Μόλις έπεσε στα χέρια μου αυτό:
http://www.ipcommission.org/report/IP_Commission_Report_052213.pdf
Search for "camera".
"While not currently permitted under U.S. law, there are increasing calls for creating a more permissive environment for active network defense that allows companies not only to stabilize a situation but to take further steps, including actively retrieving stolen information, altering it within the intruder’s networks, or even destroying the information within an unauthorized network. Additional measures go further, including photographing the hacker using his own system’s camera, implanting malware in the hacker’s network, or even physically disabling or destroying the hacker’s own computer or network. "
Additionally, software can be written that will allow only authorized users to open files containing valuable information. If an unauthorized person accesses the information, a range of actions might then occur. For example, the file could be rendered inaccessible and the unauthorized user’s computer could be locked down, with instructions on how to contact law enforcement to get the password needed to unlock the account.
The definition of the word "hacker" covers IP theft, which includes those who share music, movies, etc. (Search for "hacker" in the article)
Επείγον:Proof that lobbyists wanted NSA-like spying?
-
- Μέλος του Κόμματος Πειρατών
- Δημοσιεύσεις: 2439
- Εγγραφή: 16 Ιαν 2012, 11:10
- Τοποθεσία: Χαλάνδρι
- Επικοινωνία:
Επείγον:Proof that lobbyists wanted NSA-like spying?
Ε.Δ.Α.Π.Ε. The truth is out there.
-
- Μέλος του Κόμματος Πειρατών
- Δημοσιεύσεις: 2439
- Εγγραφή: 16 Ιαν 2012, 11:10
- Τοποθεσία: Χαλάνδρι
- Επικοινωνία:
Re: Επείγον:Proof that lobbyists wanted NSA-like spying?
Raise the policy and enforcement priority of IP protection in the U.S. government. Designate the national security advisor as the principal policy coordinator for all actions regarding the protection of American intellectual property
While the Commission believes that policy coordination and emphasis on IP protection need to be accomplished at the White House level, it does not recommend that the detailed work of implementing an effective program can or should be supervised by White House staff. Efforts to protect American intellectual property will involve literally thousands of detailed actions—data gathering and research, interagency coordination, work with the private sector, coordination with Congress, and interactions with foreign government agencies. This work must be done by expert officials across many departments and agencies working together in interagency teams with a great deal of private-sector outreach. The government needs to develop an interagency team of expert officials similar to, but even more active than, the Committee on Foreign Investment in the United States (CFIUS). Membership on the interagency team would include, at a minimum, representatives from the Commerce Department, FBI, Justice Department, Office of the Director of National Intelligence, State Department, U.S. Customs and Border Protection, U.S. Patent and Trademark Office, and U.S. Trade Representative.
While not currently permitted under U.S. law, there are increasing calls for creating a more permissive environment for active network defense that allows companies not only to stabilize a situation but to take further steps, including actively retrieving stolen information, altering it within the intruder’s networks, or even destroying the information within an unauthorized network. Additional measures go further, including photographing the hacker using his own system’s camera, implanting malware in the hacker’s network, or even physically disabling or destroying the hacker’s own computer or network.
... corporations need better information, and thus an open, two-way communications flow between companies and U.S. government agencies is more necessary than ever before. Companies cannot be asked to share more information unless they have a reasonable expectation that they will receive useful information in return, and they need protections from lawsuits if they do provide information
If an unauthorized person accesses the information, a range of actions might then occur. For example, the file could be rendered inaccessible and the unauthorized user’s computer could be locked down, with instructions on how to contact law enforcement to get the password needed to unlock the account.
While the Commission believes that policy coordination and emphasis on IP protection need to be accomplished at the White House level, it does not recommend that the detailed work of implementing an effective program can or should be supervised by White House staff. Efforts to protect American intellectual property will involve literally thousands of detailed actions—data gathering and research, interagency coordination, work with the private sector, coordination with Congress, and interactions with foreign government agencies. This work must be done by expert officials across many departments and agencies working together in interagency teams with a great deal of private-sector outreach. The government needs to develop an interagency team of expert officials similar to, but even more active than, the Committee on Foreign Investment in the United States (CFIUS). Membership on the interagency team would include, at a minimum, representatives from the Commerce Department, FBI, Justice Department, Office of the Director of National Intelligence, State Department, U.S. Customs and Border Protection, U.S. Patent and Trademark Office, and U.S. Trade Representative.
