Skype Chats Between Megaupload Employees Recorded with a Governmental Trojan? (CNET News)
Thursday February 2nd, 2012
From CNET News:
In one exchange, MegaUpload managers fretted via Skype IM chat in 2007 that founder Kim Dotcom wasn't "safe with his money" and "the current situation is a bit risky," according to documents U.S. authorities filed with a New Zealand court this month as part of their criminal pursuit of the embattled cyberlocker service.Full story here.
While it's still not clear how federal investigators gained access to the conversations of founder Kim DotCom and other top managers, there are hints that the FBI managed to place government-issued spyware on the defendants' computers.
The FBI cites alleged conversations between DotCom and his top lieutenants, including e-mail and Skype instant-messaging logs. Some of the records go back nearly five years, to MegaUpload's earliest days as a cyberlocker service--even though Skype says "IM history messages will be stored for a maximum of 30 days" and the criminal investigation didn't begin until a few months ago.
Sources told CNET yesterday that Skype, the Internet phone service now owned by Microsoft, was not asked by the feds to turn over information and was not served with legal process.
The U.S. Department of Justice told CNET that it obtained a judge's approval before securing the correspondence, which wouldn't have been necessary in the case of an informant. "Electronic evidence was obtained though search warrants, which are reviewed and approved by a U.S. court," a spokesman for the U.S. Attorney for the Eastern District of Virginia said.
In 2007, the FBI obtained court approval to implant spyware called CIPAV on a suspect's computer, which transmitted to government computers an ongoing log of the user's outbound connections. Documents obtained by CNET through the Freedom of Information Act in 2009 show that CIPAV has been used in investigations designed to nab extortionists, database-deleting hackers, child molesters, and hitmen.
Skype saves chat records with contacts in a directory on the local hard drive, which could be accessed by FBI-planted spyware.
It's not only the FBI that uses spyware to intercept communications. Last fall, the Chaos Computer Club discovered that German police were using spyware that could activate the suspect's microphone and webcam.