Private Internet Access responds to Rule 41 change in the Federal Rules of Criminal Procedure

Posted on Dec 1, 2016 by Caleb Chen
Share Tweet

private internet access announcement

The recent change to Rule 41 of the Federal Rules of Criminal Procedure would allow a federal magistrate judge to issue a search and seizure warrant for electronic media if the location of the information is concealed through technological means or if it is a hacking case that involves computers in at least five judicial districts.

The recent Rule 41 change does not affect the burden of proof requirement to establish probable cause to secure a search warrant under the Fourth Amendment to the U.S. Constitution.

Even if a warrant was issued to PIA about searching and seizing electronic media, because we do not log internet activity, there is no way to trace the activity to a specific user.

Because this rule change allows the government to hack individuals outside of the United States, it is ever important that our subscribers remain vigilant and maintain best practices for protecting their privacy. That means not letting yourself be socially engineered and protecting your network against potentially malicious traffic. While a VPN can help protect your privacy, it is only one of several tools that when used together protects the privacy of you and your family.

About Caleb Chen

Caleb Chen is a digital currency and privacy advocate who believes we must #KeepOurNetFree, preferably through decentralization. Caleb holds a Master's in Digital Currency from the University of Nicosia as well as a Bachelor's from the University of Virginia. He feels that the world is moving towards a better tomorrow, bit by bit by Bitcoin.

VPN Service

Comments are closed.


  1. the seventh sojourner

    I had an issue with PIA. They no longer have 24/7 chat and the response to a question that had prevented my use of PIA took 3 months. Pitiful.

    3 years ago
  2. AWS-2401

    we will keep you hidden just be watchfully all around you there be monsters in these waters.

    4 years ago
  3. Cora Regina

    I’d be interested in knowing what those other tools are. You tell us to use them and then don’t actually go into any detail on the subject.

    Why not? Will an article about that be forthcoming? This is a time when plenty of disreputable types will be looking to prey on a frightened and worried population, information from a trusted source would be welcome.

    4 years ago
    1. Caleb Chen

      Obviously, we can’t guarantee the security or privacy of any company’s product except for our own. Other tools means use encryption where possible.

      4 years ago
    2. It's Me


      4 years ago
      1. AJ

        Tor is useful but it has also been compromised by the FBI so I’d beware.

        4 years ago
        1. fregg

          It’s not exactly compromised, but it is heavily monitored. And then there’s all the CP the FBI distributed…

          I2P is a similar alternative.

          4 years ago
  4. C

    What are these other tools that one should use and how can we further protect ourselves and help prevent FBI intrusion?

    4 years ago