We can attack both child pornographers and the FBI? What a bonus!
6 shooter. Let’s see where the remaining 4 bullets go.
So if the malware, a category of software that is notorious for being able to propagate itself, ends up on random person’s computer, then it’s totally grounds for a raid? Because if that’s the case, then the Fourth Amendment is well and truly dead.
…I don’t wanna stick up for the Man here, but a self-propagating worm and a de-anonymizing Flash exploit are completely different kinds of malware. This is about as good a comparison as “Police officers carry weapons. Some weapons are powerful enough to destroy cities! WHY ARE POLICE OFFICERS ALLOWED TO LEVEL CITIES?”
Give it a couple more years.
I do wanna stick up for the man here, at least in this case. Oh boo hoo, a bunch of nasty people who are doing things that most people find morally repugnant got caught doing something via a method that the legal system hasn’t quite caught up with yet. They got warrants, it wasn’t just blanket trawling for info. They seized the physical server where bad guys were congregating, they didn’t just release the malware out into the wild hoping to catch some bad guys. You follow the law and the rules as they exist, not as how you wished they exist.
Or is this a case of Boing Boing et al. saying, “They came for the child pornographers, and I said nothing. Etc etc.”
You could precede that with “some wars are police actions”.
Is breaking the locks to all your doors part of a traditional search warrant?
Law enforcement based upon notions of “bad guys” versus “unlawful acts” are incompatible with each other. One is a legal problem, the other is not.
Your computer isn’t where you live. If your computer is connected to the outside, it’s not much different than a phone. Law Enforcement has been able to get wiretap warrants almost as long as there have been phones, Also, maybe I’ve watched too many police procedurals, but on occasion they do use those big doorknockers if they want to catch you by surprise because they think you might try to destroy evidence.
These days, for many, this statement is untrue.
Except that from a phone tap you get only the real time communication. By hacking a computer you get records of most of the calls who knows how long to the history, the shopping lists, the reading lists, the cookbook, and the joint roach on the floor.
Not even close to a wiretap.
This topic was automatically closed after 5 days. New replies are no longer allowed.