Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

UK Hacker loses Extradition Case 370

SnakeOil Steve writes to tell us that Gary McKinnon, the alleged hacker who broke into Army, Air Force, Navy, and NASA systems, has just lost his extradition case. From the article: "'My intention was never to disrupt security. The fact that I logged on and there were no passwords means that there was no security,' McKinnon said, outside the hearing at London's Bow Street Magistrates Court. 'I was looking for UFOs.'"
This discussion has been archived. No new comments can be posted.

UK Hacker loses Extradition Case

Comments Filter:
  • Nice Try (Score:3, Insightful)

    by MBCook ( 132727 ) <foobarsoft@foobarsoft.com> on Wednesday May 10, 2006 @01:51PM (#15302494) Homepage
    I was just looking in that guy's house for a nice new TV. It wasn't breaking in because he left the door open.

    You want to guess how well that flies? I agree it is stupid that there were no passwords on the system, but just like a yard without a fence, the fact the fence is there does not imply permission to run around there and dig up the flowers.

    And it's the military. You really think you can poke around in the military's systems without them coming after you?

  • Re:Nice Try (Score:1, Insightful)

    by BluedemonX ( 198949 ) on Wednesday May 10, 2006 @01:56PM (#15302533)
    Well, isn't that how people think in the online world?

    "Well, I can call the guy whatever I want and insult his wife and mother cause it's the Intarweb."

    "Well, I'm not really stealing when I pirate all these MP3s and movies. Information wants to be free."

    "Compromising a military system shouldn't be something I get sent to Gitmo for, cause it was too easy to get in."

    Time for intarweb nerds to grow up and realise that there really are consequences for actions.
  • Ouch (Score:2, Insightful)

    by Umbral Blot ( 737704 ) on Wednesday May 10, 2006 @01:59PM (#15302558) Homepage
    From the article "McKinnon faces a maximum sentence of five years in federal prison and a $250,000 fine." That has gotta hurt. The article also claims that his activities shut down the systems for a week. If that is true he might deserve this punishment, but I find it somewhat hard to believe that the military's computers were actually down for that long. Couldn't they just have done a clean boot?
  • I really hope... (Score:4, Insightful)

    by joe 155 ( 937621 ) on Wednesday May 10, 2006 @02:01PM (#15302568) Journal
    that the Home Secretary does not let this one go forward... as someone mentioned previously in a discussion a few days ago; we all break laws in countries which we're not in, that's ok, we shouldn't be able to be prosectued for it (I know he also broke UK law - but he should only be prosecuted under that). How would Bush feel if someone tried to prosectue an American for saying that Iran's leadership was being foolish and that they are wrong - that's illegal in Iran - where's the extradition to Iran - you can't have it both ways
  • Re:Nice Try (Score:5, Insightful)

    by FireFury03 ( 653718 ) <slashdot&nexusuk,org> on Wednesday May 10, 2006 @02:03PM (#15302587) Homepage
    I agree it is stupid that there were no passwords on the system, but just like a yard without a fence, the fact the fence is there does not imply permission to run around there and dig up the flowers.

    What constitutes "permission" to access unpassworded network services? Do you need written permission? If so I guess everyone who accesses public web servers is guilty of cracking them since they didn't get written permission from the server owners.

    It may sound silly, but there really isn't a lot of difference between a public unpassworded service and a private service that's been left unpassworded on a public network. It's certainly impossible to tell if it's legitimately public before connecting to it and there's no guarantee you can tell that it's not supposed to be public once you have connected.

