the court issued.”

The government has until January 28 to respond to the Post’s initial legal filings against the agent’s actions. Oral arguments in the case are scheduled for February 6.

  • stoy@lemmy.zip
    link
    fedilink
    English
    arrow-up
    18
    arrow-down
    1
    ·
    12 hours ago

    IT guy here, unless the computer case was sealed, they could pop the drive and use it to make a disk image or simply clone it to another drive, the only way I can see how that could be detected is if you have a log of how many hours it has been powered on and compare it to the drives log.

    • CainTheLongshot@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      2 hours ago

      And even that would require a software layer log that wouldn’t kick in until the software is fully booted. There would have to be a hardware layer controller logging spin up via firmware for that to work.

      If they threw this into a cloaner, there’s really no way to tell.

      But they wouldn’t even need to do all that, they would just shop around for a trump appointment judge in a nearby district, and then convince them to retroactively rubber stamp a warrant based on some flimsy probable cause, exactly like the Patriot Act was written for. No need to parallel construct.

    • Davel23@fedia.io
      link
      fedilink
      arrow-up
      17
      arrow-down
      1
      ·
      11 hours ago

      The point is, none of that data can be used as evidence. If the DOJ presents any evidence that could only have come from that drive (cloned or otherwise) their entire case goes out the window and they get in trouble. Though with the way consequences are being ignored lately I doubt that’s their main concern.

        • green_red_black@slrpnk.net
          link
          fedilink
          English
          arrow-up
          9
          arrow-down
          2
          ·
          11 hours ago

          Same issue. It’s called chain of evidence, something that is required for evidence to be admissible.

          No matter what solution one can come up with the origin of the evidence is needed

          • hector@lemmy.today
            link
            fedilink
            arrow-up
            3
            ·
            55 minutes ago

            They present a viable way they found that evidence. They’ve been doing this since forever, using illegal information, then constructing a plausible case for how they found it legally for the courts, which only matters if the accused has good lawyers in the first place.

          • gravitas_deficiency@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            6
            ·
            3 hours ago

            Parallel construction is a tactic that is used specifically in situations similar to this, in the interest of hiding illegal evidence usage by investigators (amongst other things)