The FBI recently used spyware to track down a bomb threat suspect. And while it did so under the guidance of a court order, the bureau has refused to comment on the precise capabilities of its spyware application, known only as the Computer Internet Protocol Address Verifier.
In den USA werden Trojaner bereits für Online-Untersuchungen von Rechnern eingesetzt. Erst vor kurzem wurde ein konkreter Fall bekannt, dass aufgrund eines richterlichen Durchsuchungsbefehls der Computer eines US-Schülers durchforstet wurde. Das FBI schleuste dazu die Spyware auf das System des Mannes ein, nachdem dieser mehrere Bombendrohungen über die Kommunikationsplattform MySpace verschickt hatte.
THIS DOCUMENT IS NOT WRITTEN WITH THE INTENTIONS OF BREAKING ANY LAWS. IT IS WRITTEN SOLELY TO DEMONSTRATE HOW TO SECURE ONE'S PERSONAL MACHINE. YOU ARE YOU OWN JUDGE AND SOLELY YOU WILL DETERMINE WHAT IS RIGHT AND WHAT IS WRONG. THIS DOCUMENT WAS WRITTEN WITH GOOD INTENTIONS ON HOW TO KEEP ONE'S MACHINE SECURE FROM VIRUSES/ADWARE/KEYSTROKE LOGGER BASED PROGRAMS IRRESPECTIVE IF SAID PROGRAMS WERE INSTALLED BY *ANY* GOVERNMENT AGENCY.