• trakata@lemmy.ca
    link
    fedilink
    arrow-up
    0
    ·
    9 days ago

    Yes, it’s commonly prosecuted in both USA and CAN.

    In USA: Computer Fraud and Abuse Act (“CFAA”) site:justice.gov

    Essentially, directly accessing and modifying any system you don’t have authority over meets the bar for legal action.

    They can and will track this, being hands off or proper opsec is the only way to ensure safety.

    • theneverfox@pawb.social
      link
      fedilink
      English
      arrow-up
      0
      ·
      9 days ago

      They can and will track this

      Normally, 100%. The US government has strict opsec and cyber security procedures, so even if someone gets in a neglected door they better have covered their tracks well

      But these are a bunch of complete newbies with no oversight. They’re not doing even the most basic compliance… They’re completely green, they don’t know what they don’t know yet. The oldest of them is a new grad, one is a high school grad. They’re also adversarial to the people who do the actual cyber security

      That being said, I wouldn’t take chances

      • trakata@lemmy.ca
        link
        fedilink
        arrow-up
        0
        ·
        8 days ago

        I’m of the “no risk to small” mind set as well and I’d wager when they try to investigate, the people they must ask, will simply delay answering.

        Perhaps not because of ideology either, I imagine the total increase in spillover work from sudden attack surface exposure must look wildly Sisyphean right now.

      • Glitterbomb@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        9 days ago

        The CFAA isn’t computer literate either. It was made in like 1985 and the language used references express permission for dialing into computers in pre-dialup days. Courts could interpret it as everyone needing a snail mailed letter from google before you type google dot com into a browser, if the judge wanted to be that big of an asshole. Its ancient, but it is still used to throw the book at anyone using a keyboard in a way the government doesn’t like.

      • trakata@lemmy.ca
        link
        fedilink
        arrow-up
        0
        ·
        9 days ago

        Never believe that anti-Semites are completely unaware of the absurdity of their replies. They know that their remarks are frivolous, open to challenge. But they are amusing themselves, for it is their adversary who is obliged to use words responsibly, since he believes in words. The anti-Semites have the right to play. They even like to play with discourse for, by giving ridiculous reasons, they discredit the seriousness of their interlocutors. They delight in acting in bad faith, since they seek not to persuade by sound argument but to intimidate and disconcert. If you press them too closely, they will abruptly fall silent, loftily indicating by some phrase that the time for argument is past.

        Jean-Paul Sartre

        • sepi@piefed.social
          link
          fedilink
          English
          arrow-up
          0
          ·
          9 days ago

          I apologize, but what does this have to do with the level of computer literacy of titler (elon) and his gang of young kids?

          • trakata@lemmy.ca
            link
            fedilink
            arrow-up
            0
            ·
            9 days ago

            No apology necessary, it seems you consider them a joke, I don’t.

            The circumstances draw parallels to Sartre’s time.

            Cheers, friend.

            • sepi@piefed.social
              link
              fedilink
              English
              arrow-up
              0
              ·
              edit-2
              8 days ago

              I consider them a threat due to their computer illiteracy and zeal for getting into government departments. Maybe you didn’t understand what I was putting down here.

              Just in case you don’t understand what I meant, see their most recent leak of classified info or elons ignorance of SQL leading to claims of duplicate data in government databases.

              Maybe you are looking at the more complicated picture with Sartre and assuming stuff about folks instead of looking at the simpler picture that is right in front of you.

    • Bronzebeard@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      9 days ago

      Essentially, directly accessing and modifying any system you don’t have authority over meets the bar for legal action.

      So exactly the doge traitors are doing…

      • trakata@lemmy.ca
        link
        fedilink
        arrow-up
        0
        ·
        9 days ago

        Sure, with the notable exception that they (the exec branch) are also the stakeholders and enforcers of that law.

        It’s perfectly legal for them to simply ignore any activity going on, or executive order investigations shut down if any check or balance gets in the way.

        And as a tertiary overlap in either case, use cronies to reinforce bad policy to further objectives.