a) hardcore hacking attempts trying to remotely gain access.
b) Emailing a suspect an attachment containing a keylogger etc
c) Port scanning, checking for public shared folders (p2p included), and scanning them.
Or any number of other things. So far the articles on this news story are just spreading FUD about, but it seems pretty likely it's b) and c) - big deal.
It sounds likely that they'll just email you over some attachment/link to website/exploit/etc and hope you bite which is hardly a threat to anyone who has a clue.
Also calling that "remotely access and monitor any PC without warrant.", or "hacking" is an extremely big stretch, but then it's all about what sells newspapers...
Also calling that "remotely access and monitor any PC without warrant.", or "hacking" is an extremely big stretch, but then it's all about what sells newspapers...
Well, this is definitely criminal behavior when spammers do it. I don't see how it would be any less criminal when done by the police. If they can get a warrant, it would be a lot easier to just break down your door and take your machine. (Of course, your crypto keys won't be in memory then, which could be a problem for them.)
Anyway, get some judicial oversight, and then I don't care. If you don't have a warrant, though, this is extremely unethical. What is the point of having a legal system if it stoops to the low level of the common scammer?
Does anyone have any decent reference to this? All I can find is articles from blogs which are not quoting any official source on this matter. There has to be some official paper to read somewhere...
Thanks for posting this. Unfortunately it doesn't really add much detail. Have you had any luck in tracking down more details?
There are some gems though, "According to recent reports, images of sexually abused children available on-line quadrupled in the last five years and half of all internet crime involves the production, distribution and sale of child pornography."
I can easily believe the first figure of a quadrupling over the past 5 years but I find the second figure highly suspect.
No, unfortunaly I haven’t been able to find anything else beside that article, I gave up shortly after that. If someone is familiar with the UK law and politic system they could look for further info on that side, as it seems it is something brought up (and affecting?) only the UK (beside the fact it’s the EU financing this project).
As usual with such articles, this one too is low on facts and references and high on drama and exaggeration. They (the Council) don't just "decide" that from now on this is going to be legal. For it to be legal it has to become a law, and to become a law it has to pass through Parliament, a highly unlikely scenario.
If you use Google Desktop, and enable the 'Search Across Computers' feature, they don't even have to 'hack' your machine. They can just ask Google for a full index of what's on your machine!
Ideological concerns aside, I don't really see that much of a problem in law enforcement hacking personal computers. For one thing, it just might stimulate the crypto and computer security industries. For another, there shouldn't be anything to hide, right? I mean, if they start cracking down on pirated software and whatever, that might be a little bit of an issue...
Everyone has something to hide. You have photos of Big Ben and a degree in electronics? Translates into, "This guy is possibly planning to bomb a clock tower."
One problem with any crypto technique is that you can never know for certain that it hasn't already been broken, you just know about vulnerabilities that have been disclosed.
If you have everything encrypted and follow proper procedures (choose a good passphrase, don't tell anyone, don't enter it on untrusted terminals over plaintext links etc) and suddenly the police are showing up with all kinds of stuff encrypted by people using this algorithm in court they have tipped their hand. My understanding is that any evidence must be legally obtained and they have to explain how they obtained it for it to be admissable.
IANAL
It sounds likely that they'll just email you over some attachment/link to website/exploit/etc and hope you bite which is hardly a threat to anyone who has a clue.
Also calling that "remotely access and monitor any PC without warrant.", or "hacking" is an extremely big stretch, but then it's all about what sells newspapers...