Today, the FBI becomes the enemy of every computer user and every IT security professional worldwide

by Rick Falkvinge

Today December 1, the United States FBI is granted new powers to intrude into any computer anywhere on the globe, instantly changing the FBI from a random law enforcement agency to a global adversary. Law enforcement agencies are expected to be met with open arms and treated as good guys. There’s not going to be any good guy treatment of the FBI here, and for good reason.

The U.S. FBI has been sort of a random law enforcement agency somewhere on the planet doing physical law enforcement work, kind of like the Bundespolizei in Germany would appear to an American, or the way the Policía Federal Argentina would appear to a European. Today, the FBI becomes a global adversary and enemy to every security-conscious computer user and to every IT security professional, similar to how the mass surveillance agencies are treated. The FBI has requested, and been granted, the lawful power (in the US) to intrude into any computer in the entire world. In 95% of the world, this makes the FBI no different from a Russian or Chinese criminal intruder, and it will be treated in the same way by people defending their systems; defending their homes.

This has happened under the boring legislative name of “changes to Rule 41”, and is (as always!) presented as nothing of particular interest. This is an old trick: when you want sweeping broad new powers without accountability, don’t call it “sweeping broad new power without accountability”, but cloud it in a name so boring it will interest absolutely nobody. (This lawmaker trick was skillfully observed by John Oliver, who said we shouldn’t call the peer-to-peerness of the Internet a boring term like “net neutrality”, but the more to-the-point “preventing cable company fuckery”.)

These “changes to Rule 41” put a lot of people in the FBI’s crosshairs. As usual, most people think new powers for law enforcement can only target criminals – as in actual, violent criminals. This would be the reasonable course of action, but not so in this case, not so at all. Techdirt points out that anybody using encryption, or anybody trying to hide their identity or location, can be presumed to be engaged in crime (having a “guilty mind”, or mens rea in Legalese Latin) and therefore be a valid target.

[read more here]

6 Responses

  1. […] via Today, the FBI becomes the enemy of every computer user and every IT security professional worldwide… […]

  2. Fuck them.

  3. if they treated their evidence on anybody as they treated shillary’s evidence, they won’t be doing anything other than getting in some voyeurism

  4. Tsunami of Fascism brought by R/ D Repugnocrats
    soon sweeping away all semblance of whatever
    semblance of decency remaining in this despicable serf-dumb.
    Welcome billion-errs / crazed pentagon Bring It On!
    We richly deserve the dictators’ deth of murdika

  5. i guess i’ve joined the party …
    of alchemy / Putrefactio.
    Entropy, Dissolution, Blow-It-All-Up , Dust to Dust.

    But i’m kinda lucky–never re-produced.
    knew in the late Sixties Genocide of VietNam
    that this evil nazi country meant only D O O M

  6. If the Department of Justice Federal Bureau of Investigation talks
    like the Roman Curia’s Inquisition;

    the Department of Homeland Security Central Intelligence Agency walks like a Roman Curia Conspiracy;

    then Washington DC’s seven hills have become
    your Roman Curia’s New World Order
    just like they bragged they would.

    Repent your karma.

    Mein Kampf was ghostwritten by a priest…later murdered during Night of the Long Knives.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: