• About
    • Who am I? What am I doing here? How did I get here? (updated 10/29/2013)
  • Contact Form
  • FAIR USE NOTICE

PUMABydesign001's Blog

~ “I hope we once again have reminded people that man is not free unless government is limited. There’s a clear cause and effect here that is as neat and predictable as a law of physics: as government expands, liberty contracts.” Ronald Reagan.

PUMABydesign001's Blog

Tag Archives: government hacking

With Rule 41, Little-Known Committee Proposes to Grant New Hacking Powers to the Government

02 Monday May 2016

Posted by bydesign001 in Uncategorized

≈ Comments Off on With Rule 41, Little-Known Committee Proposes to Grant New Hacking Powers to the Government

Tags

Congress, government hacking, government surveillance, government tyranny, Invasion of Privacy, Rule 41 of the Federal Rules of Criminal Procedure, Spying, Supreme Court


Electronic Frontier Foundation (EFF.org) By Rainey Reitman

backlit keyboard

The government hacking into phones and seizing computers remotely? It’s not the plot of a dystopian blockbuster summer movie. It’s a proposal from an obscure committee that proposes changes to court procedures—and if we do nothing, it will go into effect in December.

The proposal comes from the advisory committee on criminal rules for the Judicial Conference of the United States. The amendment would update Rule 41 of the Federal Rules of Criminal Procedure, creating a sweeping expansion of law enforcement’s ability to engage in hacking and surveillance. The Supreme Court just passed the proposal to Congress, which has until December 1 to disavow the change or it becomes the rule governing every federal court across the country. This is part of a statutory process through which federal courts may create new procedural rules, after giving public notice and allowing time for comment, under a “rules enabling act.”1

The Federal Rules of Criminal Procedure set the ground rules for federal criminal prosecutions. The rules cover everything from correcting clerical errors in a judgment to which holidays a court will be closed on—all the day-to-day procedural details that come with running a judicial system.

The key word here is “procedural.” By law, the rules and proposals are supposed to be procedural and must not change substantive rights.

But the amendment to Rule 41 isn’t procedural at all. It creates new avenues for government hacking that were never approved by Congress.

The proposal would grant a judge the ability to issue a warrant to remotely access, search, seize, or copy data when “the district where the media or information is located has been concealed through technological means” or when the media are on protected computers that have been “damaged without authorization and are located in five or more districts.” It would grant this authority to any judge in any district where activities related to the crime may have occurred.

To understand all the implications of this rule change, let’s break this into two segments.

The first part of this change would grant authority to practically any judge to issue a search warrant to remotely access, seize, or copy data relevant to a crime when a computer was using privacy-protective tools to safeguard one’s location. Many different commonly used tools might fall into this category. For example, people who use Tor, folks running a Tor node, or people using a VPN would certainly be implicated. It might also extend to people who deny access to location data for smartphone apps because they don’t feel like sharing their location with ad networks. It could even include individuals who change the country setting in an online service, like folks who change the country settings of their Twitter profile in order to read uncensored Tweets.

There are countless reasons people may want to use technology to shield their privacy. From journalists communicating with sources to victims of domestic violence seeking information on legal services, people worldwide depend on privacy tools for both safety and security. Millions of people who have nothing in particular to hide may also choose to use privacy tools just because they’re concerned about government surveillance of the Internet, or because they don’t like leaving a data trail around haphazardly.

If this rule change is not stopped, anyone who is using any technological means to safeguard their location privacy could find themselves suddenly in the jurisdiction of a prosecutor-friendly or technically-naïve judge, anywhere in the country.

The second part of the proposal is just as concerning. It would grant authorization to a judge to issue a search warrant for hacking, seizing, or otherwise infiltrating computers that may be part of a botnet. This means victims of malware could find themselves doubly infiltrated: their computers infected with malware and used to contribute to a botnet, and then government agents given free rein to remotely access their computers as part of the investigation. Even with the best of intentions, a government agent could well cause as much or even more harm to a computer through remote access than the malware that originally infected the computer. Malicious actors may even be able to hijack the malware the government uses to infiltrate botnets, because the government often doesn’t design its malware securely. Government access to the computers of botnet victims also raises serious privacy concerns, as a wide range of sensitive, unrelated personal data could well be accessed during the investigation. This is a dangerous expansion of powers, and not something to be granted without any public debate on the topic.

