Language Selection

English French German Italian Portuguese Spanish

Security Research and Computer Crime - Where do we Draw the Line?

Filed under
Legal

This is interesting - the case of Eric McCarty, a security researcher and sysadmin charged by Federal prosecutors last month with "knowingly having transmitted a code or command to intentionally cause damage" to the University of Southern California's applicant website (I noticed the FBI press release uses the word "sequel" instead of SQL. I hope that wording didn't come from the complaint itself...).

Apparently, McCarty exploited a SQL injection flaw to access student data (which included social security numbers and dates of birth) in the database backing USC's website. He then notified SecurityFocus via email, who notified USC of the vulnerability. USC shut their site down for two weeks while it was being fixed (my guess is the "damage" comes from the fact that USC had to take their applicant website offline, since McCarty didn't do anything malicious with the information). Here is the text of the statute he is alleged to have violated (see section (5)(A)(Sleepy).

The case, and others like it, show the ethical conflict involved in some computer crime prosecutions.

Full Story.

More in Tux Machines

Android Leftovers

Living The Linux Laptop Lifestyle

Another great advantage of open source software: you can run it off of a flash drive before installing it. And I have to admit that I loved Linux Lite's out-of-the-box feel, so much so that I reconsidered installing my number two selection: LXLE, which is designed for underpowered older machines. According to a label on the bottom of my Toughbook, this pre-Linux laptop was decommissioned in 2005, making it well over ten years old. And so I replaced the RAM, installed Linux Lite, and after a short period, I was back to living a Linux laptop lifestyle while waiting for my charger. Read more

Mentor Embedded Linux gains cloud-based IoT platform

Mentor announced a “Mentor Embedded IoT Framework” platform that builds on top of Mentor Embedded Linux with cloud-based IoT cloud services ranging from device authentication and provisioning to monitoring and diagnostics. Mentor’s Mentor Embedded IoT Framework (MEIF) extends its Yocto Project based Mentor Embedded Linux (MEL) and Nucleus RTOS development platforms to provide cloud services for IoT device management. The platform mediates between these platforms and cloud service backends, including Amazon Web Services (AWS), Eclipse IoT, Microsoft Azure, and Siemens MindSphere. Read more

Bang & Olufsen’s RPi add-on brings digital life to old speakers

B&O and HiFiBerry have launched an open source, DIY “Beocreate 4” add-on for the Raspberry Pi that turns vintage speakers into digitally amplified, wireless-enabled smart speakers with the help of a 180-Watt 4-channel amplifier, a DSP, and a DAC. Bang & Olufsen has collaborated with HiFiBerry to create the open source, $189 Beocreate 4 channel amplifier kit. The 180 x 140 x 30mm DSP/DAC/amplifier board pairs with your BYO Raspberry Pi 3 with a goal of upcycling vintage passive speakers. Read more