Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

Digital privacy and covert surveillance on a privately owned personal computer.

  • 24-07-2017 7:34pm
    #1
    Registered Users, Registered Users 2 Posts: 532 ✭✭✭


    There's a lot of useful info freely available pertaining to employees in a company but I don't see much in the way of a private individuals.

    Hypothetical question for some research I'm doing. For example if a private individual who is over the age of 18 discovered evidence of a stealth remote desktop monitoring software installed on their machine and they could identify the source. What legal recourse would one have in two scenarios. It was installed without consent or knowledge by another private individual, or if a company was hired to carry out the installation. What legal recourse does one have in both scenarios?


Comments

  • Closed Accounts Posts: 2,021 ✭✭✭lifeandtimes


    Being honest it's an invasion of privacy and would be considered tresspassing.

    However you would be hard pressed to find out who has done it as any hacker would he wise enough to use vpns and changed their ip etc.

    Any cases I've heard of usually involved spouses trying to catch cheating partners etc so the culprit is identified but I'm not aware of any case where someone discovered spying software on their pc,found out who it was and brought them to court


  • Closed Accounts Posts: 21,730 ✭✭✭✭Fred Swanson


    This post has been deleted.


  • Registered Users, Registered Users 2 Posts: 532 ✭✭✭Arbitrary


    Being honest it's an invasion of privacy and would be considered tresspassing.

    However you would be hard pressed to find out who has done it as any hacker would he wise enough to use vpns and changed their ip etc.

    Any cases I've heard of usually involved spouses trying to catch cheating partners etc so the culprit is identified but I'm not aware of any case where someone discovered spying software on their pc,found out who it was and brought them to court

    Sure, but let's assume we successfully trace IPs leading back to a server utlised by a company, or a static private IP based in Ireland.


  • Closed Accounts Posts: 2,021 ✭✭✭lifeandtimes


    Arbitrary wrote: »
    Sure, but let's assume we successfully trace IPs leading back to a server utlised by a company, or a static private IP based in Ireland.

    It would depend on what happened after they I stalled the software and what they did with any information they found.

    If they did nothing you could call the police to make a complaint about someone spying on you in an invasion of privacy without consent kind of way. But you would need to prove that they were actively viewing your information and that the software wasn't just sitting on your pc after they installed it. Again which is very difficult and I'm not sure what powers the police have to even subpoena these people to view they're own devices to see what information they gathered

    If they did something with the info that effected you you may be able to sue for damages.

    Just like the sun phone hacking scandal


  • Registered Users, Registered Users 2 Posts: 78,580 ✭✭✭✭Victor


    Identifying the source could genuinely be difficult. Talking to a solicitor or IT security consultant (not a computer technician) that is well-versed in IT and data protection / privacy issues would be useful. Talking to a garda at the counter in the station / random solicitor might not get you quite where you want to go.

    There could be the following issues:
    * Hacking
    * Data protection
    * Privacy
    * Stalking
    Any cases I've heard of usually involved spouses trying to catch cheating partners
    Or just being paranoid / malicious / bullying.


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 36,170 ✭✭✭✭ED E


    Arbitrary wrote: »
    Sure, but let's assume we successfully trace IPs leading back to a server utlised by a company, or a static private IP based in Ireland.

    An IP and associated timestamp gives you a bill payer, not a user nor a culprit.

    You would have to fingerprint a device based on something running on top of TCP/IP to identify the culprit and then have a way to validate it...


  • Registered Users, Registered Users 2 Posts: 532 ✭✭✭Arbitrary


    ED E wrote: »
    An IP and associated timestamp gives you a bill payer, not a user nor a culprit.

    You would have to fingerprint a device based on something running on top of TCP/IP to identify the culprit and then have a way to validate it...

    Agreed.

    Thanks for all the responses very useful info.


  • Registered Users, Registered Users 2 Posts: 8,779 ✭✭✭Carawaystick


    http://www.boards.ie/vbulletin/showpost.php?p=51017713&postcount=6

    It's not for the op to gather evidence, its up to the gards


  • Registered Users, Registered Users 2 Posts: 14,049 ✭✭✭✭Johnboy1951


    ED E wrote: »
    An IP and associated timestamp gives you a bill payer, not a user nor a culprit.

    You would have to fingerprint a device based on something running on top of TCP/IP to identify the culprit and then have a way to validate it...

    Is the bill payer responsible for what traverses their connection?


  • Closed Accounts Posts: 21,730 ✭✭✭✭Fred Swanson


    This post has been deleted.


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 2,166 ✭✭✭Are Am Eye


    Do you have an individual in mind for this?

    Do you believe you know the specific device and its location, from which they are remotely accessing your machine.

    That device could contain the evidence you require. The police could seize it but would need reasonable cause to search for it (based on what you can or cannot tell them)


Advertisement