They don’t leave simple digital “breadcrumbs” investigators can follow to track the hackers down.Īnd certainly, as you probably agree, most citizens would want their law enforcement officials to catch the bad guys-terrorists, hacker groups, credit card thieves, data thieves, and credit account/money thieves-using any means possible. Most often, hackers and cyber-terrorists take over computers across the country to spread the attack, make the attack larger in scale, and hide their own involvement.Īfter all, hackers don’t want to get caught. Hacking isn’t a one hacker/one victim scenario, they say. The government claims they have a perfectly legitimate reason for needing that extra power. The new change to Rule 41 allows the FBI to hack into computers wherever they might be located. However, they had to limit their investigation to the district or area where the warrant was issued. The rule change takes the limits off previous investigative procedures that, in the FBI’s view, prevented them from tracking down genuine Internet criminals and exposing online threats.īefore the change, the FBI or any police or investigative group could request a warrant to gain permission to essentially “hack” the computers of suspected criminals. The FBI is and other law agencies are pleased with their new powers. The amendment recommendation came from a group of federal judges whose job it is to recommend such changes. Rule 41 is one of the many Federal Rules of Criminal Procedure. The permission was granted with the amending of Rule 41, a change recommended and presented to, and approved by, the U.S. ![]() Starting in early December of 2016, the Federal Bureau of Investigation (FBI) and other legal organizations were granted more leeway into peering into public and private networks in search of suspected online criminals. So, it’s only fitting that a recent (December 2016) change to United States Federal guidelines designed to track down online bad guys revolves around a rule. ![]() ![]() Internet crime and cyber espionage has dramatically increased over the years. They will hack, attack, mislead, and spread viruses and take over computers to do their dastardly deeds, without concern for the law or their victims. What do hackers, Internet thieves, terrorist groups, and other cybercriminals have in common? The Feds can peer into your computer and life.
0 Comments
Leave a Reply. |