Hacking Crime Victims to Remain Secret 179
outlier writes "The AP is reporting that federal law enforcement agencies are offering to keep the names of companies that have been victims of major cracking crimes secret. The goal is to encourage victims to come forward, so that the government can 'prosecute cases while at the same time achieving the kinds of protection and addressing the concern that the business community rightly has.'" My favorite part is how FBI agents will now "discretely" arrive at victims' offices.
Same as here :) (Score:5, Interesting)
How is this news? (Score:3, Informative)
this is good (Score:5, Interesting)
Re:this is good (Score:1, Interesting)
Why not go all the way and dispense with trials altogether.
Re:this is good (Score:2, Informative)
The accused will retian thier 'right to face their accusers'. Many of these types of cases are settled such that the criminal aggrees not to name his target.
Re:this is good (Score:5, Interesting)
Defendant [angry]: "But who'd I hack? What did I do?"
Cop [toneless]: "You don't get that information until you go to trial."
D [self-righteous]: "Okay, then I'll go to trial."
C [smirking]: "You sure about that? See, if you go to trial, and you lose, you go to prison. And I hear skinny little geek boys like you are reeeaaal popular in prison
D [defeated]: "And what if I take the plea bargain?"
C [toneless]: "$100,000 fine, confiscation of all your computer equipment, and a court order preventing you from being gainfully employed in the computer industry for ten years."
D [outraged]: "You people want to ruin my life!"
C [smirking again]: "Okay, we'll see what your cellmate Bubba the Axe Murderer says about that
D [barely audible]: "I'll take the plea bargain."
Re:this is good (Score:3, Insightful)
Another U.S. attorney, Roscoe Howard of the District of Columbia, said the Constitution requires that a criminal defendant be permitted to face the accuser at trial, but he noted that many computer-crime investigations culminate with a plea agreement, where the names of victim companies can be kept secret.
The article deals with the relationship between the victim corperation and the public. The idea here is that companies can come forward with knowledge that the govt. is sensitive to their concerns about public reaction to this type of crime.
Now with all this said, if you are accused of anything and plea guilty to some crime without knowing who you are accused of victimizing, I have no sympathy for you (or your brainded lawyer... you did ask for an attorney, right?)
Re:this is good (Score:3, Interesting)
Re:this is good (Score:2)
Re:this is good (Score:2)
I do not think it unreasonable to assume our (s)elected president and his posse^H^H^H^H^Hcabinet might consider cracking a form of terrorism.
It takes little for a cracker to then be labeled as an "enemy combatant" and all this stuff to play out in closed military tribunals.
No constitution will stop The Whitehouse [mediastudy.com] of Evil [artvoice.com]!
Re:this is good (Score:2)
true, unless.... (Score:2)
Re:this is good (Score:1)
On the contrary... (Score:2)
Even more worrisome is the mention in the article that they want to make hacking details exempt from the freedom of information act. This is a small, but very significant, step towards a fascist police state. With the overall prevalence of computers in society today, anyone would be liable to be called a "hacker", and prosecuted secretly.
Re:this is good (Score:2)
Comment removed (Score:5, Funny)
Re:Favorite Part (Score:5, Funny)
Why is that? Because it's spelled wrong?
Well, more because an amorphous mass of FBI-flesh writhing obscenely and pulsating as it flows in a continuous stream through your office door can sometimes be distressing. The new method of FBI agents arriving as discrete individuals is far more friendly.
Re:Favorite Part (Score:1, Informative)
Re:Favorite Part (Score:3, Funny)
No, because it means no black helicopters circling.
Agents will arrive discretely? Great! (Score:5, Funny)
Learn to spell [dictionary.com], guys...
Re:Agents will arrive discretely? Great! (Score:1)
Re: (Score:3)
Re:Agents will arrive discretely? Great! (Score:2)
Re:Agents will arrive discretely? Great! (Score:2, Funny)
Re:Agents will arrive discretely? Great! (Score:1)
Re:Agents will arrive discretely? Great! (Score:2)
FBI... (Score:1)
FBI! THIS is a BUST (Score:2, Funny)
THIS (o)(o)
is a bust
-Fedreral Breast Infect0rz
Re:FBI! THIS is a BUST (Score:1)
(.)Y(.)
So... (Score:2)
And snail-mail correspondance will arrive in plain brown wrappers????
Jargon File (Score:1, Troll)
Re:Jargon File (Score:2, Offtopic)
I think those who pray to a talmudic god of vocabulary need to understand that language is a living thing.
