Blog Archive
-
▼
2013
(295)
-
▼
March
(61)
- BBC commissions first iPlayer-exclusive drama, see...
- Twitter archive service expands into 12 more langu...
- Congressman Already Claims That He Needs To Overtu...
- Jawbone Up fitness band gets an Android app, wider...
- Unfolding house hides all the mod cons
- The power of the pen – and its successors
- Insert Coin on-stage demos at Expand liveblog
- Prenda Law Tries To Close The Barn Door After The ...
- Surprise: Register Of Copyrights Expected To Call ...
- Facebook Backs Away Quietly From Its CISPA Support
- Dennis Deems' Favorite Techdirt Posts Of The Week
- Happy Pi Day! How to Calculate Pi by Throwing Froz...
- Cuban video game recreates revolutionary history
- Electrosensitivity: is technology killing us?
- US summer camp offers digital detox for tech-addic...
- Government Can Keep Key Emails With Hollywood Lobb...
- Samsung targets LG in $45 million suit, claims cor...
- SkyHouse: The NYC penthouse with an 80-foot slide
- Billboard House provides temporary housing for adv...
- 6-meter tall KamerMaker to 3D print Amsterdam hous...
- Yahoo buys Summly news app for ?18m
- Family moves into first net zero Active House in t...
- Google Keep? It'll probably be with us until March...
- Kiwi Three Strikes Tribunal Fines Soldier Who Was ...
- Lenovo's ThinkCentre Edge 62z All-in-One Starts at...
- Report Suggests Obama May Take Drones Away From Th...
- On Syria, the west needs a better choice than do n...
- Rep. Gohmert Wants A Law That Allows Victims To De...
- To Save Everything, Click Here by Evgeny Morozov –...
- Britons own fewer TVs but watch more television, r...
- Digital Storm Bolt review: small package, small pr...
- More Details On Copyright Office's Suggestions On ...
- Tactus Technologies develops forklift simulator
- Ford's Jim Buczkowski cruises through the Engadget...
- Congress Rushes To Legalize Phone Unlocking; But E...
- OpAngel: Anonymous to Protest in Boston, Demands t...
- Olivia Wilde Rips into Justin Bieber for Going Out...
- Google's Red Guide to the Android App Store
- No comments? No thank you | Ally Fogg
- Qualcomm: Snapdragon 800 ‘Easily’ Beats Nvidia’s T...
- The Sonos Playbar Brings Wireless Surround Sound W...
- Maisonnette: a space-saving multifunction furnitur...
- Tricycle House pedal-powered RV offers lots of hom...
- Ambify, A Music App For The Philips Hue Lighting S...
- Review: XD Design's Window and Port Solar Chargers
- Steelcase Gesture chair adjusts to support our sma...
- Lian Li Rethinks the Motherboard Tray, Launches PC...
- Prenda Lawyer Hires His Own Lawyer, Tries To Tapda...
- White House Orders Federal Agencies To Require Mor...
- New Hampshire Politicians Want To Make 'Satellite ...
- Congress & Silicon Valley Billionaires Separately ...
- Googlers Exposed to Toxic Vapors for Several Month...
- Self-publishing: a revolution for writers, not rea...
- PlayStation 4: welcome to the next level
- How to Get Rid of Roaches
- Japanese design team cooks up aluminum-framed drop...
- Heather McGregor: 'Working from home is the future'
- AirBurr UAV navigates by crashing into things
- Next-gen Nissan LEAF to break cover at Geneva Auto...
- Crowdfunding Picks: Throw Trucks With Your Mind & ...
- Video games level up in the art world with new MoM...
-
▼
March
(61)
About Me
Tuesday, March 26, 2013
Rep. Gohmert Wants A Law That Allows Victims To Destroy The Computers Of People Who Hacked Them
insert the video above does not work, I created a brief statement that barely covers ~ 5 minutes, the change involving Gohmert.Rep. Gohmert
Here is the transcript base. The craziest part is where Gohmert said he did not care, as long as the cut is back "destroy hacker."
Rep. Gohmert
: I understand that in 18 USC 1030 constitutes a violation of the criminal law to some thing to help take control of another computer, even for a moment. Is this good?
Orin Kerr :. "Take Control" It depends on what you mean exactly if the takeover "" includes access to the computer, assuming your network is not supposed to take over, then yes, it should be prohibited by law.
Rep. Gohmert : For example, I realized that there was a recent example where someone was inserted malware on your own computer, so that when your computer has been hacked and downloading data, took malicious hackers for years, so that, when activated, allows the person whose computer has been hacked to get a picture of the person looking at the screen. Thus, the person who had made the piracy, and really damage all data on the computer. Now, some of us might think "it's amazing that helps you get the bad guys." But my opinion is that since he left momentarily take your computer hacked and destroy computer information and see who has used this computer, then indeed it would be in violation of 18 USC 1030.
So I wonder if one of the possible solutions to help us change or 18 USC 1030 to make an exception to if a malicious program or software that allows someone to take charge of a team gains control of the computer hacker who is not a violation . It may to be what we do for the crime of aggression, you have a self-defense. If this is part of a protection system of self-defense, it would be a defense that you have violated 1030. Does anyone see a problem with helping people amend the Criminal Code to allow such exceptions or suggestions in this regard?
Orin Kerr Mr. Gohmert, this is a great question that is hotly debated in the media of computer security. because, from what I heard, there much of this "hacking back" as they refer to it. however, at least under current law, it is illegal to do this in particular .... The real difficulty lies in the details. Under what circumstances can you counterhack someone counterhack width are allowed, how far can they go? The difficulty, I think, is that once you open that door, as a matter of law, that is something that can be difficult to take a shower. So I think if there is such an exception should be very close to avoid becoming the type of exception that swallows the rule.
Well, I'm not sure I care if a hacker destroyed
. Whenever pirate stop there. Would you say we have to pay for protection against pirates who do not hurt so bad?
Orin Kerr 
(brief puzzled look on his face) Uh ... no. The problem is that I do not know who the hacker. So it could be that you think that the hacker is a person, but their routing communications ... Say you think you are hacked by a French company or business in the United States ...
Find best price for : --Kerr----Orin----CFAA----Gohmert--
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment