U.S Agencies wants an expanded ability to hack criminal suspect’’ computers

US federal department of Justice wants to expand and legalize its ability to hack Suspected computers using Trojans and malware. The department has drafted a 402 pages long proposal which has been published by Wall Street Journal last Thrusday. 
The proposal would allow District Federal Judges to issue warrants that will authorize security agencies to locate and trape criminal suspects’ computer. 
The 402-page document entitled “Advisory Committee on Criminal Rules” is scheduled to be discussed at an upcoming Department of Justice (DOJ) meeting next month in New Orleans. In 2012 a federal Judge has allowed the FBI to hack a suspected computer. But judges of the other federal district had rejected it on the ground of fourth amendment to US constitution. Civil libertarians and legal experts are very concerned that this would unnecessarily expand government power. 
At the same time many in US department are justice are also skeptical about the effectiveness and ability of security agencies to track the hackers using Proxy servers or Tor network which hackers widely use to hide their identities and locations. 

“It is nuts,” Chris Soghoian, a technologist and senior policy analyst with the American Civil Liberties Union, told Ars. She has also written a five page case study to Federal department explaining it is virtually impossible to locate people behind proxies. She also request the department to discuss the matter in Congress as it involves the interest of people and their privacy. She further writes the federal agencies and FBI should inform the public about the techniques they use to track online activities:”There are serious particularity problems with allowing the government to search multiple computers remotely,” she wrote. 
“What’s even more troubling is we know that these ‘network investigative techniques’ are really just malware that is capable of hijacking a computer. These sorts of invasive tools require vigilant oversight and should be used in only the most extreme of circumstances.” 

View full post on Who Got Hacked – Latest Hacking News and Security Updates