    Lets say you connect to a web server - how are you to know if that's a public web site or a private company's intranet site that they didn't bother to password protect?
  • This is ridiculus! (Score:2, Insightful)

    by Anonymous Coward on Wednesday May 10, 2006 @02:04PM (#15302593)
    No country in the world should extract their citizens to U.S.A. because U.S. goverment says so. If goverments are "forced" to extract their citizens to U.S., then U.S. should extract their citizens to abroad, if citizens are accused of violating the law of other country.
  • A couple of points (Score:5, Insightful)

    by Anonymous Coward on Wednesday May 10, 2006 @02:07PM (#15302617)
    Given the US track record on treatment of detainees, torture, imprisonment without trial and so on I am very suprised and disappointed that any government would willingly allow their citizens to be taken into custody in the US. Here in the UK we have an issue with "illegal imigrants" who remain in this country because on arrival they plead persecution and their lawyers find it easy to block their deportation back to a repressive regime. By the same standards the USA is clearly a repressive regime.

    Also, I've heard this story from all sorts of sides and opinions ranging from "He's a harmless wannabe cracker who just walked into unsecured .mil sites looking for UFO information and is now being persecuted by overzealous 'security' gimps keen to make an example of someone (presumably because they never catch any real intruders who are far too smart)" all the way to "He's a publicity seeking prick who set this whole thing up to get busted as some kind of bid for fame"
    Whatever the outcome I'd like to see the same standards applied to SONY as to this kid. If he goes down then I want to see SONY programmers arrested and deported to the UK to face multiple criminal charges because installing rootkits is an offence under the Computer Misuse Act in this country.

    With all these double standards I can't see people retaining any repect for justice or the law. Once governments undermine the law with such blatent corruption of principles it's a one way ticket down to social disintegration.
     
  • Field analogy (Score:2, Insightful)

    by 9mm Censor ( 705379 ) * on Wednesday May 10, 2006 @02:08PM (#15302626) Homepage
    if there is a field in the middle of no where, with no locked gate, or no signs saying "dont go here" is it wrong to walk there?
  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Wednesday May 10, 2006 @02:10PM (#15302649)
    Comment removed based on user account deletion
  • by purple_cobra ( 848685 ) on Wednesday May 10, 2006 @02:13PM (#15302668)
    Sadly, Reid will happily extradite him. Bush will *tell* Blair, and Reid would never think of opposing The Anointed One.
    Much as I think McKinnon is an idiot he should be tried and, if found guilty, punished in the UK: he stands some tiny chance of a fair trial here, along with a proportionate sentence. All that crap about causing so much damage to a network that it "took more than a month to repair" (quote taken from the BBC News story) has the strong smell of bullshit. I suspect this is more concerned with the US military being shown, once again, to be incompetent and entirely incapable of securing anything than with the alleged damage this plonker caused.
    Shame he didn't want anything from our own MoD: if he'd hung around long enough I'm sure he could have picked-up one of the many laptops they've left lying around over the years.
  • by t35t0r ( 751958 ) on Wednesday May 10, 2006 @02:14PM (#15302675)
    I've said this on digg and i'll say it here again, he didn't hack anything. In his interviews it was said that the systems were already compromised and were being used by people from eastern european countries. I commend him for seeking the truth but not for going about it idiotically. In any case he doesn't deserve anything more than a few months in jail (if that even, better in a halfway house if there are such things in the UK), probation, and community service.

    This has gotten way out of proportion. He didn't even do anything to damage US operations nor was this even his intent, he's not a terrorist and had no malicious intent. I would rather make sure those idiotic sysadmins never worked in IT for the rest of their lives since they left administrator passwords open! Freakin morons.
  • by Billosaur ( 927319 ) * <<wgrother> <at> <optonline.net>> on Wednesday May 10, 2006 @02:15PM (#15302684) Journal
    as someone mentioned previously in a discussion a few days ago; we all break laws in countries which we're not in, that's ok, we shouldn't be able to be prosectued for it (I know he also broke UK law - but he should only be prosecuted under that).

    I really hope that's not some kind of excuse for his behavior. Just because he was in the UK and broke a US law doesn't give him the opportunity to walk off into the sunset. He needs to face the music; he willfully violated US law. Reverse the situation -- if he were in the US and broke into a UK computer, you'd think that was ok? If that's the case I don't know why we're looking for Osama Bin Laden. He may have ordered the deaths of thousands of Americans and others, but since he's in a foreign country and just happened to break some of our laws, that's forgiveable, don't you think? And don't think I don't know what you're going to say: apples and oranges. But while he was breaking into our military's computer network, he had ample opportunity to find out all sorts of things, He may not have been performing espionage in the classic sense, but it's espionage nonetheless. He was trying to find out US secrets, albeit secrets that only exist in his deluded mind.

