{"id":4912,"date":"2016-07-28T13:18:47","date_gmt":"2016-07-28T05:18:47","guid":{"rendered":"http:\/\/staging.bankvaultonline.com\/?p=4912"},"modified":"2016-07-28T13:18:47","modified_gmt":"2016-07-28T05:18:47","slug":"when-malware-isnt-malware","status":"publish","type":"post","link":"https:\/\/www.bankvault.com\/when-malware-isnt-malware\/","title":{"rendered":"When Malware Isn\u2019t Malware\u2026?"},"content":{"rendered":"

Malware has become a major tool for the bad guys. It\u2019s become increasingly easy for hackers to slip a little bit of bad code into your computer, through an email attachment, a \u201csafe\u201d download, or even through an image on a compromised site you may visit.<\/p>\n

But is malware also becoming a tool for the good guys?<\/p>\n

And are they still \u201cgood guys\u201d once they\u2019re using it?<\/p>\n

The FBI have opened up the question by deploying malware during their recent operation to bring down a dark web child pornography site. Operation Playpen resulted in more than 100 arrests, which is a successful sting by any measure.<\/p>\n

However, the use of FBI-created malware to obtain the evidence for the arrests have both security and privacy advocates worried. Before now, some judges have ruled that evidence obtained through malware has not been gathered with proper warrants and is, therefore, inadmissible.<\/p>\n

And how does the FBI see it?<\/p>\n

\u201cA reasonable person or society would not interpret the actions taken by a law enforcement officer pursuant to a court order to be malicious.\u201d At least, this is how it was phrased in the legal brief<\/a> submitted \u2013 essentially, \u201cwe\u2019re the good guys, so it\u2019s gotta be ok, right?\u201d<\/p>\n

Let\u2019s examine the premise that they\u2019re the good guys. The FBI have been involved with unconstitutional racial profiling<\/a>, hidden hate crimes<\/a>, attempted to undermine Martin Luther King Jr<\/a>., wiretapped and bugged<\/a> citizens during prohibition, rounded up Japanese Americans<\/a> to be interred during WWII, and have a record of encouraging and supporting domestic terrorists<\/a>.<\/p>\n

These \u201cgood guys\u201d are rolling out a $1 billion facial recognition<\/a> and biometrics database which indiscriminately includes innocent people, are making a big push to access your internet browsing history<\/a>, and skulking around at political events secretly filming<\/a> protestors.<\/p>\n

We sure are betting big that the FBI are the good guys, and will remain the good guys, despite their shaky history of good behaviour and their constant, effective weakening of personal privacy rights.<\/p>\n

In the latest assault, the Supreme Court has granted the FBI and DOJ expanded rights allowing a warrant to be obtained to hack multiple computers simultaneously, even when their locations are unknown and the owner is not suspected of a crime or is known to be innocent. It\u2019s a free pass to hack any computer<\/a>, for any reason.<\/p>\n

And the tool the FBI will use? Well, they\u2019re carefully calling it a \u201cNetwork Investigation Tool\u201d but I\u2019d rather use a word we are all a little more familiar with: Malware.<\/p>\n

Is Government hacking of private computers simply a sign of our dangerous times? Or is it a massive undermining of privacy rights, simply waiting for the right fascist dictator to come along to exploit it? Visit us on Facebook and tell us your thoughts.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

Malware has become a major tool for the bad guys. It\u2019s become increasingly easy for hackers to slip a little bit of bad code into your computer, through an email attachment, a \u201csafe\u201d download, or even through an image on a compromised site you may visit. But is malware also becoming a tool for the […]<\/p>\n","protected":false},"author":2,"featured_media":4913,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[],"class_list":["post-4912","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news"],"yoast_head":"\nWhen Malware Isn\u2019t Malware\u2026? - BankVault<\/title>\n<meta name=\"description\" content=\"Is malware also becoming a tool for the good guys? and are they still \u201cgood guys\u201d once they\u2019re using it?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bankvault.com\/when-malware-isnt-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When Malware Isn\u2019t Malware\u2026? - BankVault\" \/>\n<meta property=\"og:description\" content=\"Is malware also becoming a tool for the good guys? and are they still \u201cgood guys\u201d once they\u2019re using it?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bankvault.com\/when-malware-isnt-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"BankVault\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BankVaultOnline\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-28T05:18:47+00:00\" \/>\n<meta name=\"author\" content=\"BankVault\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bankvaultonline\" \/>\n<meta name=\"twitter:site\" content=\"@bankvaultonline\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"BankVault\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"When Malware Isn\u2019t Malware\u2026? - BankVault","description":"Is malware also becoming a tool for the good guys? and are they still \u201cgood guys\u201d once they\u2019re using it?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bankvault.com\/when-malware-isnt-malware\/","og_locale":"en_US","og_type":"article","og_title":"When Malware Isn\u2019t Malware\u2026? - BankVault","og_description":"Is malware also becoming a tool for the good guys? and are they still \u201cgood guys\u201d once they\u2019re using it?","og_url":"https:\/\/www.bankvault.com\/when-malware-isnt-malware\/","og_site_name":"BankVault","article_publisher":"https:\/\/www.facebook.com\/BankVaultOnline\/","article_published_time":"2016-07-28T05:18:47+00:00","author":"BankVault","twitter_card":"summary_large_image","twitter_creator":"@bankvaultonline","twitter_site":"@bankvaultonline","twitter_misc":{"Written by":"BankVault","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bankvault.com\/when-malware-isnt-malware\/#article","isPartOf":{"@id":"https:\/\/www.bankvault.com\/when-malware-isnt-malware\/"},"author":{"name":"BankVault","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/76e0aa85d5ac5405b47c0760eb9ab639"},"headline":"When Malware Isn\u2019t Malware\u2026?","datePublished":"2016-07-28T05:18:47+00:00","dateModified":"2016-07-28T05:18:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bankvault.com\/when-malware-isnt-malware\/"},"wordCount":474,"publisher":{"@id":"https:\/\/www.bankvault.com\/#organization"},"image":{"@id":"https:\/\/www.bankvault.com\/when-malware-isnt-malware\/#primaryimage"},"thumbnailUrl":"","articleSection":["IT security news"],"inLanguage":"en-AU"},{"@type":"WebPage","@id":"https:\/\/www.bankvault.com\/when-malware-isnt-malware\/","url":"https:\/\/www.bankvault.com\/when-malware-isnt-malware\/","name":"When Malware Isn\u2019t Malware\u2026? - BankVault","isPartOf":{"@id":"https:\/\/www.bankvault.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bankvault.com\/when-malware-isnt-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.bankvault.com\/when-malware-isnt-malware\/#primaryimage"},"thumbnailUrl":"","datePublished":"2016-07-28T05:18:47+00:00","dateModified":"2016-07-28T05:18:47+00:00","description":"Is malware also becoming a tool for the good guys? and are they still \u201cgood guys\u201d once they\u2019re using it?","breadcrumb":{"@id":"https:\/\/www.bankvault.com\/when-malware-isnt-malware\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bankvault.com\/when-malware-isnt-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bankvault.com\/when-malware-isnt-malware\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.bankvault.com\/when-malware-isnt-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bankvault.com\/"},{"@type":"ListItem","position":2,"name":"When Malware Isn\u2019t Malware\u2026?"}]},{"@type":"WebSite","@id":"https:\/\/www.bankvault.com\/#website","url":"https:\/\/www.bankvault.com\/","name":"BankVault","description":"cybersecurity","publisher":{"@id":"https:\/\/www.bankvault.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bankvault.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.bankvault.com\/#organization","name":"BankVault","url":"https:\/\/www.bankvault.com\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bankvault.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.bankvault.com\/wp-content\/uploads\/2018\/11\/BankVault-Logo-Light.png","contentUrl":"https:\/\/www.bankvault.com\/wp-content\/uploads\/2018\/11\/BankVault-Logo-Light.png","width":1212,"height":275,"caption":"BankVault"},"image":{"@id":"https:\/\/www.bankvault.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BankVaultOnline\/","https:\/\/x.com\/bankvaultonline"]},{"@type":"Person","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/76e0aa85d5ac5405b47c0760eb9ab639","name":"BankVault","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"BankVault"},"url":"https:\/\/www.bankvault.com\/author\/bankvault\/"}]}},"_links":{"self":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts\/4912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/comments?post=4912"}],"version-history":[{"count":0,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts\/4912\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/media?parent=4912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/categories?post=4912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/tags?post=4912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}