Featured Articles

HP Stream is a Chromebook killer priced at $200

HP Stream is a Chromebook killer priced at $200

We have been hearing reports of a new breed of affordable Windows notebooks for months. It is alleged that a number…

More...
AMD Radeon R7 SSD line-up goes official

AMD Radeon R7 SSD line-up goes official

AMD has officially launched its first ever SSDs and all three are part of AMD’s AMD Radeon R7 SSD series.

More...
KitKat has more than a fifth of Android users

KitKat has more than a fifth of Android users

Android 4.4 is now running on more than a fifth of Android devices, according to Google’s latest figures.

More...
Aerocool Dead Silence reviewed

Aerocool Dead Silence reviewed

Aerocool is well known for its gamer cases with aggressive styling. However, the Dead Silence chassis offers consumers a new choice,…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Monday, 14 January 2013 10:51

Aussie spooks want licence to hack

Written by Nick Farrell



Added to licence to kill and chunder


The Aussie spy agency ASIO wants the right to turn into Australians' computers and and smartphones into botnets.  

The botnets would be used to transmit viruses to terrorists. The Attorney-General's Department is pushing for new powers for the Australian Security Intelligence Organisation to hijack the computers of suspected terrorists. It wants the ASIO be authorised to ''use a third party computer for the specific purpose of gaining access to a target computer''.

It would only be used in extremely limited circumstances and only when explicitly approved by the Attorney-General through a warrant. Spooks would not be able to obtain intelligence material from the third party computer. The ASIO Act now bans spies from doing anything that ''adds, deletes or alters data or interferes with, interrupts or obstructs the lawful use of the target computer by other persons''.

If the ban is lifted Attorney-General Nicola Roxon can issue a warrant for spies to secretly intercept third-party computers to disrupt their target.

Nick Farrell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments