@chaski Said
Where did you get that from my question?
You seem to be suggesting that it is OK to violated laws when investigating internet crimes.
Is that what you are saying?
Well there would probably need to be a change of laws.
But sites like Wikileaks and others do have the potential to become security threats.
Instead of standing by and letting them do what they do, maybe some form of counter attack.
After all what are they going to do "Hi Mr Cyberjustice Department, last night I was hacking a site illegally to obtain clssified information , and I got attacked in response by a proactive security system".
Its not going to happen.
Obviously with these sorts of countermeasures, again, more legislation put into place. But if someone is attacking you via cyberattack, should you not be allowed to defend yourself.
Lets take the following Application for example.
Say me and my mates all agree to run this on IP address 69.16.219.70 as a random example.
All the packets used to attack this site will come from specific IP's (Im keeping it simple). SHould the administrators be able to counterattack this or not, or should they just sit by and let the site potentially be taken offline?
Obviously I know this gets very complicated though as different countries have different cyber laws. So I could potentilly get a virtual server in some third world s*** hole, which has laxer laws and launch attacks from there. As far as a trace would go, the attacks would be coming from a country where there is no jurasdiction, so investigations will cease.
But with sites like wiki leaks, they are actively supporting hackers and publishing illegally obtained information. So I dont think,. personally that they should have a leg to stand on if they are attacked.
How would you feel if I hacked your facebook profile and published your information, in the name of freedom of information?
Or if I gained access to your home computer, and published those documents. DO you not think you should be able to defend.
Or if I found an online store you used an fired SQL into it, to obtain your records? And then published it on a site like Wikileaks?
I view wikileaks as the site that brin gs these people together. ALone they have no purpose, but with wikileaks they work together. Kill the Queen Bee, the rest die off. The world is a safer place.