On Wed, 17 Aug 2016 12:14:49 -0700 "Ronald F. Guilmette" <rfg@tristatelogic.com> wrote:
On Wed, 17 Aug 2016 03:31:49 -0700 "Ronald F. Guilmette" <rfg@tristatelogic.com> wrote:
I've made three simple points, none of which should really be all that difficult to understand. These three points are as follows: 1) In practice, law enforcement *can't* deal with these things. They don't have the resources or, in general, the technical competence to even understand them. (See link below.) They can, and they do. an example from two emails ago: http://www.pcworld.com/article/174651/article.html No. I really can't fathom how you managed to so throughly mis-read that
ox <andre@ox.co.za> wrote: article.
When one reads anything of a few hundred words it is easy to find contradictions, different interpretations and to find what you are looking for, in order to prove almost anything :) It is my choice not to be judging investigative abilities from an article, or drawing conclusions of competence from an article. The simple salient facts however are probably as I said they were: Law enforcement can and do deal/investigate Internet crime; they have at least some resources and technical competence as they did in fact "find" RIPE etc etc... Nothing more, nothing less. =================== Definition of abuse: =================== "The non sanctioned use of a resource to infringe upon the usage rights of another resource" ---------------------------------------------------------------------------------------------------- All points seem resolved, except (3) (3) causing damage to others ( Dave Crocker - "and to actions that inflict damage on others" ) ( Michele Neylon - I like the idea of “damage” or “harm” on others The “infringe on usage .. “ thing didn’t seem very clear to me and I don’t see how that would apply to spam etc) (Andre - damage is a result of an action or result of abuse? crime?) Reading the definition again, the word 'infringe' means: act so as to limit or undermine (something); So damage is implied? The same with spam - When you tie up my network, servers, etc with rubbish emails you are also "infringing" on my use of my resources So, If you do not agree with the final definition, please contribute? Andre