Re:Jargon File (Score:1)
Identity crisis (Score:2)
Oh well, that battle is really lost. OK, I realize that. Language has evolved beyond reach and we can't possibly managed to do all the education to revert it.
But what should I call myself? Or rather, what should people call me when they want to pat my back for something cool I did on the computer? I mean, everybody likes that, and we all need that, don't we?
Computer professional? Nah, I can't even accurately describe a Turing machine. I have merely basic training in computer science, on a "tools" level.
Computer hobbyist? I can do a lot more than most people, I can learn things fast, and I'm trained enough to point out flaws in the things many computer professionals do, including really good ones. Besides, I'm getting paid for it, even though the job market isn't that good.
Geek or nerd? Well, yeah, I guess I am, in some respects, certainly, but it doesn't really describe what I do accurately.
Well, many people gets a real identity crisis from this...
Re:Identity crisis (Score:2)
I don't think so. You need to take a bit of care where and to whom you use the term "hacker", but nothing else captures the meaning. The media is a lost cause, but this is because they have no concept that anyone playing around with a system could be up to anything other than mischief. The media also has a hard time with the idea of scientific curiosity in any field.
Men in Black! (Score:5, Funny)
> My favorite part is how FBI agents will now "discretely" arrive at victims' offices.
The guys in black trenchcoats? Uh, those are our network consultants. Yeah, network consultants.
Re:Men in Black! (Score:1)
Re:Men in Black! (Score:3, Funny)
No, SEC investigators
Re:Men in Black! (Score:2)
Protect the hackers, too! (Score:4, Funny)
yep (Score:5, Insightful)
"Uh, I wasn't hacked, nope. Must have been Corporation X."
And WTF is this?
Government efforts to tighten Internet security and investigate online attacks have long been hampered by reluctance from companies to admit they were victims, even in cases where executives quietly paid thousands of dollars in extortion to hackers.
Ok, someone needs to prove this, otherwise I get the highly suspect that it's some government propaganda. Honestly, who pays a script kiddie to remove the pr0n and racist/anti-gay shit from their site?
Re:yep (Score:4, Insightful)
Ok, someone needs to prove this, otherwise I get the highly suspect that it's some government propaganda. Honestly, who pays a script kiddie to remove the pr0n and racist/anti-gay shit from their site?
True dat. This little gem is popping up more and more frequently. It is utter BS but, as more people hear it in more places they will accept it as fact. It is total BS!! NO corporation is paying extortion money to hackers. Unless they are counting the dollars wasted on "Security Consultants".
Re:yep (Score:1)
I suppose it is possible that someone is paying extortion money; it seems like the hardest way for a hack to generate cash, to me.
Re:yep (Score:5, Interesting)
You're right in that it's stupid to pay script kiddies to un-deface sites, and Idon't think anyone does that.
I think it's most often extortion in the form of "security consulting fees" for unsolicited "security audits". Occasionally it's "We have your entire credit card databasebase and all of your loyal customers will never trust you again if we post them to usenet, so pay up." I heard ofsomeone trying to do this to a Minnesota comapny maybe 3 years ago, but the company basically said "screw you" and went to the FBI. Nobody knows how oftn companies pay up... It's like estimating the percentage of unreported rapes. It's just data that you don't ahve and isreally hard to estimate.
Re:yep (Score:3, Insightful)
Same with the number of invisible gay werewolves in Omaha, Nebraska - it's data you don't have, so you can't estimate it. Is there any evidence at all that this kind of extortion has ever been successful? I understand the security fees scenario, but I find it hard to believe that any company would hire someone who just hacked their network and threatened to break things or otherwise cause illegal damage. Do you want such a person on your staff? But if all they're doing is saying "Do you know your network is vulnerable to exploit X, our company can help you for a modest fee," then I'm not sure this belongs in the category of extortion.
Re:yep (Score:2)
Prove it? Who's going to admit to it? The companies want to stay out of the spotlight, remember?
Re:yep (Score:5, Interesting)
If you lost one account over this hack, it wouldn't be worth it. I think the FBI is trying to inform the public that they understand "HI!, We are from the FBI. We are here regarding the security breach of your trusted online banking system" isn't acceptable in every situation.
Re:yep (Score:2)
While I'm not up for offering proof, I'm thinking a slightly more plausible scenario would be "Oh, Mr. CIO....I've got this database of customer information, some of it quite sensitive. Would you like to give me some money, or would you like me to publish it (and where I got it) all over the Internet? That would do wonders for your customer relations, wouldn't it?"
