No subject


Tue Nov 29 10:43:08 WST 2011


unauthorised computer access, when the victim computer is the direct 
property of the federal government. But, given the effects of security 
breaches, unauthorised use of a system for relaying, consequential 
unlawful use of the telecommunications network (for security breaches, 
including but not limited to relaying spam, viruses, and worms), it 
takes on a federal, and international, rather than just a state aspect, 
which justifies any unauthorised computer access, becoming a defined 
offence under the federal Crimes Act. That should not, of course, extend 
to security breaches by invitation (as in the companies, I believe, in 
the USA, who offer sums of money, to anyone who can breach the security 
of their systems, and provide evidence of the breach(es) ).

Or, maybe, they should just be pronounced terrorists, so that the 
federal government can send ASIO around to destroy everything around the 
culprits (I remember an ASIO attack, where they attacked the wrong hotel 
room in Melbourne - I assume that it was the correct hotel; just the 
wrong room, and, after they had smashed it up, it was "oops"). That way, 
at least the culprits' neighbours would get peeved with them...

-- 
Bret Busby
Armadale
West Australia
..............

"So once you do know what the question actually is,
 you'll know what the answer means."
- Deep Thought,
  Chapter 28 of 
  "The Hitchhiker's Guide to the Galaxy:
  A Trilogy In Four Parts",
  written by Douglas Adams, 
  published by Pan Books, 1992 
....................................................



More information about the plug mailing list