    I think the best he can hope for is the Wacky Farm.

  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Wednesday May 10, 2006 @02:15PM (#15302688)
    Comment removed based on user account deletion
  • Re:Nice Try (Score:3, Insightful)

    by robertjw ( 728654 ) on Wednesday May 10, 2006 @02:17PM (#15302702) Homepage
    just like a yard without a fence, the fact the fence is there does not imply permission to run around there and dig up the flowers.

    True, but I would assume that any government building with an unlocked doors during 'normal business hours' would be fair game to walk go in to. This was a publicly accessible server out in an area (the Internet) where the assumption is that everything not locked down is accessible.
  • Re:Nice Try (Score:5, Insightful)

    by dwandy ( 907337 ) on Wednesday May 10, 2006 @02:26PM (#15302770) Homepage Journal
    I agree it is stupid that there were no passwords on the system, but just like a yard without a fence, the fact the fence is there does not imply permission to run around there and dig up the flowers.
    It's not quite so simple.
    The reason you know that a yard without a fence is still private property is because there is social history - first around property, and more recently around 'suburb property'. So now we have an acceptance of what is private and what is not, even if it's not marked.
    But, if you are in the middle of nowhere, and crossed no fence and passed no sign, you could be under the impression that you're still on public property. While you may still be trespassing, no judge is going to find you guilty. The rightful owner can certainly ask you to leave, but charges are never going to stick.
    So, by the same token, any computer system that has no password could easily be assumed to be open to the public.

    I'm strongly against computer owners who take no steps to mark the territory as private who then sue and/or lay charges. Anything I can access using a typical browser or ssh/telnet/ftp/whatever client is public property. As soon as it prompts me for a password, or even displays a notification that this is private, then anything beyond that is unauthorised access.

    Note that shopping centers are private property, and yet we assume we can enter and move about freely. Sure, they can ask us to leave, but we work under the assumption that since the door is open, we are free to enter.
    Once inside, there are often doors that are either locked or marked for no entry, and again, we assume that these areas are off-limits, but the rest of the area is 'public' (of course, not in the legal sense)
    So, if from my computer I can access a remote computer belonging to the US Army, am I breaking the law?
    Those who immediately say 'yes' forget that the US Army [army.mil] has a very public HTTP server which anyone can access freely.

    So now the questions are (much more correctly) how does one tell whether one is on 'private property' out in the wilderness? Because that is what the internet is - a giant otherwise unmarked wilderness. Sure, parts of it look like the burbs with the on-line shopping and home-pages, but there's a whole host of other computers out there performing tasks, responding to credit, time, stocks quote, system update and various other queries. Which of those is public? Which is private?
    It's only by putting up signs and locks that people can know which computers are public and which are not ... in my opinion the onus starts with the computers owner. If you attach a computer to the public network (aka the internet) and you fail to take a minimum of steps to state that this computer is private, than you should have no recourse if someone accesses it without your expressed permission.

  • Re:Nice Try (Score:3, Insightful)

    by SoCalChris ( 573049 ) on Wednesday May 10, 2006 @02:29PM (#15302791) Journal
    "Well, I can call the guy whatever I want and insult his wife and mother cause it's the Intarweb."

    I can do that legally in real life, too.

    "Well, I'm not really stealing when I pirate all these MP3s and movies. Information wants to be free."

