Lawyers for a Russian man charged with hacking into U.S. businesses asked a federal judge to throw out evidence taken off his laptop computer after it was discovered that files were modified and accessed between the time of his arrest and when a search warrant was secured.
Lawyers for a Russian man charged with hacking into U.S. businesses asked a federal judge in Seattle to throw out evidence taken off his laptop computer after it was discovered that hundreds of files were modified and thousands of others were accessed between the time of his arrest and when a search warrant was secured.
The discovery of the accessed files on Roman Seleznev’s laptop calls into question the validity of all evidence stored on the device, Seleznev lawyer John Henry Browne said in a motion filed Thursday in U.S. District Court.
The new information discovered by a computer forensic expert raises several problems: Either the U.S. Secret Service accessed the laptop before it had a search warrant; or the agency failed to protect the laptop when it was in its custody; or agents went in and modified data, Browne said.
Federal prosecutors plan to oppose the motion by arguing that the defense claims are not grounds for suppressing the evidence, Browne said in the motion, adding that he disagrees with that premise. “The government’s bad faith and corruption of evidence mandate suppression,” Browne said.
Most Read Stories
- I-5 reopened after semitruck crash, authorities warn of lingering delays in Seattle VIEW
- Taco truck, stuck in Seattle’s big I-5 closure, opens for lunch anyway
- Sound Transit uses inflated car values to collect higher tab fees
- Snow returns for Monday afternoon commute; lightning strikes Space Needle VIEW
- It’s official: You can’t take the Seahawks’ Richard Sherman seriously anymore | Matt Calkins
Federal prosecutors describe Seleznev as “a leader in the marketplace for stolen credit cards.”
They said his criminal scheme involved hacking into business computers, everything from pizza shops to baking companies, and stealing more than two million credit card numbers. He then sold that data on a special website and made millions, according an indictment charging him with 40 felony counts ranging from identity theft to wire fraud.
His trial is set for May 9.
Seleznev’s Sony Vaio laptop was seized when U.S. Secret Service agents arrested him in the Maldives on July 5, 2014. The device was sent to an evidence vault at the agency’s Seattle field office. An agent filed an affidavit to support a search warrant on July 28, 2014, that said Seleznev’s devices were stored “in a manner in which their contents are, to the extent material to the investigation, in substantially the same state” as when they were taken by agents.
A special agent began his forensic examination of the laptop on Aug. 1, 2014, and noted in his report that “several files” had been written after Seleznev’s arrest and before the warrant was issued. However, a computer forensic expert’s report sent to the defense lawyers on March 2, said 274 files were modified and thousands of files had been accessed after the arrest and before the warrant was secured.
Because there’s no way to know what the laptop data looked like before the seizure, all evidence taken from the device should be thrown out, Browne said.
“There was no excuse for the per se unreasonable warrantless intrusions into the laptop, which were clearly unconstitutional to any member of law enforcement,” the motion said. “Moreover, it appears that the USSS knowingly failed to disclose that the files had last access and modification dates that were post-seizure and pre-warrant.”