|
Grex > Agora35 > #28: Prosecution in the case of the Great M-net Crash | |
|
| Author |
Message |
| 13 new of 145 responses total. |
twinkie
|
|
response 133 of 145:
|
Oct 6 04:29 UTC 2000 |
Ooooh...struck with another famous Grex zinger...
|
md
|
|
response 134 of 145:
|
Oct 6 12:06 UTC 2000 |
(Why is it a "Grex" zinger?)
Well, I think jerryr is making a good point. He says you can't
justify "just a slap on the wrist - based on the perceptioin that the
only damage he had done was to m-nut," because something of actual
value, a thousand miles from mnet, was indeed damaged.
The implication that, if it *had* been only mnet, a slap on the wrist
would be enough, confirms what many others here seem to be saying: why
ruin a 7-year-old kid's life for hacking a system that was pretty much
worthless to begin with? I agree with jerryr that it would be absurd
for Arbornet to sue this kid for anything.
(I still don't understand why the AG's office is making an issue out of
the fact that the mnet equipment was replaced. We all know the kid
isn't to blame for that. If the AG thinks he is, then I hope some
responsible Arbornet person, if such there be, will set her straight
ASAP.)
On the other hand, the University of Maryland, or whomever, might have
grounds for suing the kid. Also, with regard to the admittedly poor
security on mnet, I wonder if UMD has grounds to sue Arbornet?
|
md
|
|
response 135 of 145:
|
Oct 6 12:07 UTC 2000 |
(17-year-old. Sorry.)
|
jerryr
|
|
response 136 of 145:
|
Oct 6 13:11 UTC 2000 |
i hope they throw the book at him - find him guilty or let him cop a plea.
order community service and restitution. if he keeps his nose clean until
he is 21, expunge his record.
|
brighn
|
|
response 137 of 145:
|
Oct 6 14:23 UTC 2000 |
(look at your handle, you twinkie)
|
scg
|
|
response 138 of 145:
|
Oct 6 18:10 UTC 2000 |
Wasn't the University of Maryland system Jamie Howard's PC?
|
twinkie
|
|
response 139 of 145:
|
Oct 6 19:59 UTC 2000 |
(what's your point, you brighn?)
|
brighn
|
|
response 140 of 145:
|
Oct 6 20:02 UTC 2000 |
(that you must have a tasty cream filling)
|
twinkie
|
|
response 141 of 145:
|
Oct 6 20:47 UTC 2000 |
(so I'm told)
|
brighn
|
|
response 142 of 145:
|
Oct 6 20:59 UTC 2000 |
(I wouldn't know, and will never find out)
<set drift=off>
|
danr
|
|
response 143 of 145:
|
Oct 6 21:22 UTC 2000 |
Need I remind you boys that the "tasty creme filling" is mostly lard?
|
gull
|
|
response 144 of 145:
|
Oct 6 21:39 UTC 2000 |
My system was once hacked and used to port scan a few other domains. It was
a day before I noticed a process running that I didn't recognize. I
immediately notified the sites that had been scanned. Most were glad for
the heads up. One threatened me and the network I was on with legal action.
It took me a week to get my network connection restored after that.
Re #88: Seems like I heard somewhere that the delay between a security
problem being published and it being widely exploited is about two days.
I'm guessing not many sysops of free systems check Bugtraq or CERT every two
days. Heck, it generally takes software companies longer than that to even
admit there's a problem. There are stories of people bringing security
holes they'd found to Sun or Microsoft and being told, "If no one's lost
money yet, leave us alone and shut up about it." This is probably partially
due to the fact that software companies all exclude themselves from any
liability in such matters.
|
albaugh
|
|
response 145 of 145:
|
Oct 6 21:42 UTC 2000 |
Not that all real life analogies to cyber life are valid, but if IRL a
17-year-old "kid" picked the lock to someone's home, and found his file
drawer, and went through it reading his mail, and say, also locked the door
to the "shed" where people picked up their messages from the free community
bulletin board, would all that consitute a felony? Even if not, the fact that
the owner had an easily pickable lock would have been no justification. But
if those actions *did* consitute a felony, why wouldn't the cyber equivalent
of that also be a felony?
|