Government Hacks Computers to Thwart Hackers
by James Mills
Did you know the federal government has the ability to access a virtually unlimited range of computers—including laptops, workstations, and library terminals—if it so desires?
This revelation comes after the Federal Bureau of Investigation (“FBI”) announced in a January press release that it had removed malware from more than 4,200 infected computers in the United States. The operation was reportedly initiated after French intelligence agents alerted U.S. authorities to the widespread presence of a Chinese malware application known as PlugX.
Two Chinese government-linked hacking groups, Mustang Panda and Twill Typhoon (also known as Bronze Twill), were identified as the likely creators of the malware. Analysts speculate that the operation was part of a broader Chinese effort to infiltrate Western systems for intelligence-gathering purposes.
Malware can take many forms. Some viruses, like ransomware, shut down systems and demand payment to restore access. Others slow systems down, crash them, or create botnets—networks of infected devices—to overwhelm servers, disrupt websites, or steal login credentials. In this case, the malware appears to have been designed to infiltrate users’ systems, potentially gaining access to emails, passwords, and sensitive documents.
The FBI’s response was unprecedented. With a single warrant, the agency accessed thousands of American computers running Windows software to remove the malware. According to the FBI, the owners of these machines were notified “through their internet service providers.” However, the scale of the intrusion raises significant questions. Could victims have been notified earlier to disinfect their own machines? How frequently are such warrants granted, and under what circumstances? Is there sufficient oversight to prevent the misuse of this formidable capability?
History shows that state resources—whether the power to arrest, access to law enforcement databases, security footage, or forensic analysis—are sometimes misused. Is this another such case?
The revelation that the government possesses such capabilities likely comes as a surprise to many, underscoring just how little the public knows about the extent of its technological reach.
Source: techdirt.com
As a digital subscriber to Criminal Legal News, you can access full text and downloads for this and other premium content.
Already a subscriber? Login