While not currently permitted under U.S. law, there are increasing calls for creating a more permissive environment for active network defense that allows companies not only to stabilize a situation but to take further steps, including actively retrieving stolen information, altering it within the intruder’s networks, or even destroying the information within an unauthorized network. Additional measures go further, including photographing the hacker using his own system’s camera, implanting malware in the hacker’s network, or even physically disabling or destroying the hacker’s own computer or network.
... corporations need better information, and thus an open, two-way communications flow between companies and U.S. government agencies is more necessary than ever before. Companies cannot be asked to share more information unless they have a reasonable expectation that they will receive useful information in return, and they need protections from lawsuits if they do provide information
If an unauthorized person accesses the information, a range of actions might then occur. For example, the file could be rendered inaccessible and the unauthorized user’s computer could be locked down, with instructions on how to contact law enforcement to get the password needed to unlock the account.
Ε.Δ.Α.Π.Ε. The truth is out there.
-
- Μέλος του Κόμματος Πειρατών
- Δημοσιεύσεις: 2439
- Εγγραφή: 16 Ιαν 2012, 11:10
- Τοποθεσία: Χαλάνδρι
- Επικοινωνία:
Re: Επείγον:Proof that lobbyists wanted NSA-like spying?
Θα κάτσω να το διαβάσω για να βρω κιάλλα μαργαριτάρια. Κάθε βοήθεια δεκτή.
Ε.Δ.Α.Π.Ε. The truth is out there.
-
- Μέλος του Κόμματος Πειρατών
- Δημοσιεύσεις: 2165
- Εγγραφή: 28 Νοέμ 2011, 18:17
- Τοποθεσία: Θεσσαλονίκη
Re: Επείγον:Proof that lobbyists wanted NSA-like spying?
Ζιο στείλε το στον Ρικ, αν δε το έχει δει...
1. Προστασία της ιδιωτικής ζωής .
2. Μεταρρύθμιση της νομοθεσίας για το copyright.
3. Αλλαγές στην Ευρωπαϊκή νομοθεσία για τις πατέντες.
+1. Διαφάνεια της Δημόσιας Διοίκησης.
2. Μεταρρύθμιση της νομοθεσίας για το copyright.
3. Αλλαγές στην Ευρωπαϊκή νομοθεσία για τις πατέντες.
+1. Διαφάνεια της Δημόσιας Διοίκησης.
-
- Μέλος του Κόμματος Πειρατών
- Δημοσιεύσεις: 2439
- Εγγραφή: 16 Ιαν 2012, 11:10
- Τοποθεσία: Χαλάνδρι
- Επικοινωνία:
Re: Επείγον:Proof that lobbyists wanted NSA-like spying?
ekfrasi έγραψε:Ζιο στείλε το στον Ρικ, αν δε το έχει δει...
Μην μπαίνω ανάμεσά σας, στείλτο εσύ που είστε και οικογένεια.
Ε.Δ.Α.Π.Ε. The truth is out there.
-
- Μέλος του Κόμματος Πειρατών
- Δημοσιεύσεις: 2165
- Εγγραφή: 28 Νοέμ 2011, 18:17
- Τοποθεσία: Θεσσαλονίκη
Re: Επείγον:Proof that lobbyists wanted NSA-like spying?
zio_donnie έγραψε:ekfrasi έγραψε:Ζιο στείλε το στον Ρικ, αν δε το έχει δει...
Μην μπαίνω ανάμεσά σας, στείλτο εσύ που είστε και οικογένεια.
Ξέχασα τη Σουηδική μου καταγωγή προς στιγμή




Το έστειλα όμως

1. Προστασία της ιδιωτικής ζωής .
2. Μεταρρύθμιση της νομοθεσίας για το copyright.
3. Αλλαγές στην Ευρωπαϊκή νομοθεσία για τις πατέντες.
+1. Διαφάνεια της Δημόσιας Διοίκησης.
2. Μεταρρύθμιση της νομοθεσίας για το copyright.
3. Αλλαγές στην Ευρωπαϊκή νομοθεσία για τις πατέντες.
+1. Διαφάνεια της Δημόσιας Διοίκησης.
Μέλη σε σύνδεση
Μέλη σε αυτή την Δ. Συζήτηση: 5 και 0 επισκέπτες