Hacker's Lost Constitutional Rights in the USAdded: Thursday, November 7th, 2013
Category: Bit Torrent Freedom > The Right To Share
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
Anyone calling themselves a hacker on the Internet automatically loses rights under the American constitution. This is due to the recent ruling of the US District Court for the State of Idaho. The judge ruled in a case that an ICS product developer’s PC could be seized without him being notified or even heard from in court.
The ruling was that because the user in question, Corey Thuen, claimed on his website that he liked hacking things and wasn’t going to stop. What makes the case especially unpleasant is that it was being bought by an employer, Battelle Energy Alliance – the management and operating contractor for Idaho National Laboratory. The company has sued Corey Thuen and his company Southfork Security.
The Idaho National Laboratory was developing a PC program aimed at protecting the US’ critical energy infrastructure from hacker attacks. Corey Thuen helped develop the application called Sophia, which identified new communication patterns on ICS networks.
Battelle Energy Alliance was planning to license the technology in question, but the developer wanted it to be open source. As a result, Corey Thuen left Idaho National Laboratory, set up his own Southfork Security, and wrote a similar “situational awareness” program dubbed Visdom.
Now Battelle Energy Alliance claims that the developer stole the code and infringed agreements with Idaho National Laboratory. This is all right, but the company asked for a restraining order without first notifying the developer only because his website said “We like hacking things and we don't want to stop”. As a result, the company obtained a warrant to seize Corey’s PC because he claimed to like hacking things on the website.
Even in the United States, the courts are reluctant to allow the copying of a hard drive. However, the judge was swayed by the fact that the developer claimed publically he was a hacker and could probably wipe his hard drive.
November 7th,2013Posted by:
Thursday, November 7th, 2013
|posted by (2013-11-07 18:47:23)|
|Wow "and could probably wipe his hard drive." anyone could, it's been doable by the average user since windows 95. As for the term hacker I still hate the fact that no one seems to use the terms right (always been my pet peeve) Look at for correct terms and meanings, the uninformed should really read this.|
"Types of Hacker
White Hat: A white hat hacker is someone who has non-malicious intent whenever he breaks into security systems and whatnot. In fact, a large number of white hat hackers are security experts themselves who want to push the boundaries of their own IT security ciphers and shields or even penetration testers specifically hired to test out how vulnerable or impenetrable (at the time) a present protective setup currently is. A white hat that does vulnerability assessments and penetration tests is also known as an ethical hacker.
Black Hat: A black hat hacker, also known as a cracker, is the type of hacker that has malicious intent whenever he goes about breaking into computer security systems with the use of technology such as a network, phone system, or computer and without authorization. His malevolent purposes can range from all sorts cybercrimes such as piracy, identity theft, credit card fraud, vandalism, and so forth. He may or may not utilize questionable tactics such as deploying worms and malicious sites to meet his ends.
Grey Hat: A grey hat hacker is someone who exhibits traits from both white hats and black hats. More to the point, this is the kind of hacker that isn\'t a penetration tester but will go ahead and surf the Internet for vulnerable systems he could exploit. Like a white hat, he\'ll inform the administrator of the website of the vulnerabilities he found after hacking through the site. Like a black hat and unlike a pen tester, he\'ll hack any site freely and without any prompting or authorization from owners whatsoever. He\'ll even offer to repair the vulnerable site he exposed in the first place for a small fee.
Script Kiddie: A script kiddie is basically an amateur or non-expert hacker wannabe who breaks into people's computer systems not through his knowledge in IT security and the ins and outs of a given website, but through the prepackaged automated scripts (hence the name), tools, and software written by people who are real hackers, unlike him. He usually has little to know knowledge of the underlying concept behind how those scripts he has on hand works."
|posted by (2013-11-07 22:24:50)|
|"Even in the United States, the courts are reluctant to allow the copying of a hard drive. However, the judge was swayed by the fact that the developer claimed publically he was a hacker and could probably wipe his hard drive."|
This is some real BS!
|The guy was a developer,developers and engineers do workarounds in programs everyday I do depending on what is required e.g in fedora 12 I had to yum install update as the package manager was dysfunctional and posted workaround on software,tips and tricks forum.It is a non-standard way of updating and installing given most use the updating software but efficient in Linux simples,for many such is a hack or workaround in developing systems or improving programs many hacks are employed so how can someone who`s employment requires him to hack be denied legal representation in said regard.Would Linus Torvald be charged and arrested for developing linux or bill gates with his snippet of code for a box he calls windows,totally absurd.|
|Just another example of restriction of internet freedoms since this renders all workarounds and system development impossible to innovate since such often requires programming hacks and workarounds,patches and coding to do any of these could be construed as Hacking.Since sourceforge.net is probably without reservation the largest open source development site in the world and since many of the developers there including myself contribute to such we are all hackers so come and get us and strip us of our rights till there is no development or innovation and nothing for windows to copy and claim as their own.Now we know why Linus Torvalds is in the theater now and not on a PC.|
|posted by (2013-11-08 00:08:50)|
|Isn't part of being a hacker covering your tracks? Posting your intentions on your own web page is Felony Dumbass.|
Card13, your list missed this guy, no section for pointed hat!
|many post on forums and sites and if your occupation as a developer requires you to do hacks or workarounds is it not purely stating what you do for your employment and also required by the job description.It states he said he enjoyed hacking he may just as well have said he enjoyed his work.|
|Obviously as a developer responsible for finding weaknesses and vulnerabilities in A.I.D.S or ICS his job description would involve hacks to prove for fallibility in systems defenses and to eliminate flaws and shore up internal security,obviously if he was lax and discussed these workarounds publicly or did so in a criminal context then he should have his day in court and be subject to the same constitutional rights as everyone else,but from what is reported it sounds like he has developed or discovered something that his bosses are concerned enough to have him ghosted away for, excusing his constitutional rights along the way using a bogus ruling that can not possibly apply to a professional hacker/developer in security systems.It would`nt be the !st time peoples rights are violated when it serves the country or one of their security departments/contractors.|
|He ran a security company! Saying he likes to hack things and won't stop is not an admission of crime, but rather an admission that one enjoys finding security holes so as to become a better security expert. Any time you modify open source firmware or software(which is legal if it's open source) you are 'hacking' the program/firmware to suit your needs.|
This is really a product of a judge not understanding the term or the statement, and the failure of the guy's lawyer to make this apparent.
Furthermore, this was a district court, not the Supreme one. So he can not, and HAS NOT ruled that the constituion doesn't apply to hackers. He has simply VIOLATED the man's god-given rights which the Constitution and Bill of Rights are intended to protect.
|posted by (2013-11-08 08:18:23)|
|Regardless NO judge can revoke a U.S. citizens constitutional rights. This judge has to be getting into the drug locker in the courthouse used for evidence..|
Given it is in Idaho; I'd guess the judge has snorted way too much snow...
The guy's lawyer is an idiot since he didn't get the judge impeached; or is he very very smart and snickering due to an instant appeal or dismissal coming after this?
|Just a little, but not to much off topic. Sometimes I'm proud to be a Canadian when our Supreme Court comes out with a ruling such as this. Supreme Court of Canada Finds That Government Must Get Distinct Warrant to Search a Computer Found with a Search Warrant: "It is difficult to imagine a more intrusive invasion of privacy than the search of a personal or home computer."||
Most Popular Stories