{"id":3293,"date":"2016-09-13T00:06:03","date_gmt":"2016-09-13T04:06:03","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3293"},"modified":"2016-09-13T00:06:03","modified_gmt":"2016-09-13T04:06:03","slug":"federal-judge-hacking-someones-computer-is-definitely-a-search","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/09\/13\/federal-judge-hacking-someones-computer-is-definitely-a-search\/","title":{"rendered":"Federal Judge: Hacking Someone&#8217;s Computer Is Definitely a &#8216;Search&#8217;"},"content":{"rendered":"<p>A federal judge ruled that hacking someone&#8217;s computer, for purposes of an investigation, constitutes a fourth amendment search. \u00a0Therefore, law enforcement and the FBI would require a warrant to hack and search an individuals computer for purposes of an investigation.<\/p>\n<p>This seemed obvious to me, but apparently it&#8217;s been debated in the court of law for years. \u00a0I agree in theory that individuals should have a\u00a0reasonable expectation of privacy with their IP address, but in reality, anything you do on the Internet has the potential to become public. \u00a0Regardless of whether hacking someone&#8217;s computer for an investigation requires a warrant, I&#8217;m glad they caught the people referenced in this article.<\/p>\n<p>http:\/\/motherboard.vice.com\/read\/hacking-is-a-search-according-to-federal-judge<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A federal judge ruled that hacking someone&#8217;s computer, for purposes of an investigation, constitutes a fourth amendment search. \u00a0Therefore, law enforcement and the FBI would require a warrant to hack and search an individuals computer for purposes of an investigation. This seemed obvious to me, but apparently it&#8217;s been debated in the court of law [&hellip;]<\/p>\n","protected":false},"author":11274,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[715219],"tags":[],"class_list":{"0":"post-3293","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-03-it-administrative-controls","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/11274"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3293"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3293\/revisions"}],"predecessor-version":[{"id":3294,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3293\/revisions\/3294"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}