Here's an idea for deterrent- Anyone caught posting revenge porn or forwarding intimate pictures illegally will, as punishment, have pictures of them in a position, state of dress, and using one "household implement" of the victims choosing. Victim will also have the option of photoshopping in one farm animal. One such picture shall be created for each picture forwarded or posted. All such pictures shall be posted on a website created for this purpose, and shall also be prominently placed on all social media accounts the perpetrator uses for not less than 1 month.
I think the possibility of suffering the same effects as their victim would deter many criminals.
> We did not have a big budget, so we were tempted to buy the system with petty cash.
Maybe they redacted the purchase price in order to conceal the size of their petty cash budget, which this makes sound relatively large. Of course one could just look up the price of an Amiga from that time and get an approximate number anyway.
> I just spent four dollars at the convenience store
Well there's your problem. You are buying prepackaged at the premium convenience store rate. Buy normal sized amounts of whatever is on sale at the regular (inconvenience?) store and you won't pay nearly as much per serving.
So there is no fallacy. Just because someone may buy junk food that is cheaper than healthy food, does not mean that they must buy that junk food or that they have to spend their reduced budget on junk food instead of reasonably priced healthy food.
> the company claims is an "alternative" to gastric bypass surgery.
Figured out how this works- 1. Gullible/ignorant person becomes customer of Roca Labs. 2. Person consumes 'alternative' weight loss supplement. 3. Person becomes irate/displeased with performance of the 'alternative'. 4. Person legitimately complains about Roca Labs. 5. Person is sued and harassed by Roca Labs. 6. Person must spend income on lawyer fees instead of food. 7. Due to financial based malnutrition and stress from lawsuits, person becomes thinner, and no longer needs gastric bypass surgery. 8. Person discovers that the supplement has worked as intended, just not in the method they thought it would.
Any chance the picture is of the DA's sister/daughter/wife? (Assuming those are three separate people.) Or of the DA himself, or some random politician? Is this actually an attempt to punish the dumpster divers, or to punish the photographer? Be interesting to see how this turns out.
Under the patchwork of systems used throughout the various government agencies, it is entirely conceivable that her e-mail was stored on her pc (i.e. deleted from server upon download). What I haven't seen mentioned is that most, if not all, government computers are on a network backup system(general filesystem backup, not specific to e-mail). So unless she specifically excluded her e-mail files from the backup (which is bordering on premeditated murder of a file) the e-mail should still exist on the filesystem backup. So some questions this raises are:
Have they looked beyond the e-mail server for these files?
Was it her pc that they are claiming crashed?
What other files were lost is this terribly convenient crash?
After this crash, what efforts were made at recovery of the data on the server/pc?
> Just the idea that this is unauthorized access is a big problem, because it's not unauthorized.
Did the owners of the apartment authorize him to connect? If not, then it is clearly an unauthorized connection. Analogy: If I leave my hose connected in my yard, is it ok for my neighbor to drag it into their house to fill their fish tank? Almost every house has electric plugs somewhere on the outside- is it acceptable for anyone to roll up and plug in to them? Clearly not. Just because it's there doesn't mean it's there for anyone to use. These are obvious cases of unauthorized use.
Now I don't think that means a felony was committed (IANAL so I'm not sure how theft of services statutes would apply) but I don't see how you can make the claim that it was an authorized connection. Open WiFi may allow such a connection, but that is different from someone authorizing a connection.