Talk:Computer and Internet Protocol Address Verifier
![]() | Computing Unassessed | |||||||||
|
Since this just hit the news, and my own searches came up with very little besides the initial news articles, I decided to create this stub article. Its my first stub, and first to include citations, so please forgive any mistakes of not understanding the process. I did try to at least search for an use examples from other stub articles. Any tips or links for creating better stubs, etc, would be appreciated. I think the article has a split-infinitive in it. I'm not sure if thats exceptable or not. :-) --Mespinola 17:22, 18 July 2007 (UTC)
Legality
Whether it requires a wiretap warrant or not, its installation by exploiting a security hole on a victim's machine would appear to be blatantly illegal, in violation of the Computer Fraud and Abuse Act in particular. This isn't running a red light with the sirens on -- this is a clear violation of the principle of rule of law on which all civilized countries are, in part, founded.
Emplacing it purely by "social engineering" would seem to be a fuzzier matter though; an interesting case to test some day in court.