{"id":13334,"date":"2016-03-19T14:30:21","date_gmt":"2016-03-19T19:30:21","guid":{"rendered":"http:\/\/hcstx.org\/?p=13334"},"modified":"2016-03-19T14:30:21","modified_gmt":"2016-03-19T19:30:21","slug":"cyber-warfare-policing-the-dark-web-and-how-it-effects-national-sovereignty","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/03\/19\/cyber-warfare-policing-the-dark-web-and-how-it-effects-national-sovereignty\/","title":{"rendered":"Cyber-Warfare: Policing The Dark Web and How it Can Effect National Sovereignty"},"content":{"rendered":"<h3 style=\"text-align:center;\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-13335\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/03\/keybaords.jpg\" alt=\"keybaords\" width=\"620\" height=\"291\" \/><\/h3>\n<h3 style=\"text-align:center;\">Cops hack into foreign computers to find cyber criminals<\/h3>\n<p>As crime continues to proliferate on the so-called dark web, law enforcement agencies are sometimes having to work outside of their jurisdiction. When a suspected criminal acts on the dark web, authorities are unlikely to know where in the world he or she is physically located. So if they then attempt to take action, they might be inadvertently carrying out an operation that crosses borders.<\/p>\n<p>One researcher argues in a <a href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2742706\" target=\"_blank\" rel=\"noopener\">working paper<\/a> that this raises serious concerns around national sovereignty, and could even lead to retaliation from affected countries or prosecution of investigators.<\/p>\n<p>\u201cBasically, it&#8217;s like playing Russian Roulette with cross-border cyber operations,\u201d Ahmed Ghappour, visiting assistant professor at UC Hastings College of Law and author of the paper \u201cSearching Places Unknown: Law Enforcement Jurisdiction on the Dark Web,\u201d told Motherboard in a phone call.<\/p>\n<p>In response to dark web-related crime, law enforcement agencies have moved to more non-traditional means of identifying suspects, in <a href=\"https:\/\/motherboard.vice.com\/read\/the-fbis-unprecedented-hacking-campaign-targeted-over-a-thousand-computers\" target=\"_blank\" rel=\"noopener\">some cases directly hacking<\/a>\u00a0criminals\u2019 computers to circumvent the protections given by the Tor anonymity network.<\/p>\n<p>But, because it&#8217;s largely impossible to know where a target computer is located before it&#8217;s been hacked, the FBI and other bodies are sometimes breaking into computers overseas, without explicit consent of the host country. \u201cAt bottom, no country has consented to us hacking them, or hacking their citizens, in the same way that we haven&#8217;t consented to another country to hack us,\u201d Ghappour said.<\/p>\n<p>Read the Remainder at <strong><a href=\"http:\/\/motherboard.vice.com\/read\/dark-web-policing-threatens-national-sovereignty-researcher-argues\">Motherboard<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cops hack into foreign computers to find cyber criminals As crime continues to proliferate on the so-called dark web, law enforcement agencies are sometimes having to work outside of their jurisdiction. When a suspected criminal acts on the dark web, authorities are unlikely to know where in the world he or she is physically located&#8230;.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[2805,2122,5406,13,74,1317,4912,4126,883,4479,4333,4942,1814,1928,1635,3553,65,3712],"tags":[3357,10408,10409,1242,223,10410,3102,1815,1817,1699],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/13334"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=13334"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/13334\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=13334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=13334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=13334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}