Sunday, December 9, 2007

Juicy Anonymity

Sometimes our users say it even better than we can. Here's a reply to the post "Juicy Campus is Traceable!"...

---------------------------------------------
Uhhhh duh? Everything you do on the internet is traceable as long as you´re using private computer. This is especially true for college networks where they log who is plugged into each network outlet and have your unique network card address.
Nothing is anonymous on the internet.
The best thing a person can do on a personal computer is disguise or reroute their identity, but even that will be traceable 99.999% of the time.

If you are, however, really intent on sending your Grandma Lucy a Christmas message 100% anonymously for whatever silly reason, you would have to use an unmonitored public computer on a public connection (also making sure you did not type your plans into Google or Facebook at some point along the way).

As for the dumbass who posted the message that has garnered so much attention on CNN... he deserved what he got. Do you really think Juicy Campus is going to stand up to the police on privacy issues, compromise their web site, and defend a student like that? Pshhhhh.....

You shouldn´t have anything to worry about, unless you´ve got something to hide! :)
-------------------------------------------

If your school calls upset about some girl being called a slut, we're not handing over access to our server data. If the LAPD calls telling us there is a shooting threat, you better believe we're gonna help them...

Wednesday, November 21, 2007

Lots of Press

We've gotten a lot of press over the past few weeks. Here are some highlights!

Duke Chronicle has published four full articles about us...
  1. http://media.www.dukechronicle.com/media/storage/paper884/news/2007/11/09/Editorial/Gossip.Web.Site.Abuses.Free.Speech-3091582.shtml
  2. http://media.www.dukechronicle.com/media/storage/paper884/news/2007/11/14/Columns/Cant-Stand.The.Mild.Warmth-3100184.shtml
  3. http://media.www.dukechronicle.com/media/storage/paper884/news/2007/11/08/Columns/Juicy.Campus-3088266.shtml
  4. http://media.www.dukechronicle.com/media/storage/paper884/news/2007/11/09/News/Gossip.Web.Site.Sparks.Uproar-3091519.shtml

And LMU's paper, The Loyolan, did an article about us too!

  1. http://media.www.laloyolan.com/media/storage/paper803/news/2007/11/15/Opinion/Mmm-Juicy-3103202.shtml
We even got picked up on the US News & World Reports site!
  1. http://www.usnews.com/blogs/paper-trail/2007/11/9/duke-blog-causes-a-stir-but-its-still-no-gossip-girl.html

Cyber Crimes Laws -- North Carolina

North Carolina has a relatively broad computer crimes act, N.C. Gen. Stat. § 14-453 (1999). That section provides in part:

§ 14-455. Damaging computers, computer systems, computer networks, and resources
(a) It is unlawful to willfully and without authorization alter, damage, or destroy a computer, computer system, computer network, or any part thereof. A violation of this subsection is a Class G felony if the damage caused by the alteration, damage, or destruction is more than one thousand dollars ($1,000). Any other violation of this subsection is a Class 1 misdemeanor.

(b) This section applies to alteration, damage, or destruction effectuated by introducing, directly or indirectly, a computer program (including a self-replicating or a self-propagating computer program) into a computer, computer system, or computer network.

§ 14-456. Denial of computer services to an authorized user
(a) Any person who willfully and without authorization denies or causes the denial of computer, computer system, or computer network services to an authorized user of the computer, computer system, or computer network services is guilty of a Class 1 misdemeanor.

(b) This section also applies to denial of services effectuated by introducing, directly or indirectly, a computer program (including a self-replicating or a self-propagating computer program) into a computer, computer system, or computer network.

§ 14-457. Extortion
Any person who verbally or by a written or printed communication, maliciously threatens to commit an act described in G.S. 14-455 with the intent to extort money or any pecuniary advantage, or with the intent to compel any person to do or refrain from doing any act against his will, is guilty of a Class H felony.

Cyber Crimes Laws -- Federal

Here's what our lawyer tells us about cyber crimes at a federal level...

The main federal computer crime statute is 18 U.S.C. Section 1030. It prohibits, among other things, "knowingly caus[ing] the transmission of a program, information, code, or command, and as a result of such conduct, intentionally caus[ing] damage without authorization, to a protected computer" Web servers in interstate commerce are within the definition of "protected computer", and (to my recollection) service down-time is "damage" even if the computer is not physically damaged.

There are common law civil claims that could be brought against a hacker, such as trespass to chattels and interference with contract.

The threat to take down your site is a serious matter on its face. I would suggest you ask for the cybercrimes unit at the branch office of the FBI.