    It isn't stealing, it's copyright infringement. Big difference. I'm not saying it's right, but it isn't stealing. And with current laws, I'd probably be better off if I were caught stealing a CD from a store, than if I were caught sharing MP3s online.
  • ...But considering our (The USA's) government is trying to allow torture for "illegal combatants", who's to say he won't be considered one and shipped off to a torture camp? Here in the USA, he'd probably be tried for some asinine terrorism chagre and sentenced to life in a torture camp or to death.
  • by Tx ( 96709 ) on Wednesday May 10, 2006 @02:30PM (#15302799) Journal
    Yeah. What's the betting the guy gets extradited and eventually sentenced to several years in jail, and Ken Lay gets off scott free? American justice, eh?
  • by rainman_bc ( 735332 ) on Wednesday May 10, 2006 @02:30PM (#15302807)
    all break laws in countries which we're not in, that's ok,

    Thing is, this guy wasn't hacking a UK server, he was hacking a US server, on US soil.

    If he was stealing in the UK, he shouldn't be charged with theft in the US, but as it stands the crime was really committed on US soil.

    I'd be more sympathetic to your argument if the server was on non-US soil. Then it'd be arguable that he didn't commit any crimes against the US, and shouldn't be tried in the US.
  • Re:Nice Try (Score:3, Insightful)

    by BoredWolf ( 965951 ) <jakew.white@gmail.com> on Wednesday May 10, 2006 @02:32PM (#15302821) Journal
    Actually, there is no presumption of privacy without protecting yourself. Lets say that you don't have a fence around your yard; whatever happens to persons in that yard is therefore your responsibility, because there is no restriction to trespassing. If the person destroys your property, they are liable. Conversely, if they slip on your front doorstep and break their neck, you are liable because they are technically not trespassing. No harm, no foul on either party. Why should computer systems be any different? If you make the mistake or choice not to protect your system from user-level access and harm, then you are responsible for any breach of security provided that the user does not destroy any of the information stored. However, the real issue is revealing national secrets (supposedly). Because the federal government has been caught with their pants down, they have to make a good show to cover-up their incompetence. He would be prosecuted similarly in the UK, and it is simply a show of good-faith toward the US to let him be prosecuted there.
  • Re:Nice Try (Score:3, Insightful)

    by ergo98 ( 9391 ) on Wednesday May 10, 2006 @02:34PM (#15302838) Homepage Journal
    It's still not very clear why he ought to be extradited though.

    He committed a crime against resources not only in another country, but of another country's government. If you mail a bomb to the president of another country, that country will ask for you to be sent over -- even though you began the crime in your country.

    Does the US ever ship anyone overseas for trial ?

    That's why the UK is extraditing him -- they have a reciprocal extradition treaty. If they refuse to, then the next time they want a cyberhacker from the US to be extradited, the US would refuse.
  • Re:Nice Try (NOT!) (Score:4, Insightful)

    by FireFury03 ( 653718 ) <slashdot&nexusuk,org> on Wednesday May 10, 2006 @02:38PM (#15302877) Homepage
    Anybody who thinks that it's OK to go poking around obviously non-public military sites

    I'm afraid I don't know the specific details of the case - was he accessing web sites? Were they obviously non-public? How could he have found out that they were obviously non-public before accessing them (and thus being branded a cracker)?

    if you're finding passwords and deployment details, you can be pretty sure it's not supposed to be public

    If you've found passwords and deployment details then you have already accessed the server and thus liable to be prosecuted as a cracker. Please explain how one would find out _before_ potentially breaking the law that they shouldn't proceed any further.

    In fact, if he wanted to do the right thing, he should have emailed a security contact for the site and notified him/her about the problem.

    Emailing them saying "hey, I just accessed all your confidential data" doesn't seem like a good way of avoiding prosecution does it?

    It _could_ also be argued that since these were military secrets, knowing them turns him into a target and so the best way of remaining safe is to keep very quiet and hope noone notices.
  • Re:Nice Try (Score:1, Insightful)

    by Anonymous Coward on Wednesday May 10, 2006 @02:44PM (#15302936)
    Just consider this for a moment. You come home. I am in your house, you ask me to leave, before I leave, I tell you I was in your kitchen, in your pantry, in your medicine cabinet, in your wifes bedroom, in your childrens bedroom. I swam in your pool, and played with your dog.

    I tell you I didnt do anything, I was just looking arround. It is not a crime, the door was open, and I did not damage anything. How are you going to feel the next time you go in the fridge to gran some food ? Or go gran a tylenol out of the cabient for your kid with a fever ?

    Do you think you would feel okay with that ?

    If you can honestly say you would have no problem with that, then you are a better man than I.
  • Re:Nice Try (Score:3, Insightful)

    by plague3106 ( 71849 ) on Wednesday May 10, 2006 @02:46PM (#15302953)
    Why not ship him off to Russia to face their computer laws? Its not pick and choose... he broke into a US military computer, he needs to face US law. It was not the UK that was harmed by his actions, it was the US.
  • Re:Nice Try (Score:3, Insightful)

    by Fulcrum of Evil ( 560260 ) on Wednesday May 10, 2006 @02:55PM (#15303036)

    So if you steal a CD from walmart it's not actually stealing? I think there's a flaw in that train of thought.

    Don't be a dumbass. Theft of a physical object is stealing. Copying a CD is not.

    If you don't own the work in the first place, then it's copyright infringement AND stealing.

    Cite please. It's one or the other, but not both.

  • Re:Nice Try (Score:1, Insightful)

    by Anonymous Coward on Wednesday May 10, 2006 @03:01PM (#15303082)
    Typical nerd argument that is technocratic that they completely ignore any form of common sense. Unfortuantely for you, life doesn't work work like your D&D game.

    http://www.blah.com/ [blah.com]
      is obviously different than
    \\ufos.blah.mil\C$
  • Open door analogy (Score:5, Insightful)

    by chihowa ( 366380 ) on Wednesday May 10, 2006 @03:05PM (#15303114)
    As you've said, the open door analogy isn't the best here, but it can be improved a little bit. A publicly accessible computer system on the internet is similar to a unlocked door in a business district. If it doesn't say 'Employees Only' or isn't locked (compare to requiring a password or announcing that permission to access is restricted), then you won't be charged with tresspassing for opening the door and checking out what's inside. Of course you can't take (or break) anything, but you can't do that in any 'open to the public' place either.
  • Re:Nice Try (Score:2, Insightful)

    by plague3106 ( 71849 ) on Wednesday May 10, 2006 @03:10PM (#15303160)
    I think there'd be an argument taht a site which doesn't prompt for credentials is implicitly granting access, while a prompt for credentials even if they password is blank would indicate that only authorized users may access.
  • by DragonWriter ( 970822 ) on Wednesday May 10, 2006 @03:13PM (#15303187)
    Why should he be tried in a country where the crime did not take place?
    The locus of the crime is somewhat debatable. It may be a matter of legal construction that the crime, if any, took place where the server was located. But its just as viable to say that the crime, if any, took place where the alleged criminal was located when he allegedly committed the crime, which, best as I know, was the United Kingdom.
  • Re:Nice Try (Score:5, Insightful)

    by Schraegstrichpunkt ( 931443 ) on Wednesday May 10, 2006 @03:14PM (#15303193) Homepage
    Replace "home" with "store" or other place of business. Homes are treated specially under the law (at least in some jurisdictions) precisely because they are special. Computers providing services on a public network are hardly akin to private dwellings.

    What I'd like to know is, with all this talk about "security" and "9/11" and crap, why is it that the military can be -- even arguably -- accidentally cracked? What if the alleged "hacker" wasn't from a friendly country?

    I don't care how good this "hacker" guy was. Yes, perhaps he should be punished, but if he was able to get at systems that are critical to national security at all, regardless of the means he used, then clearly someone in the military isn't doing his job. I think the people in charge in the military, who have a duty (unlike this UK civilian) to safeguard the American public, should be punished more severely.

  • by Jim_Callahan ( 831353 ) on Wednesday May 10, 2006 @03:16PM (#15303211)
    As someone else in the thread has noted, a lot of the US extradition treaties are one-way (i.e. extradition in the other guy-> US direction was traded for something other than the reciprocal right). This means that the US can demand extradition of a lot of foreign citizens while those people's countries can't do the same to us. This isn't our fault necessarily, it's what both parties agreed to whenever the treaty was signed.

