Hacker News new | past | comments | ask | show | jobs | submit login

Well, the police can also temper with any other evidence all the time anyway.

So it is anyway about trust - and how to check reliable, if they deserve trust.

This is how I would choose, which places to visit.

Australia is still quite good on that list, as cases where the police officers for example - are the ones doing the kidnapping and ransoming and investigation about it all by themself, like it is common in other places - are still quite rare.

My experience with australian police officers are a friendly warning for me, for ignoring a red light while at foot. And a asshole police officer stopping and handing out a hefty fine for us, for not "deadstopping" at a stop sign at a empty roadcrossing at night - explicitely, because we were driving a backpackers car and not a local one (he said so)

So all in all, I would probably visit again.




> Well, the police can also temper with any other evidence all the time anyway

Yeah, they do, but that's illegal and NOT encoded in law

So Aus has just made police tampering legal


Well, I did not read the law in detail, but I am pretty sure, that tampering with evidence is not included and still forbidden with the threat of criminal investigation for the officers doing it.

What is allowed here, is hacking for the police. That necessarily can include changing files on the target computers (e.g. deleting logs) - this is the way I read this. And I would see the point in it - if it really only get applied in serious crimes like terrorism to catch the whole network for example. (back to trust)

But yes, it maybe makes it more easy to tamper undetected with evidence in sneaky ways, but not if for example you would log the hacking activities by default of the police. In fact, I strongly believe that this should be done, but doubt, it will be.


> tampering with evidence is not included and still forbidden

> What is allowed here, is hacking for the police. That necessarily can include changing files on the target computers (e.g. deleting logs)

How is this not tampering with evidence?


Not everything is evidence.

When there is an email on the computer that will be used as a proof - then why is this been tampered with, if just a system log was altered?

Courts are usually very strict to only allow "clean" evidence. Cases have been thrown totally over, because of a minor fuckup of police. It is all a question of how it is implemented and used. And sure, it is a very extreme thing and sadly the use case "only for serious crime" is in danger of soon to be applied to allmost anything.




Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: