Comment Re:How?? (Score 2, Insightful) 595
John Doe sees a tempting link in his email, or one served up in a web page a'la Phorm, and clicks on it. This then triggers the installation of "legalized" spyware which tracks the user's communications and browsing habits.
Amazing, the kind of tools and techniques that law enforcement and signals intelligence agencies are developing. Not that it would be hard: The botnet coders and operaters have already done all the hard work for them. Simply grab a sample of the 'bot and its controller software, and tweak it for your needs. Then, ring up the antivirus and security companies and have them modify their security applications to ignore the installed surveillance software.
Problem is, well-organized criminal organizations with the appropriate technical expertise are liable to discover the spyware anyway, and find a way to use it against the agencies responsible for its deployment (i.e., to send falsified "evidence" of their activities).
Not only that, it makes you wonder why governments blow huge amounts of cash on such technological "solutions" when the cybercooks can do the job for them for (essentially) almost nothing...