No subject
Tue Nov 29 10:43:08 WST 2011
unauthorised computer access, when the victim computer is the direct
property of the federal government. But, given the effects of security
breaches, unauthorised use of a system for relaying, consequential
unlawful use of the telecommunications network (for security breaches,
including but not limited to relaying spam, viruses, and worms), it
takes on a federal, and international, rather than just a state aspect,
which justifies any unauthorised computer access, becoming a defined
offence under the federal Crimes Act. That should not, of course, extend
to security breaches by invitation (as in the companies, I believe, in
the USA, who offer sums of money, to anyone who can breach the security
of their systems, and provide evidence of the breach(es) ).
Or, maybe, they should just be pronounced terrorists, so that the
federal government can send ASIO around to destroy everything around the
culprits (I remember an ASIO attack, where they attacked the wrong hotel
room in Melbourne - I assume that it was the correct hotel; just the
wrong room, and, after they had smashed it up, it was "oops"). That way,
at least the culprits' neighbours would get peeved with them...
--
Bret Busby
Armadale
West Australia
..............
"So once you do know what the question actually is,
you'll know what the answer means."
- Deep Thought,
Chapter 28 of
"The Hitchhiker's Guide to the Galaxy:
A Trilogy In Four Parts",
written by Douglas Adams,
published by Pan Books, 1992
....................................................
More information about the plug
mailing list