Back Hack TOR?
Really? Has anyone stopped to think quite HOW this rule will be enacted? It's one thing to say that because people don't publish their conversations or web browsing that, a) they must be nefarious, and thus b) We have to know who, what, why and where, and the c) [the hard part] actually doing this.
First, to find out who this TOR user is and where they are located is not trivial. It requires either back tracking packets coming in to the network, or having a serious attempt to poison TOR. Neither are trivial to do. Use a TOR enabled browser and your packets payload get encrypted from the moment they are generated, making this much, much harder.
Second, if TOR is routing around the world, any attempt by the FBI it act outside of its jurisdiction is liable to have them breaking other countries laws.
But OK, they have done six impossible things before breakfast, and found out who you are and where yiou are. Now they want to gain access to your machine. So, they need a hole or backdoor. And this is going to come from where? Can you see Apple building this in to OSX and IOS? Micro$soft may be, but even they have some scruples. Linux? Never.
And then, they are in to your host. They have to now break your own encryption key on your disk.
Eventually, they find out that all they have is some teenager looking at p0rn but not wanting his parents to know (because the only reason they didn't do so is because the web wasn't invented then).
Next someone will tell me that any encryption from outside the US is purely theoretical.