this post was submitted on 26 Jul 2023
82 points (100.0% liked)

Technology

37355 readers
259 users here now

Rumors, happenings, and innovations in the technology sphere. If it's technological news or discussion of technology, it probably belongs here.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 28 points 11 months ago* (last edited 11 months ago) (6 children)

The whole point of Mastodon is to speak publicly, so I'm not sure I see the problem.

Other than the server owner's property being unnecessarily confiscated, of course. Such thievery is quite clearly a tactic for depriving defendants of the financial and other resources they need to prove their innocence in court.

[–] [email protected] 2 points 11 months ago (1 children)

How is a law enforcement agent staring at some workstations and computers to know what equipment was involved in the alleged crime they are raiding the facility for? If the FBI was raiding a home for child abuse and pornography, there's no way they have the access or expertise at the time of a raid to know the server in the corner is only for Mastodon, the box over there is just a Linux firewall, and that box over there is a porn server. There's no practical way to trust a defendant on site as to what is relevant to an investigation or not. I agree that unnecessary confiscation is a problem, but in general I don't think the ill intent is there. I'm not a law enforcement officer, nor am I lobbying in any way for them, I'm just putting myself in their shoes in this situation.

[–] [email protected] 3 points 11 months ago (1 children)

How is a law enforcement agent staring at some workstations and computers to know what equipment was involved in the alleged crime they are raiding the facility for?

That would be a valid argument if they timely returned whatever they don't need, but they don't, so it isn't.

If the FBI was raiding a home for child abuse and pornography, there’s no way they have the access or expertise at the time of a raid to know the server in the corner is only for Mastodon, the box over there is just a Linux firewall, and that box over there is a porn server.

Maybe not, but if they're not completely incompetent, they'll have images of all of those devices within a day or two. They don't have any legitimate need to keep the seized equipment after that.

The cruelty is the point.

[–] [email protected] 3 points 11 months ago

We're talking about law enforcement agencies, not an IT department. Of course it's technically possible to image a machine quickly. However, there are all kinds of steps and rules for chain of custody, transporting evidence, cataloging it, storing, examining it, etc. and a finite number of personnel to perform the work. Revisiting the child pornography example I used, fingerprints and DNA evidence on equipment could be quite relevant to a case. There may even be a need to examine hard drive platters (old school spinning disk, not SSD obviously) to determine if there was data deleted in the past. It's rather simplistic to say it's a matter of just imaging and returning as quickly as possible. I agree the equipment being gone often presents a hardship for a defendant, but arguing that it's intentionally set up this way to inflict cruelty ignores the reality of investigations.

load more comments (4 replies)