Latest: Digital For Tech News Click Here

Friday, 28 March 2014

U.S Agencies wants an expanded ability to hack criminal suspect'’ computers

place Google AdSense code here

US federal department of Justice wants to expand and legalize its ability to hack Suspected computers using Trojans and malware. The department has drafted a 402 pages long proposal which has been published by Wall Street Journal last Thrusday. 
The proposal would allow District Federal Judges to issue warrants that will authorize security agencies to locate and trape criminal suspects' computer. 
The 402-page document entitled “Advisory Committee on Criminal Rules" is scheduled to be discussed at an upcoming Department of Justice (DOJ) meeting next month in New Orleans. In 2012 a federal Judge has allowed the FBI to hack a suspected computer. But judges of the other federal district had rejected it on the ground of fourth amendment to US constitution. Civil libertarians and legal experts are very concerned that this would unnecessarily expand government power. 
At the same time many in US department are justice are also skeptical about the effectiveness and ability of security agencies to track the hackers using Proxy servers or Tor network which hackers widely use to hide their identities and locations. 

“It is nuts,” Chris Soghoian, a technologist and senior policy analyst with the American Civil Liberties Union, told Ars. She has also written a five page case study to Federal department explaining it is virtually impossible to locate people behind proxies. She also request the department to discuss the matter in Congress as it involves the interest of people and their privacy. She further writes the federal agencies and FBI should inform the public about the techniques they use to track online activities:"There are serious particularity problems with allowing the government to search multiple computers remotely," she wrote. 
"What's even more troubling is we know that these 'network investigative techniques' are really just malware that is capable of hijacking a computer. These sorts of invasive tools require vigilant oversight and should be used in only the most extreme of circumstances." 

View the original article here

0 comments: Post Yours! Read Comment Policy ▼
We have Zero Tolerance to Spam. Chessy Comments and Comments with Links will be deleted immediately upon our review.

Post a Comment

Copyright © 2013 MyBloggerBlog Template All Right Reserved
Designed by MyBloggerBlog | Powered by Blogger