Smoking-gun email reveals how Hunter Biden introduced Ukrainian businessman to VP Dad. Or is it actually a flawed report?

  • Thread starter Thread starter Cathoholic
  • Start date Start date
Status
Not open for further replies.
The man said he had tried several times to get them to come and pick it up.
And yet viewing someone else emails without a warrant or consent is a serious crime.
 
Last edited:
As a person that does Computer repair on the side, the shop owner should have discovered anything.
The computer had been abandoned.
Policy for his business is that after 90 days without pickup, the computer is considered abandoned and the business owner can do what he pleases with it.
It is not part of his job to browse emails and personal files. That is a violation of trust and a breach of privacy.
Once the computer is his, it is perfectly within his rights to explore the contents of the drive.
Were this not his PC, you would have a point about the privacy issue.
His license should be revoked.
Given there is no specific license required to work on a computer, you must mean business license.
If so…you are being extremely uncharitable to call for his unemployment and destruction of his livelihood.
There is zero excuse for this breach of privacy.
There is no expectation of privacy on a PC that has been abandoned.

If one throws a diary out a car window, and just leaves it, one should expect someone will come along and read it.
 
but since you asked;

Types of Laws That Can Be Invoked Against an Email Hacker​

Kernell’s case shows the types of crimes an email hacker may face. He was charged with four serious felony crimes:

Charges of Wire Fraud for Email Hacking​

In simple terms, wire fraud involves using a computer, radio, television, or telephone to get money or property from someone else through trickery or deception. This is prohibited by 18 U.S. Code § 1343, known as the Wire Fraud Act.

Although taking money is a common example of wire fraud, such as through various Internet scams, stealing personal and confidential information qualifies as wire fraud, too. One of the keys to wire fraud is that the emails, telephone calls, or wire transmissions have to pass between two or more states or countries.

It was claimed that Kernell used an old computer in Tennessee to hack into Palin’s email account, which presumably, was based in Alaska. Once in, he took personal information, such as email addresses and telephone numbers, and posted them online.

Charges of Computer Fraud for Email Hacking​

Computer fraud, codified by 18 U.S. Code § 1030, is similar to wire fraud, except this crime applies only to use of computers, as opposed to telephones and radios. It also requires some sort of interstate connection. However, the law applies only to computers used:
  • by or for financial institutions, like banks or the U.S. government, and
  • in such a way that the computer impacts interstate or foreign commerce or communication of the U.S.
Presumably, Palin’s connection to the federal election and Senator McCain brought the federal computer fraud law into play. Kernell was convicted of unauthorized access to a protected computer, which falls under the description of computer fraud.

Charges of Identity Theft for Email Hacking​

Identity theft is when someone uses fraud, deception, or trickery to get and use another person’s personal information. Usually, the information is used by the thief to make money, but money doesn’t have to be involved.

In Kernell’s case, once Palin selected the email address, “gov.palin@yahoo.com,” it became her own, unique address and no one else could use it. When Kernell accessed and used that email account, he gained access to personal information, such as family email addresses, family pictures, birth dates of Palin and family members, and pictures of Palin’s family members. This information was posted online as part of Kernell’s plot to derail Palin’s vice-presidential bid.

Charges of Obstruction of Justice for Email Hacking​

The crime of obstruction of justice covers many things, but it typically means interfering with some legal process or investigation. Kernell was convicted of this crime because it was claimed he tried to erase evidence of his hacking activities from his computer before federal investigators could retrieve it.
 

Additional Laws That Could Be Used Against an Email Hacker​

Someone in Kernell’s position could face other criminal charges, as well as civil lawsuits.

For example, most states have passed criminal and civil identity theft laws. In addition, in some states, like Virginia, it is an invasion of privacy to look at someone’s personal information, and this act constitutes a crime. In many states, like Maryland, accessing and telling the world about another person’s personal information is an invasion of privacy that may make the hacker liable for money damages to the victim.

Even if, as it was claimed Kernell’s case, the email hacking was a “prank,” the hacker could still be charged with less serious crimes (called misdemeanors) and face several months in jail, thousands of dollars in fines, or both.
 
Agreed. If at some point a credible reason to disbelieve in their authenticity comes along, it would be worth looking at. So far, none have been offered.
Someone out of the blue comes up with emails that purport to implicate a Presidential candidate three weeks before an election…

I think your skepticism should be set to “prove it”, not “oh yeah, tell me more”.
 
It is not personal opinion.
You are correct. It isn’t an opinion, it is a straw man.

You claim…
Once the repair is done, the repairer starts to snoop around, looking at your emails and your personal files.
But that is not true.
The repair man repaired the computer, called the customer back for pickup, and then waited 90 days for the customer to come get it.
After that period expired, the computer no longer belongs to the customer.

I do not know how his shop operates, but in my own we call people whose computers have been repaired about once every month to remind them to pay the bill and pick it up.
The 90 day windows is very generous, my shop only gives 30.
Once that time elapses, sorry…your computer becomes mine.
I likely will refurb it and sell it off to pay the initial bill.
 
Someone out of the blue comes up with emails that purport to implicate a Presidential candidate three weeks before an election…

I think your skepticism should be set to “prove it”, not “oh yeah, tell me more”.
Pornographic images of Hunter doing drugs, photos from his childhood, emails to friends who have not denied their receipt, no denial by Biden’s campaign or family, no FBI “leak” questioning authenticity,

I think it’s the apologists’ turn to give some real reason to doubt the authenticity of the laptop and its contents, since Biden hasn’t.
 
No.
Snooping refers to reading through someone else’s materials.
One cannot snoop on their own property.
The computer was abandoned. It belongs to the repairman.
Do you browse thru the computer then?
 
Do you browse thru the computer then?
Would it be wrong to browse through my own computer?
Let’s not forget the customer abandoned it.
I’ll not fault the computer repairman for that.

My own shop, we scan through the entire drive for anything personal and save it off for when / if the customer comes back crying about their lost data.
Then we hammer the drive and throw away the pieces.

But don’t forget…that is my data on my drive. And I am doing a favor to the customer in keeping it for them should they decide they want it.

And yes. I have had occasion where someone came back years later to collect data.
Turned out the computer was their son’s. The son died and the only memory they had left was whatever pictures the son had saved on his PC when he was alive.
They were incredibly thankful that I could pull the tickets, find the specific data files, and provide a copy.
 
Would it be wrong to browse through my own computer?
Let’s not forget the customer abandoned it.
In Deleware, the property would need to be abandoned for a year before it is eligible for an ownership claim.
 
The one accomplishment for which they cannot forgive him is acting in a prolife manner. Appointing Kavanaugh was, to them, an outrage because of his prolife Catholicism. Barrett is a little more difficult, but Hirono and the other Democrats did their best.

The central tenet of the Dem party is abortion. It doesn’t stand for anything else in actuality.
Totally off-topic, but hey . . .
 
Status
Not open for further replies.
Back
Top