Επείγον:Proof that lobbyists wanted NSA-like spying?
Δημοσιεύτηκε: 27 Ιουν 2013, 02:00
Μόλις έπεσε στα χέρια μου αυτό:
http://www.ipcommission.org/report/IP_Commission_Report_052213.pdf
Search for "camera".
"While not currently permitted under U.S. law, there are increasing calls for creating a more permissive environment for active network defense that allows companies not only to stabilize a situation but to take further steps, including actively retrieving stolen information, altering it within the intruder’s networks, or even destroying the information within an unauthorized network. Additional measures go further, including photographing the hacker using his own system’s camera, implanting malware in the hacker’s network, or even physically disabling or destroying the hacker’s own computer or network. "
Additionally, software can be written that will allow only authorized users to open files containing valuable information. If an unauthorized person accesses the information, a range of actions might then occur. For example, the file could be rendered inaccessible and the unauthorized user’s computer could be locked down, with instructions on how to contact law enforcement to get the password needed to unlock the account.
The definition of the word "hacker" covers IP theft, which includes those who share music, movies, etc. (Search for "hacker" in the article)
http://www.ipcommission.org/report/IP_Commission_Report_052213.pdf
Search for "camera".
"While not currently permitted under U.S. law, there are increasing calls for creating a more permissive environment for active network defense that allows companies not only to stabilize a situation but to take further steps, including actively retrieving stolen information, altering it within the intruder’s networks, or even destroying the information within an unauthorized network. Additional measures go further, including photographing the hacker using his own system’s camera, implanting malware in the hacker’s network, or even physically disabling or destroying the hacker’s own computer or network. "
Additionally, software can be written that will allow only authorized users to open files containing valuable information. If an unauthorized person accesses the information, a range of actions might then occur. For example, the file could be rendered inaccessible and the unauthorized user’s computer could be locked down, with instructions on how to contact law enforcement to get the password needed to unlock the account.
The definition of the word "hacker" covers IP theft, which includes those who share music, movies, etc. (Search for "hacker" in the article)