For a lot of people, the application of the law is simple. If you violate the terms listed in a specific state or federal statute, you have committed a crime and should therefore be punished in accordance with the law. But while this is the case across the nation, there is another element to the law that most people overlook and it is the application of case law as well.
Technology is everywhere. It's in our cars, our homes and sometimes even in our bodies. But as scientists continue to test the boundaries of what we can and cannot make, there are some in the world who want to test the integrity of this technology, specifically to see if it can be broken into and tampered with.
Breaking up with someone you care for or even love can be incredibly difficult sometimes, especially if you're not ready to end the relationship. People often feel a range of emotions -- from anger to sadness -- that can interfere with a person's ability to think rationally. This can be problematic, as you can imagine, because it could mean that a person ends up doing something that they might regret later.
The American Bar Association and several law schools focusing on national security issues brought together a panel of high-level intelligence and law enforcement officials for a discussion in the fall. This was the 23rd Annual Review of the Field of National Security Law and, as a senior writer for the ABA Journal wrote, we ignore the nexus of national security issues and cybercrime at our peril.
A D.C. Circuit Court judge released a blockbuster ruling this week, saying that the massive collection of Americans’ telephone call and location data by the National Security Agency is probably in violation of the Fourth Amendment’s prohibition of unreasonable searches and seizures by government agencies. In fact, he found the violations likely enough that he issued a preliminary injunction against the program.
In 2003, a San Diego college student wrote a computer program called “Loverspy” or “Email Pi” and sold it online for $89 a copy. Meant to help buyers catch lovers suspected of cheating, it self-installed virtually undetectable software that could capture every email or instant message sent by the infected computer. It could even operate the computer’s webcam remotely. All the suspicious lover had to do was send their lover an electronic greeting card. If they opened it, the software would be installed.