• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Federal Judge: Hacking Someone’s Computer Is Definitely a ‘Search’

September 13, 2016 by Jason A Lindsley 5 Comments

A federal judge ruled that hacking someone’s computer, for purposes of an investigation, constitutes a fourth amendment search.  Therefore, law enforcement and the FBI would require a warrant to hack and search an individuals computer for purposes of an investigation.

This seemed obvious to me, but apparently it’s been debated in the court of law for years.  I agree in theory that individuals should have a reasonable expectation of privacy with their IP address, but in reality, anything you do on the Internet has the potential to become public.  Regardless of whether hacking someone’s computer for an investigation requires a warrant, I’m glad they caught the people referenced in this article.

http://motherboard.vice.com/read/hacking-is-a-search-according-to-federal-judge

Filed Under: Week 03: Reconnaisance Tagged With:

Reader Interactions

Comments

  1. Shain R. Amzovski says

    September 13, 2016 at 9:45 am

    I agree with the Judge’s ruling that if the FBI or other government agency hack a computer for investigative purposes, they should obtain a search warrant from a local magistrate. If an agency has the ability to access a computer’s file system, and have the ability to look at history, etc., they should have to go through the same process as if a laptop was confiscated as evidence. Monitoring of IPs, and internet traffic is still an issue that needs to be discussed, should agencies be allowed to monitor your internet traffic and see what websites you are going to without your permission? Also Jason, I agree that anything you do on the internet has the potential to become public.

    Log in to Reply
  2. Scott Radaszkiewicz says

    September 13, 2016 at 8:27 pm

    I agree that a search warrant should be in place for this type of thing to happen. Unfortunately, living in the technology age, the rules and regulations are always going to be playing catch up. There is will always be that first time some uses technology in a way that no one ever thought, and courts will have to rule on how it should be handled.

    I also find it humorous that the judge, while ruling they need a search warrant, still declined the defenses request to dismiss the evidence they found because of it. Isn’t that a contradiction?

    Log in to Reply
  3. Noah J Berson says

    September 13, 2016 at 8:29 pm

    I know how straight forward an answer this seems, but the legal system is always a bit slow to adapting to new technology. The slowness has to do with how even simple terms like “search” need to have a specific definition that has multiple tests that would hold up in a court. Another debate in law that is similar is if smell is enough for probable cause for a vehicle search. The legal question they are answering here is if your computer has malware on it, do you still have a reasonable expectation of privacy. The FBI is still going to continue to fight for their right to hack though.

    Log in to Reply
  4. Vaibhav Shukla says

    September 16, 2016 at 2:30 pm

    I really appreciate the judge ruling that in order hack a computer for investigative purposes FBI should obtain a search warrant from a local magistrate.When a person is in the list of investigation then he is just one of the source of investigation and investigation can lead to many sources its like licensing the FBI to hack any person data in the name of investigation.
    The FBI or agencies has now have to justify the hacking of data and in what sense it gonna help them to the magistrate in order to obtain the warrant

    Log in to Reply
  5. Mauchel Barthelemy says

    September 18, 2016 at 10:59 am

    It is difficult to have an absolutist view on this Privacy vs Security controversy. I believe this is something that must be done in a way that is fair for all parties involved. Should companies like Google, Samsung or Apple create a back door specifically for law enforcement? Probably yes, probably no. If they do, then hackers will figure out a way to exploit the system. On the other hand, this raises home land security risks concerns. Maybe the best solution is for Federal agencies to develop with their own tools and make it illegal for the general public to use.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in