Bad Idea (Score:2)
If the company can't keep it's information secure, why should I own any of that company's stock then?
Information crimes should be treated the same way as a real robbery (just we have a smarter crook to deal with).
This is on the same level has cooked books IMHO.
Re:Bad Idea (Score:3, Informative)
good point (Score:2)
Well done (Score:2)
A good idea from the FBI..? Next thing you know, the CIA will start acting intelligently and the government will start governing...
Re:Well done (Score:2)
He cited congressional efforts, supported by the Bush administration, to exempt from the Freedom of Information Act any details that companies might disclose to the proposed Department of Homeland Security about vulnerabilities in their operations. He said amending the law could be helpful "in case there is a concern that reports of hacks or intrusions in federal records might find their way into the hands of those who would use that information against us."
This scares me....
How is secret victims going to work? (Score:3, Insightful)
you: "Umh ok".
Re:How is secret victims going to work? (Score:2)
Is this a good thing? (Score:5, Insightful)
But... if my bank or credit card company has a habit of getting hacked (ie. lax securtity) I figure I have a right to know about it.
Just my $.02.
Re:Is this a good thing? (Score:1)
If I can prove it wasn't my fault. Banks have a nasty habit of pretending they can't make mistakes. Read Ross Anderson's Security Engineering for some examples of normal people who had their life's destroyed through banks shifting the blame for their security lapses onto their customers.
If your credit card company gets hacked, it's they who foot the bill, not you.
Once again... if you can prove you didn't do anything wrong. And the hacker probably still has your SSN and personal details even then. Identity theft anyone?
Re:Is this a good thing? (Score:2)
However, there are more things that a hacker could do than just stealing the money from your account. He could for instance reveal the data to the tax administration, and you could possibly get into lots of trouble over this.
Maybe not a big concern in the US, where the IRS has access to this information anyways, but here in Europe, this is a big issue: many countries' tax administration would pay huge amounts to get at customer lists of banks of neighboring countries, just to check that their own citizens don't have any secret stashes of dough there.
Double sceret arrest (Score:5, Funny)
Re:Double sceret arrest (Score:1)
We cannot disclose what you did or who you hacked. Just jump into our jail.
.."you do not pass GO, and you will not be allowed to participate in the next 4 mayor DOS attacks"..
-now where's that darn "get out of jail free" card when you need it?
Triple Sceret Arrest (Score:5, Funny)
don't tell them that!
What, the bit about an agency or a government?
any of it!
Right. You're under arrest for hacking.
don't tell them what they're under arrest for!
We can't just arrest them, can we?
we do it all the time!
But that's what morally corrupt dictatorships do and we're not one of those, we're from a democracy, right?
oh, great, next you'll give the whole thing about where we are from away, just why don't you wave the flag, show 'em a picture of your mom and ask if they'd like some apple pie! fer chrissake!
Ok, we cannot disclose who you are, what you did or who you did it to, who we are, what we are here for, what you may or may not be charged with, where we are taking you or anything else. We're not even sure if we are at the right address, but just come with us.
quietly.
a bit hard for defaced web sites but.. (Score:2, Insightful)
Shouldn't the consumer be aware if someone who they gave there credit card details has been hacked and now they are exposed? It comes down to, if your a victim, you want to know.
Ahhh Security through Obsurity! (Score:4, Funny)
Bad (Score:1)
FBI discretion (Score:4, Interesting)
In my experience, the FBI can be extremely discrete when they want to be. I work for a company that provided some important information to the FBI after September 11 last year. There would on occasion be two or three agents in our office, who always showed up driving an unmarked car, and wore casual attire. Most of the people in our office had no idea the FBI was even present.
Right to face one's accuser...easy out at court (Score:5, Interesting)
The article says this isn't an issue because most hacking computer-crime investigations end in a plea deal, but how willing will suspects be to plea if they know they have an out at trial?
Re:Right to face one's accuser...easy out at court (Score:2)
Re:Right to face one's accuser...easy out at court (Score:2)
The article says this isn't an issue because most hacking computer-crime investigations end in a plea deal, but how willing will suspects be to plea if they know they have an out at trial?
They will be willing to plea if the evidence against them is so good that their lawyer says "You will loose at trial, and they'll throw the book at you." I find it hard to believe that a suspect in this case wouldn't know that he had the option to go to trial. Mind, that at trial the accused will face the accusing party.
