meta_pixel
Tapesearch Logo
Log in
Tech Policy Podcast

#92: Government Hacking

Tech Policy Podcast

TechFreedom

Technology

4.845 Ratings

🗓️ 6 June 2016

⏱️ 21 minutes

🧾️ Download transcript

Summary

If you get hacked, should the government hack back? Recent efforts have been made to fight the use of illegal botnets, but many privacy advocates are concerned that these policies will excessively expand government hacking powers and impede legitimate security research. Evan is joined by Drew Mitnick, policy counsel for Access Now, to discuss the proposals. Can government fight illegal botnets without harming privacy? Should government need your permission to hack on your behalf?

Transcript

Click on a timestamp to play from that location

0:00.0

Welcome to the Tech Policy Podcast. I'm Evan Schwarzenbber. On today's show, government hacking. When is it appropriate for government to hack back on the behalf of citizens?

0:24.5

Are there privacy concerns with the government getting involved in this business?

0:28.4

Joining me to discuss this is Drew Mitnick, Policy Council for Access Now, a global civil liberties and privacy organization.

0:35.3

Drew, thank you for joining the show.

0:36.7

Thanks for having me, Evan.

0:37.7

So we're talking about a bill today, the botnet prevention act.

0:41.8

But before we get into that, what is a botnet?

0:44.5

Yeah.

0:45.0

So it's important to think about what is it botnet, kind of when you're thinking about

0:51.0

this proposed legislation, right?

0:52.5

Because it's obviously a complicated issue.

0:54.1

And I think one of the challenges is not really fully understanding the technical implications of this kind of legislation.

1:00.8

So, you know, I would say in simple terms of botnet is it's kind of a connected series of devices in which one of the devices is a command and control that essentially

1:13.1

has the capability of ordering the other devices to do certain actions. So those devices

1:19.0

would be considered the zombie devices. And so we've seen botnets that have been used maliciously

1:24.5

in a number of different settings. And so you can use a botnet, for example,

1:28.9

to conduct a denial of service attack in which you order the zombie devices to flood a server

1:36.2

or some device with data to shut it down. We've also seen botnets used for good for good. and so they can be used to do research and kind of a

1:46.8

coordinated effort and so botnets serve a variety of purposes some of them bad and some of them good

1:53.0

and so I think I think it's you know when thinking about this legislation you have to kind of

1:57.5

think about the full of ray of possibilities when you're thinking about botnet. So for the average American who has electronic devices in their house, what would a

2:05.5

bad situation with a botnet look like and what are some of the risks to American consumers?

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from TechFreedom, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of TechFreedom and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.