    Also, extradition generally has to be approved by the country doing the booting, so it's hardly a level of bullying beyone the normal bullying associated with any form of politics. There are doubtless times when countries denied the US the right to prosecute their citizens: in this case, they didn't, because they agree that the man is a criminal and know that nothing worse would happen to him under U.S. law than under their own law.
  • Re:Onion (Score:3, Insightful)

    by shis-ka-bob ( 595298 ) on Wednesday May 10, 2006 @03:44PM (#15303460)
    This does feel other-worldly to me. You would think that the US would be too embarassed to admit that 'the British loon looking for UFOs' was able to break into a 'valuable' system that lacked passwords. The real prosecution should be of the people in charge of security here in the US. After all, there are people that are actually trying to do harm to the US, its military and its information systems. If the loon looking for aliens can break in, why do we think that a real enemy of the state could not. This has the air of a Monty Python sketch - something where a Scotish seperatist in a kilt keeps showing up in a top secret facility as the security officer assures the Prime Minister that he needn't worry about Nazi spies. The crime isn't that a loon is looking for aliens, it is that supposidly serious people cannot even keep the loon out.
  • by bigtallmofo ( 695287 ) on Wednesday May 10, 2006 @04:09PM (#15303666)
    I suppose you obtained permission from every contributor (read: copyright holder) on slashdot.org before you broke into port 80 and pirated all of this text and graphics to your computer, correct?

    Give me a break. This guy spent at least a year (2/01 to 3/02) hacking into U.S. Government computer systems, he's 40 years old, and he's more than competent with computers. He knew exactly what he's doing, and he knows what he's doing when he obfuscates the issue by saying that he logged into systems that didn't have a password. It's ridiculous to assume from his flippant answer that all of the thousands of systems he hacked into had no passwords. Keep in mind by his own admission he was scouring file systems for evidence of UFOs. How many file systems do you know don't require any authentication whatsoever?

    before you broke into port 80 and pirated all of this text and graphics to your computer

    Talk about horrible, totally irrelevant, and not remotely applicable analogies. Anyone with half a brain and even moderate computer skills knows that using a web browser to access unprotected content is one thing. Telnetting into a machine, password or no, is a completely different matter.

    Finally, I have no idea why it's popular to defend people with no life that are amused by causing damage to systems they don't own and know they shouldn't be accessing.
  • Re:Nice Try (Score:3, Insightful)

    by Opportunist ( 166417 ) on Wednesday May 10, 2006 @04:13PM (#15303700)
    Copyright infringement lacks one very important part of stealing. The part where you deprive the rightful owner of the stolen good or its use.

    When you go into Walmart and pick up a CD without the intent to hand Walmart the required compensation, you deprive Walmart of the ability to sell that CD to someone. When you download music, most likely even not from the manufacturer but someone else who, in turn, also does not necessarily have the required rights to offer you this item, how do you take away the manufacturer's ability to sell that music?
  • Re:Disclaimer (Score:2, Insightful)

    by bl00d6789 ( 714958 ) on Wednesday May 10, 2006 @04:19PM (#15303742)
    I would think that, for the security-conscious system admin, "posting a notice warning against unauthorized access" would probably have been second on the list. Right after setting a fricking password.

    If they didn't take the time to password protect the server, I don't think it's safe to assume they did anything else at all to indicate that authorization was needed to access the machine.
  • by Ihlosi ( 895663 ) on Wednesday May 10, 2006 @04:24PM (#15303767)
    ... should consider itself a vassal.
  • by 0olong ( 876791 ) on Wednesday May 10, 2006 @04:27PM (#15303799)
    Anyone with half a brain and even moderate computer skills knows that using a web browser to access unprotected content is one thing. Telnetting into a machine, password or no, is a completely different matter.