Re:Right to face one's accuser...easy out at court (Score:5, Interesting)
This is true. However:
1) Most people who get slapped with a FEDERAL charge (which is a lot different than a state charge), don't have the money to retain an attorney (on the order of at least $10,000 dollars, and that's not even to go to trial--more like 20,000 if you plead not guilty).
2) The feds won't even press charges unless they KNOW they can convict you, and unless they KNOW you won't win. I was convicted of a federal crime, and it wasn't even a big time thing. However, the mountain of evidence that my public defender showed me was about a FOOT high (paper, mind you), and that's not counting the wiretap evidence.
3) The way the plea bargaining system works in federal court is that the Federal prosecutor ALWAYS tacks on extra charges. This is so that some can be removed if the defendant wants to plea.
4) The stress involved from being charged with a federal crime *almost* always dictates that the defendant will plead guilty, because of [1], and [2]. Federal sentencing guidelines DICTATE that if there is a mountain of evidence against you, and you try to FIGHT it and LOSE, then you will get a HELL of a lot more time in prison than if you just plead guilty in the first place.
Just my experience.
Re:Right to face one's accuser...easy out at court (Score:2)
This sort of technique is actually used a lot, but usually to protect the identities of minors who are prosecuted as such for high-profile crimes. Personally, I think there is a great deal of sense to it. Sometimes the identities of the victims OR the perpetrators of crimes do need to be protected, but I think that in most cases of this type doing so is unfair to investors, shareholders, and clients.
I fully realize that there is no such thing as perfect security, nor will there ever be. But investors, shareholders, and clients of a given company have the right to know how their money/data was comprimised, and what the company is doing to correct the problem, and ensure it never happens again. But then again, it's also important to realize that when there IS a security compromise (as there inevitably will be) that the company is going to go to the appropriate authorities. I read someone else's comment comparing this to robbing a bank. I sure as hell want the bank president to call the sherrif when a whole bunch of money gets taken.
This is definitely going into some stick ground. But then again, most legal matters ARE very sticky buisiness.
A rubber hose, a pair of dikes, and a nailgun. (Score:1)
Clearly I still have some issues to work through...
-Sazarac
"He who joyfully marches in rank and file has already earned my contempt. He has been given a large brain by mistake, since for him the spinal cord would suffice." --Albert Einstein
Re:A rubber hose, a pair of dikes, and a nailgun. (Score:1)
Re:A rubber hose, a pair of dikes, and a nailgun. (Score:2)
How Convenient! (Score:2, Insightful)
Case in point... AbiWord vs. PayPal.
I'd certainly like to know that the California State agency which kept my personal information had been hacked into. Same for anywhere I have or might be placing sensitive information.
Bad policy, bad! No treat for you!
Humm.. (Score:1)
Do these poor guys ever get there equipment back, Ive never heard any stoires of guys getting back stuff from the FBI after theyve taken it away for investigation?
Mixed feelings. (Score:3, Interesting)
However, in the case of companies that don't spend an appropriate amount on infosec, fear of public knowledge of their lack of security is often the only impetus to spend any money at all. Case in point: as the only "computer guy" (read:webmaster) at work, any problems with systems, be they internal or external, get blamed on me. I've fought tooth and nail for training (nope), a new network architecture (confidential documents, including employee data and customer financials, are stored on a Win2k box that has no firewall, no A/V, nothing), even just the ability to install freeware solutions (fuck spending an appropriate amount of money, just let me spend some time, please) have all gone by the wayside. The only time I can get approval for anything is when I lay out specific scenarios of stolen data being released publicly and the ensuing customer backlash over the lack of security. Without that hammer, I've got nothing. And since the only infosec experience I have is that which I can get for free, on my own time, I need all the hammers I can get.
Double standard. (Score:5, Insightful)
Re:Double standard. (Score:1)
There are many organizations doing the best they can to manage their systems competently and get hacked anyway.
In my opinion, it's a good idea to give such organizations the opportunity to improve their techniques and technology before dragging their names through the public mud. The Public can be very judgmental...
arive without being noticed? (Score:1)
is this how they are going to arive at peoples buisness?
The Men in Black (Score:3, Funny)
- Yes. I've been looking for you, Neo. I don't know if you're ready to see what I want to show you, but unfortunately you and I have run out of time. They're coming for you, Neo, and I don't know what they're going to do.
- Who's coming for me?
- Stand up and see for yourself.
- What, right now?
- Yes, now. Do it slowly. The elevator.
Will the Accused Ever Face The Accuser ? (Score:1)
the accused the right to face the accuser.