Make no mistake: the Rule 41 proposal implicates people well beyond U.S. borders. This update expands the jurisdiction of judges to cover any computer user in the world who is using technology to protect their location privacy or is unwittingly part of a botnet. People both inside and outside of the United States should be equally concerned about this proposal.

The change to Rule 41 isn’t merely a procedural update. It significantly expands the hacking capabilities of the United States government without any discussion or public debate by elected officials. If members of the intelligence community believe these tools are necessary to advancing their investigations, then this is not the path forward. Only elected members of Congress should be writing laws, and they should be doing so in a matter that considers the privacy, security, and civil liberties of people impacted.

Rule 41 seeks to sidestep the legislative process while making sweeping sacrifices in our security. Congress should reject the proposal completely.

Read EFF and Access Now’s joint testimony on Rule 41.

 

Permission to republish granted by Electronic Frontier Foundation.org.

Creative Commons Licensed

Share this:

  • Facebook
  • Gab.ai
  • MeWe
  • Tea Party Community
  • Tumblr
  • Twitter
  • LinkedIn
  • Pinterest
  • Pocket
  • Reddit
  • Email
  • scoop.it
  • Telegram
  • WhatsApp
  • More
  • Print

Like this:

Like Loading...

Blog Stats

  • 2,627,361 hits

Google Translate

Archives

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 2,261 other subscribers
  • RSS - Posts
  • RSS - Comments

2016 Cry and Howl Conservative Blog Award

NRA Member

Ammo.com

Veterans’ Tales – A Forum for Veterans & Family Members of Vets

RSS Veterans’ Tales

  • An error has occurred; the feed is probably down. Try again later.

Wow!

WowMagazine

RSS Wow! Magazine — Recent Posts

  • An error has occurred; the feed is probably down. Try again later.

Blogroll

  • 1389 Blog – Counterjihad!
  • Bare Naked Islam
  • Be Sure You're RIGHT, Then Go Ahead
  • Boudica BPI Weblog
  • Cry and Howl
  • Fix Bayonets!
  • FREE NORTH CAROLINA
  • GRUMPY OPINIONS
  • Ike Jakson’s Blog
  • Legal Insurrection
  • LUPUS AND CHRONIC ILLNESS
  • Michelle Malkin
  • Old West Tales (Thoughts from Afar)
  • Pacific Paratrooper
  • PAJAMAS MEDIA
  • Political Clown Parade
  • Publius-Huldah’s Blog
  • Rifleman III Journal
  • The Acceptable Digest
  • The Christian Gazette
  • The Daily Rant
  • The Last Tradition
  • The Mad Jewess
  • The Religion of Peace

Ephesians 6:13

Therefore take up the whole armor of God, that you may be able to withstand in the evil day, and having done all, to stand firm.

Minds.com

Gab.ai – #SpeakFreely – Join Me

@PUMABydesign

Grumpy Opinions Conservative News and Opinions 2016

Grumpy Opinions Conservative News and Opinions 2016

Tweets

My Tweets

Creative Commons License

Creative Commons License
This work by PUMABydesign001's Blog is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Permissions beyond the scope of this license may be available at http://pumabydesign001.com/fair-use-notice/.

CREEPING SHARIA

SAY NO TO ONLINE CENSORSHIP

RSS Front Page Magazine

  • Biden Honors Anti-American Open Borders Activist
  • Zelensky’s War on Christianity
  • 1% of Democrat Counties Make Up 42% of America’s Murders
  • Another Golan Expedition for Convicted US Member of Palestinian Islamic Jihad
  • Kamala Calls Joe an ‘Extraordinary Leader’
©2017 PUMABydesign001’s Blog.

RSS Lifezette

  • An error has occurred; the feed is probably down. Try again later.

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Create a website or blog at WordPress.com

  • Follow Following
    • PUMABydesign001's Blog
    • Join 474 other followers
    • Already have a WordPress.com account? Log in now.
    • PUMABydesign001's Blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

    %d bloggers like this: