Google Search Convicts Hacker 116
An anonymous reader writes "Google search terms have helped convict a wireless hacker. The queries the hacker performed were introduced into evidence at court, where Matthew Schuster was charged with disrupting his former employer's wireless network and imitating other users' MAC addresses to obtain access. From the article: 'Court documents are ambiguous and don't reveal how the FBI discovered his search terms. That could have happened in one of three ways: an analysis of his browser's history and cache; an Alpha employee monitoring the company's wireless connection; or a subpoena to Google from the police for search terms tied to his Internet address or cookie. Google has confirmed that it can provide search terms if given an Internet address or Web cookie, but has steadfastly refused to say how often such requests arrive.'
Re:YRO? (Score:5, Insightful)
Well... (Score:5, Insightful)
But when Google does it, it can only be for the common good, right? A malicious Hax0r gets put away??
Re: Wake up and smell the coffee!!! (Re:YRO?) (Score:3, Insightful)
Is the information faulty? Did someone munge with the data? Were Google's databases corrupt? Was the data recreated or generated from other data? Has Google's spy software been through open source review? How well was Google's software tested?
It continually astounds me how intellectually lazy Americans have become! It continually astounds me how the American people are willing to look the other way when it comes to their liberty and civil rights being encroached on!
THINK FOR ONCE PEOPLE!
MAC Address Filtering... (Score:5, Insightful)
Transparent Proxy (Score:2, Insightful)
Actually... (Score:3, Insightful)
Re: Wake up and smell the coffee!!! (Re:YRO?) (Score:3, Insightful)
Re:Is there a way... (Score:5, Insightful)
He didn't even try. He was just a disgruntled IT worker. Instead of using a machine gun to mow people down he wanted to use a transmitter to mow packets down. In this day and age people take that very seriously. So he's going to jail for 15 months. End of story.
TLF
Re:YRO? (Score:3, Insightful)
Because now you have a lot fewer of those rights.
In what way? To claim that a "right" has been violated here seems tantamount to making an assertion such as "Of course I may leave footprints, but no one has a right to follow them."
Why should an electronic trail have legal protections that a physical trail does not?
Re:YRO? (Score:5, Insightful)
Yeah, what with being forced to use Google and all.
I mean, seriously, which right was violated here? The right to use a search engine without records? The right to use someone's wireless network without records?
Faulty Article Title (Score:5, Insightful)
Kudos on the post's headline being more accurate than TFA's headline.
The article's headline says: "Google searches nab wireless hacker," but the article actually says:
That may seem like simple semantics, but it's actually a pretty big difference.
Forget about the Google... (Score:2, Insightful)
Re:On my best behavior (Score:2, Insightful)
Re:YRO? (Score:3, Insightful)
Physical trails in the public are not protected. Physical trails in private are.
Its OK for me to watch you in public talking to person X. In theory, one needs a warrant and probable cause of a specific crime to listen to person talking with person X on the telephone.
Re:Well... (Score:2, Insightful)
Re:YRO? (Score:4, Insightful)
In this instance it would be like talking to person X on company Y's premises. Company Y certainly has a right to know what is going on in their building and if it's illegal have every right to call the police about it.
That's my view, anyway.
Re:How can this be considered evidence? (Score:4, Insightful)
Courts need to become more technically competent, I think. We're too accustomed to the idea that if data comes from a computer it is implicitly trustworthy, and that's a big problem.
Hey, I've done that ... (Score:3, Insightful)
Hmmm
Anyway, I wonder if I could be a suspect now because of those searches?
I have noticed in the past that if you ask questions about security, you're usually treated as if you were a potential security risk, not as someone trying to improve your own security.