view the rest of the comments
politics
Welcome to the discussion of US Politics!
Rules:
- Post only links to articles, Title must fairly describe link contents. If your title differs from the site’s, it should only be to add context or be more descriptive. Do not post entire articles in the body or in the comments.
Links must be to the original source, not an aggregator like Google Amp, MSN, or Yahoo.
Example:
- Articles must be relevant to politics. Links must be to quality and original content. Articles should be worth reading. Clickbait, stub articles, and rehosted or stolen content are not allowed. Check your source for Reliability and Bias here.
- Be civil, No violations of TOS. It’s OK to say the subject of an article is behaving like a (pejorative, pejorative). It’s NOT OK to say another USER is (pejorative). Strong language is fine, just not directed at other members. Engage in good-faith and with respect! This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban.
- No memes, trolling, or low-effort comments. Reposts, misinformation, off-topic, trolling, or offensive. Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.
- Vote based on comment quality, not agreement. This community aims to foster discussion; please reward people for putting effort into articulating their viewpoint, even if you disagree with it.
- No hate speech, slurs, celebrating death, advocating violence, or abusive language. This will result in a ban. Usernames containing racist, or inappropriate slurs will be banned without warning
We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.
All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.
That's all the rules!
Civic Links
• Congressional Awards Program
• Library of Congress Legislative Resources
• U.S. House of Representatives
Partnered Communities:
• News
I wonder what the actual legal disposition of the laptop is. Was it truly abandoned or was it a "don't return it to the customer; say we're still working on it" thing? How did Rudy get possession of the laptop, and once he logged into it did the laptop did he access anything like email or cloud services (and if so, how is that not illegal access to someone else's data)? Rudy and his lawyer have much to answer for. Dis gon' be guuud.
Legally the laptop would belong to John Paul Mac Isaac per Delaware's Abandoned Personal Property laws (25 Del. C. § 4001). He would have a right to ownership of the laptop. That said, the data contents of the laptop should have been wiped (that's customary, not a legal requirement) before the transferring of ownership.
All of that said, 18 USC § 1030 covers the data that is hidden behind a Windows login. Yes you can boot up a system with an unencrypted drive and read the contents of it, but that's circumventing. Now where this and everything else differs, is that in a lot of prior cases a warrant was obtained to gain discovery of the information. In this case, Giuliani just circumvented the login, and post facto indicated evidentiary data.
It's a good question to bring before the courts. Can someone circumvent a protection, find incriminating data, and then after the fact present it to law enforcement? Because we don't have a lot that goes down this road of questioning. Kind of the reason law enforcement needs to be the one that bypasses those kinds of protections legally is because, your average person, can do things that "tamper" with evidence. And with digital data, can do so without knowing they have done so, like last access timestamps and what not.
I mean that's the central question of the suit. Which you can find as case 2:23-cv-8032 in the Central District of California. And I can't off the cuff think of a good prior that answers this. And there's parallels that can be drawn for both ways this can go. You cannot just randomly break into a house, discover illegal shit going on, and then report that (I mean you can, but you've also violated the law with your B&E) But if you reasonably suspect something is going on (like you heard a scream from the house), you can break into a house, discover illegal shit going on, and then report that (that is you haven't violated the law with your B&E in some situations).
Basically the case doesn't negate the laptop as evidence in some other case, it just implicates Giuliani into what amounts to digital breaking and entry. Which given the case, even if Giuliani was found guilty the sentence is usually a fine for first offense when the information obtained is not property of the US Government proper. So even if the courts do find Giuliani should have contacted the FBI before actually attempting to get the data, the most he would be face (if they really wanted to throw the book at him) is one year in prison AND a fine.
It is an interesting case though, we don't have laptops screaming for help to justify breaking legally protected locks on data. So, it an interesting case to see what the courts lay down as lines for "reasonable belief that an illegal activity is happening" if Giuliani decides to go down that road. But I don't hold much hope for that, they'll likely argue that the data on the laptop is theirs to begin with, which no court is going to accept that. But we'll just have to see.
Fantastic breakdown, thank you.