Closing Thought–04Jan17

While you were ripping paper off gifts or worried about the “millions” of people pouring across our border or ranting about all those “deplorables” that do not accept Trump…..a small thing was inching its way through the Congressional process…..

Has anyone heard of “Rule #41”?

(I will pause here for a Google search)

I lied….screw Google!

The FBI and other law enforcement agencies will be able to search multiple computers across the country with a single warrant thanks to a controversial rule change that takes effect on Thursday.

The expanded search power, known as “Rule 41,” is intended to make it easier for the FBI to carry out complex computer investigations. Until now, the government could only carry out a search of computers located in the district where the federal judge granted the warrant—typically only a few counties in a given state.

Rule 41 came about as part of a regular review of criminal procedure conducted by a conference of federal judges. After several years weighing the rule and a public comment period, the conference then submitted the suggested rule change to the Supreme Court, which then approved it to go into effect on Dec. 1.


If you really want to know about the “Rule”…then read it for yourself…….

Source: preliminary-draft-proposed-amendments – proposed-amendment-rule-41.pdf

Maybe paying attention would be better than worrying about something that has NOT happened and may never…..

Merry Christmas and Happy New Year….suckers!


17 thoughts on “Closing Thought–04Jan17

  1. Interesting, but it doesn’t apply to me. My files are encrypted locally then synced with the cloud using the encrypted format (stored encrypted). I also use an encrypted email service based in Switzerland. Just because I have nothing to hide doesn’t mean that I should surrender my privacy, so I protect myself online.

    1. While I applaud your foresight, it is too late. They already know how to get past such encryption. Moreover, Google, FB, and the other social media have cooperated with them, by providing many of the necessary key algorithms needed to do so…

      There’s also the TOR network, of which there are still secure areas; but, they’re in there, as well, and won’t quit until they can access it all….

      The only solution at this point is to learn to program, and write your own programming language, which you can then encrypt beyond their ability to access…by, essentially, operating off-grid, but, with the ability to cross-platform to access the internet as it exists…

      Just for a hopeful note, I know at least one programmer who has written a piece of code, which, if released, would make a simple change that would bring down every network to which it had access, with one command given at the root….

      They’re good, but, they don’t know it all, yet…

      gigoid, the dubious

      1. If this rule change is not stopped, anyone who is using any technological means to safeguard their location privacy could find themselves suddenly in the jurisdiction of a prosecutor-friendly or technically-naïve judge, anywhere in the country.

        It significantly expands the hacking capabilities of the United States government without any discussion or public debate by elected officials. If members of the intelligence community believe these tools are necessary to advancing their investigations, then this is not the path forward. Only elected members of Congress should be writing laws, and they should be doing so in a matter that considers the privacy, security, and civil liberties of people impacted.

        Did that help?

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s