If the case gets to trial, the case is on
the public record.
So much for either the victim remaining
anonymous or the CotUS.
-- kjh
Discreet new tactic... (Score:1)
Then, of course, fifty FBI agents come bursting into his office.
(Unfortunately, the agent who was working on this plan was transferred before he could perfect the "call him on the phone" part.)
More Oppfortunity For Hacker (Score:5, Interesting)
Plus, IF the hacker (remember a lot of jobs are done from the inside) catches wind that the FBI has been contacted and is being asked to be discrete, this is a new weapon. They now know that they have brand new button to push that the company would, for whatever reason, really not want pushed.
Just a thought.
Re:More Oppfortunity For Hacker (Score:2)
It's much easier to mod me down than to post an intelligent reply.
An Anonymous Coward (aren't they all) wrote:
"Hmm, good point. I'll remember that next time i have mod points."
Well thank god you posted anonymously! Preserving those all-important karma points!!
The point is that it is much more useful to have dialogue than a knee-jerk "oh, I don't agree with you" moderation system because it gets abused. -1 no longer means "this is a bad post" so much as "I don't like what you had to say." I'm not sure it was ever anything else, really.
And really, at least try for the appearance of self-respect and just post as yourself. Is karma that important to you? It shouldn't be. Observe:
Hey! Someone with mod points! Here is a big fat link to some guy's torn-up asshole [goatse.cx]. Please mod this post down to prove that people should be more worried about saying what is on their mind than karmawhoring. Metamoderators, please disregard any -1 modding done to this post. It was requested.
And to the original AC, you're a nitwit. People like you are the reason the signal-to-noise ratio on Slash went to complete shit years ago. Thanks, much obliged.
Companies? How about... (Score:1)
Of course, you may not agree with their politics, but...
Is hacking now worse than rape and murder? (Score:5, Interesting)
So is this saying that hacking is even more humiliating, more personally damaging, more vicious than rape or murder (or any number of other violent and cruel acts) -- so much so that we have to shield its victims from any public knowledge of their being victims? Or maybe are we saying that corporations get whatever they want from our justice system? (*cough* Microsoft penalty judgement *cough*)
Constitutional??? (Score:3, Insightful)
Who needs fair trials, anyway? (Score:2, Insightful)
Great! The perfect infrastructure to put arbitary people in jail. You can frame anyone!
And how can the hacker prove to the judge that the alleged victim had something to gain from framing him? And it makes it impossible that someone can can read about the trial in the newspaper and help prove the hacker's innocence.
Obviously they want to get rid of Kevin Mitnick for good this time.
hypocritical extortion. (Score:1)
Companies can be assured of discretion when reporting computer crimes...
Give the FBI more tax-dollars and everything will be ok. Can't have those horrible 'hacker' types extorting money from the system now can we?
Give us your money...OR ELSE!
"Arriving Discreetly" (Score:5, Funny)
Pure BS (Score:2)
It is curious to note that these cases are even more frequent among corporate strucutures, specially among holdings. And no one cares when one company gets sold and still keeps using the common corporate resources. And some do use these security breaches for their purposes.
So why companies want to hide information? Because they don't want people to mess up in their "internal" affairs. Roughly this is the same type of story like the county sheriff meeting the feds in its town. He may know he has a problem but he will be more happy to see these suits outta there ASAP and leave people solve its own problems. The same goes to most companies. They will not invite feds because they fear publicity. They will not invite them because they prefer to leave the mess for themselves, instead of having some "outsiders" sniffing all around and giving too many questions.
Not long ago I was in such situation. I came in in a "no publicity, no scandals, all confidential, internal and top secret" agreement. However, some guys didn't calm down until they smoked me outta the company. According to my recent data, they keep living exactly the same way as they did. While they fill their pockets, they don't care for shareholders, clients, partners or concurrents. And frankly it seems that their shareholders don't worry either.
Hothouse Flowers (Score:3, Insightful)
The Government is now voicing concern about our "National Information Infrastructure" and its vulnerability. Passing tough laws and increasing enforcement is exactly the worst thing we could do for that cause. It will merely grow "hothouse flowers" - vulnerable networks that will not be probed by ordinary people (because they're scared) and will remain vulnerable for cyber-terrorists or organized crime.
Indulging the weakness of our corporate information security will be a never-ending spiral. Instead we should drag these hothouse flowers out into the real world and let natural selection take its course. In fact, the government could help most by offering bounties to people who hack into important facilities. Of course these bounties would be added to the tax bill of the corporation responsible for the security weakness. If most of the malicious hackers were reporting to the government, there'd be no way for "victims" to hide the incidents, and they could be publicized so customers and shareholders can react appropriately. That's how free markets are supposed to work - people buy and sell based on information.
