Hacker News new | past | comments | ask | show | jobs | submit login

I have no idea how Australia handles this, but in the U.S., the process of discovery is what is supposed to keep the police from just planting evidence. Prosecution needs to present all evidence that will be used against you, including exactly where it came from and chain of custody. If they can't, it gets thrown out. The only exception is they can't be compelled to give away the identity of confidential informants. But a confidential informant also can't testify anonymously, so the police would always need additional evidence beyond the word of a CI.

It's not a perfect system by any means. The police can and do plant evidence. But a lot of convictions also get thrown out and this is often why obviously guilty people get off on "technicalities" because the police don't follow procedure down to the letter.

The opposite end of the spectrum, not giving the police any power to do covert surveillance at all, is effectively just giving a license to the Mafia to do whatever it wants, as anyone who just commits all of their crimes privately will get away with it as long as they can sufficiently scare or kill anyone who would otherwise have been willing to testify.

It's a tradeoff either way, and we try to let there be a middle ground, where the police can bug your house, tap your phone, hack your router, but they need a warrant that has to be granted by a completely separate branch of government that is not in the same chain of command, and they have to prove to your lawyers that they obtained all of the evidence they have against you legally.




Indeed, I have no issue with the police having the power to read whatever data a warrant grants.

My problem is the linked page says:

> A DATA DISRUPTION WARRANT enables the agencies to “add, copy, delete or alter” data on devices.

Copy is fine, it’s the other three which are scary. Perhaps they shouldn’t be scary, perhaps they have well-defined meanings in law I’m just not familiar with (like how “Hacker News” has nothing to do with cyber crime), but I can only respond within the limits of my knowledge, and that seems scary.


I think the reason they want the ability to add, delete, and alter is so they can disrupt certain users, software, or services legally, like botnets or arms deals. It's probably too broad and could be abused though.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: