U.S. Agents to Legally Hack Computers Everywhere

*Article courtesy Israel Homeland Security

diagnosis sans-serif;”>U.S. is expected to grant its legal system the authority to investigate computers located in foreign countries.

11097990_m ???????It seems that the American thirst for citizens’ private information literally knows no bounds. The U.S. is promoting laws that will make it much easier for the FBI to legally hack into suspects’ computers. U.S. judges, under the new regulations, will have the authority to approve the investigation of computers that aren’t even located on American soil. According to Erez Kreiner, President of Five C and former director of Information Security at Israel’s Shin-Bet security service, in Israel the situation is completely different. “We don’t do this sort of thing,” Kreiner told iHLS. “We never investigate systems located abroad, unless the locals cooperate.”

In addition, the new laws encourage using computerized hacking tools that abuse various code errors that exist in software installed on the suspect’s computer – tools usually used by hackers and criminal organizations to commit online fraud. The investigators will use code vulnerabilities to infiltrate computers, remotely install a type of trojan and through it mine the computer for information. “The problem with trojans is the massive amounts of information they can provide, not to mention the threat they pose to unsuspecting, innocent civilians,” explained Kreiner. “This is exactly why you need limitations and controls to be provided by the legal systems.” Not only that, one approval will allow the investigation of an unknown number of computers that are connected to that specific computer through a botnet.

iHLSIsrael Homeland Security

The timing of the proposal is also disturbing. Recently U.S. intelligence organizations seem to spiral out of control, and the decision to allow them even more cyber-freedoms is worrying, to say the least. The dust hasn’t settled on the NSA illegal abuse of the HeartBleed vulnerability, that endangered users throughout the world for years and was used by the NSA to collect information (the vulnerability was also used by criminal elements, although the NSA didn’t think it was necessary to report it to the public). On the other hand we have the CIA affair that was brought to the media’s attention six weeks ago, where agents hacked computers belonging to senators in an attempt to disrupt investigation efforts. That’s even before we add the two agencies’ activities concerning illegal tapping into the e-mail communications of leaders around the world – soon, it seems, the U.S. legal systems will be able to fully approve these sort of actions.

Hat Tip: Please visit their informative site: iHLSIsrael Homeland Security


Get free Citizensjournal.us BULLETINS. Please patronize our advertisers (including below) to keep us publishing and/or DONATE.

0 0 votes
Article Rating
Notify of
Inline Feedbacks
View all comments