Small scale hackers and script kiddies are like the constant barrage of viruses that keeps our immune systems on their toes. If we manage to scare them all away, we become the "boy in the bubble".
Re:Hothouse Flowers (Score:2)
Granting that for the sake of argument, what's the most effective way to increase security? I'd say, ensure that a talented adversarial force is constantly looking for holes in the security. Since that force already exists, why not try to harness it?
Just to be clear, one cannot legally do that under current law. In fact, an Oklahoma techie was charged under a wire fraud statute after demonstrating weaknesses in a customer's security to FBI agents.
Here are some differences:
The barrier should be chosen so that its penetration time exceeds the response time of responding personnel. To increase the penetration time, the barrier must generally be more expensive. Therefore, selection of such barriers is a tradeoff between penetration time and cost.
Internet host security is completely different. There is generally no such thing as penetration time; almost any conceivable attack is either a) nearly instantaneous or b) impossible in a realistic time frame. If someone breaks into an Internet host, it's not because the owner skimped on the armor plating. It's because there is an actual logical flaw in some of the code running on that host. (Taking code to include relevant configuration files.) If it's "new" flaw, we the public need to find out ASAP, because the "bad guys" may already know. If it's an old flaw, the owner of that computer is negligent.
PS: This post made Lynx coredump. Fortunately I found the post in the core file and pasted it into Netscape.
Note Title and storyline... (Score:2)
Are we talking about hacking or cracking?
The title talks about hacking crimes, and then uses cracking in the paragraph. So please
Clarification of "victims" (Score:2)
In other words, they are probably coming in "discreetly" to investigate the company that is hacked, not the hackers. Having a hoard of FBI agents mulling around your office is not the best publicity, worse at times than being hacked and having "J00 R 0WZ3R3D, PAY ME $1000000" tagged on to one's webpage...
Having your webpage hacked, people know you have a security issue. Having the FBI swarm your office, people imagine for themselves what you have done to have them there. Anyone care to guess which is worse?
When keeping a secret, make sure others do not even know you are keeping a secret, lest their own imaginations persue a worse scenario than reality - phorm
More business friendly legislation (Score:5, Informative)
>along with any sensitive corporate disclosures that could prove embarrassing.
Embarrassing? I'm sorry, but if my bank has an incompetent IT department, uses crappy software, has a poor security policy, etc then I should find about it in the paper alongside the police blotter which lists every drunk, domestic fight, and pot possession in the county.
The meat packing industry is the same way. They can recall tons of dangerous product without telling the press who the meat was sent out to. For instance it was all sent to McDonalds or Subway then those companies have the choice to tell you. Your safety, and life in some cases, is second to their PR.
Government is supposed to protect all interests without giving in to one side. Sadly, those with the resources get what they want and there isn't even a popular opposition party to call BS on laws like this.
Oh yes, a VALID view (Score:2)
People who are considering their position as share holder deserve to know the state of the company they own a share in. People who are considering buying into the a company deserve access to the information about what they're buying. As far as I'm concerned, it's a consumer right!
Corporate secrecy and other shenanigans has been what has led to many of the problems our economy is suffering now.
Another poster had another view from the perspective of the "accused" which I also feel for. It's the leverage of a plea. If a person is merely suspected, presenting proof isn't required? I'm sorry, but no! It's 100% necessary so that a person can adequately and fairly defend himself if unjustly accused. The only thing resenbling "fair" is when the accused is actually guilty and actually knows what he did... and even then the accused can't know for sure.
This idea places too much balance in favor of government law enforcement and corporate interests and is completely against "the people." This shouldn't be happening.
Re:Oh yes, a VALID view (Score:2)
Of course, if the accused isn't even told exactly what they're accused of, then that's reason enough to reject the idea.
Culpability (Score:2, Insightful)
"Companies that worry too much about public response underestimate the public's ability to assess the situation with some sophistication," [the FBI spokesman] said. "If a bank robber sticks a gun in a teller's face, the public is not confused about who's fault that is."
What about companies that provide little to no protection to their networks? Is that still the same as a robber sticking a gun in a teller's face, or would that be more akin to say, someone walking into the bank, into the unlocked vault, and walking out with everyone's valuables? And can the public still asses the difference with any level of sophistication?
Hacking is a crime??? (Score:2)