    Assuming you're one of those with one half of a brain, can you explain to me how those two actions are a completely different matter in the court of law?
  • Re:Nice Try (Score:3, Insightful)

    by Khyber ( 864651 ) <techkitsune@gmail.com> on Wednesday May 10, 2006 @04:36PM (#15303863) Homepage Journal
    Yes, I want to know what the fuck our DEFENSE NETWORKS are doing CONNECTED TO THE FUCKING INTERNET in the first place.
  • Good metaphor (Score:2, Insightful)

    by SheeEttin ( 899897 ) <{moc.liamg} {ta} {nitteeehs}> on Wednesday May 10, 2006 @05:00PM (#15304064) Homepage
    So, it seems we have a problem with a good metaphor.
    People have used a house with its door unlocked--not really.
    A mall with an unlocked door marked "No admittance"--not quite.

    A better analogy would be a hall (in a mall), with an unlocked, unmarked door.

    Now, there are public places on the sites he "hacked", I'm sure. This would be equivalent to the store-containing areas of the mall. There are also places that require passwords. Now, the private places are equivalent to a hall full of locked, unmarked doors. Now say one of the doors is unlocked. Gary has been going down this hall, trying all the doors (he knows the mall is hiding all the "good stuff"--interpret at will), and finds one unlocked. He goes in, of course.

    Now, the question is, when did this become illegal? In my opinion, when he went through the door. It was unmarked, so it could be assumed that it was public. But he had tried nearby identical doors, and found them locked. This adds to the assumption that he knew he was trespassing.

    DISCLAIMER: I am not a lawyer.
  • Re:Nice Try (Score:5, Insightful)

    by rwven ( 663186 ) on Wednesday May 10, 2006 @05:20PM (#15304207)
    Per answers.com dictionary:

    Stealing: The act of taking feloniously the personal property of another without his consent and knowledge; theft; larceny.
    http://www.answers.com/stealing [answers.com]

    Steal: To take (the property of another) without right or permission.
    http://www.answers.com/steal [answers.com]

    I'm sorry but I see nothing about deprivation. You're welcome to look at the other definitions at those links and you'll see the same.

    If you get your car worked on and then drive off without paying...that's stealing. You didn't actually take a physical object from that person though.
  • by hyfe ( 641811 ) on Wednesday May 10, 2006 @05:45PM (#15304377)
    This means that the US can demand extradition of a lot of foreign citizens while those people's countries can't do the same to us. This isn't our fault necessarily, it's what both parties agreed to whenever the treaty was signed.

    Come again? Whose fault is it then?

    I know the one-way extradition treaty you have with Norway is bugging the hell out of us, BUT IF WE GO AGAINST YOUR BLOODY ADMINISTRATION IN ***ANYTHING*** WE'LL LOOSE ***ALL*** SUPPORT FROM YOU RIGHT AWAY SO WE'RE PRETTY MUCH STUCK WITH WHATEVER YOU WANT. (Apologies for caps)

    You see, Norway is pretty dependant on the US on three things, trade, military protection/co-operation (we've got a lot of oil-platforms, and you've got one hell of a navy) and most importantly diplomatic support in the on-going trade-war against Russia over oil-supplies in the barentsea. (Russia doesn't recogognize the evenly split naval-terrority border; and have been busily stealing our fish for some time, and are looking hungrily at our oilsupplies there). It's easy for you to say 'grow a backbone', but actions that are completly inconsequental for the US can potentially totally fuck over us. We have backbones enough, they're just crushed way to easily :/

    At the moment, if Saudi-Arabia, Venezuela, Russia ++ decided to oil-embargo the US, and Norway had a vote to decide if we wanted to join, I would actually vote *FOR IT*. The more I learn about politics and recent norwegian relations with the US the sicker I get of it.

  • Comment removed (Score:4, Insightful)

    by account_deleted ( 4530225 ) on Wednesday May 10, 2006 @06:54PM (#15304785)
    Comment removed based on user account deletion

Make sure your code does nothing gracefully.

Working...