It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by HawkeyeNation
Oh for #### sake...I used to work for a huge financial service and we would look up celebrity files all the time. Were we told not too...yes but it was done anyways. I did not use any of the info to profit it was just pure looking at. Cops are doing it is no different then the other 5 million corps that have personal data.
Originally posted by HandyDandy
Originally posted by webpirate
reply to post by WozaMeathed
Exactly. I'm guessing every single one of us....male and female....just had to click and look too. Like I said... let he who is without sin...cast the first internet hate mail.
The difference would be that we didn't hack into a restricted database to do it.
Yes....when you illegally access an internet site...it is called hacking.....and is illegal no matter what the intention was or is.
Originally posted by WozaMeathed
Incorrect,
You still looked at the picture, did you not???????
So resticted database or not, your curiousity got the better of you and you looked, so that make's you as bad as the police and the rest of us, its that simple.
Its Not the same, as no police hacked into anything, they just abused their privledges as officers.
Originally posted by BellaSabre
Are you saying that male police officers are MALE? If you cut them with a knife they will bleed real, red blood?
Astonishing. Whowouldathought.
The reptilian officers bleed green
I just don't find this all that scandalous.
Originally posted by webpirate
If I went and looked into that database. It would be hacking. Because I do not have an access code or password. They all did.
Criminal offenses under the Act
1.Knowingly accessing a computer without authorization in order to obtain national security data
2.Intentionally accessing a computer without authorization to obtain: Information contained in a financial record of a financial institution, or contained in a file of a consumer reporting agency on a consumer.
Information from any department or agency of the United States
Information from any protected computer if the conduct involves an interstate or foreign communication
3.Intentionally accessing without authorization a government computer and affecting the use of the government's operation of the computer.
4.Knowingly accessing a protected computer with the intent to defraud and there by obtaining anything of value.
5.Knowingly causing the transmission of a program, information, code, or command that causes damage or intentionally accessing a computer without authorization, and as a result of such conduct, causes damage that results in: Loss to one or more persons during any one-year period aggregating at least $5,000 in value.
The modification or impairment, or potential modification or impairment, of the medical examination, diagnosis, treatment, or care of one or more individuals.
Physical injury to any person.
A threat to public health or safety.
Damage affecting a government computer system
6.Knowingly and with the intent to defraud, trafficking in a password or similar information through which a computer may be accessed without authorization.