I personally think this is beating a dead horses bones to dust and the point has been made thoroughly and clearly enough that it is by choice if it is not understood or ignored regardless of the examples used but that is again my opinion and I am not faulting others for theirs. Just to help a few others who may not understand but would like to with specific excerpts from the actual laws I am using some excerpts from the actual law statutes in question. I hope this will help in understanding that this is actually a crime and a criminal act to perpetrate it regardless of what you may think of it now.
Lets define what has been been made public and what has not been made public as being what has been intentionally shown through proper means, links, images or pages publicly index-able on a website and what has not been requiring you to intentionally gain access to an area that you are not directly or intended to view without permission or added direction that is behind a password secured entry way aka a login screen/page. Lets start with the small images which are thumbnails of the larger images intentionally reduced in size to prevent the view of exact detail but give an overview and identification of the poster that work is to or has been performed on and were indeed made public and never were the issue here. Kong was just one example of this. The larger images with full detail were however NEVER made public and to access without permission required the act of bypassing existing security regardless of the securities strength or thoroughness and the individual did knowingly exceed his authorized access to a portion of a website. I do not think this can be in question. The watermarked images from HA are public, the non watermarked images are not public through intended means and again requires accessing through a means that is not intended by the owners/developers. This is actually how the law reads and is interpreted in regards to public and not public in this instance. Altering a URL that can be altered to access an otherwise inaccessible area does not constitute being made public.
The following is strictly about hacking or actually cracking as hacking is and has been used out of context for so long most people do not bother to correct it anymore including myself.
What follows here is taken directly from United States state and or federal law statutes in which the acts discussed did occur. Most countries including Australia, Canada and Great Britain have similar laws and definitions. I did not interpret the following, they are copied excerpts from the actual law.
Legal definitions to consider when reading-"Access" means to instruct, communicate with, store data in or retrieve data from a computer, computer system or computer network.
"Computer network" means:
- a. A set of related devices connected to a computer by communications facilities;
- b. A complex of 2 or more computers, including related devices, connected by communications facilities; or
- c. The communications transmission facilities and devices used to interconnect computational equipment, along with control mechanisms associated thereto.
"Computer services" includes, but is not limited to, computer access, data processing and data storage.
"Data" means information of any kind in any form, including computer software.
Yes this includes images.The
"Internet" is a hierarchy of computer networks and systems that includes, but is not limited to, commercial (.com or .co), university (.ac or .edu) and other research networks (.org, .net) and military (.mil) networks and spans many different physical networks and systems around the world.
Definitions of the criminal act-Unauthorized access.A person is guilty of the computer crime of unauthorized access to a computer system when, knowing that the person is not authorized to do so, the person accesses or causes to be accessed any computer system without authorization or exceeds authorized access.
Theft of computer services.A person is guilty of the computer crime of theft of computer services when the person accesses or causes to be accessed or otherwise uses or causes to be used a computer system with the intent to obtain unauthorized computer services, computer software or data.
Misuse of computer system information.A person is guilty of the computer crime of misuse of computer system information when:
- (1) As a result of accessing or causing to be accessed a computer system, the person intentionally makes or causes to be made an unauthorized display, use, disclosure or copy, in any form, of data residing in, communicated by or produced by a computer system;
- (2) That person intentionally or recklessly and without authorization:
- a. Alters, deletes, tampers with, damages, destroys or takes data intended for use by a computer system, whether residing within or external to a computer system; or
- b. Interrupts or adds data to data residing within a computer system;
- (3) That person knowingly receives or retains data obtained in violation of paragraph (1) or (2) of this section; or
- (4) That person uses or discloses any data which that person knows or believes was obtained in violation of paragraph (1) or (2) of this section.
If you wish to continue to defend Mel that is great and your prerogative and a credit to your friendship and hope that we all have such friends. If the images and they are many, I only used Kong as an example were in the public view I likely never would have said a word. If the response was an actual response or even simple shot at me rather than attempt to deflect and ridicule I may have had a snippy return of my own and let it go. It was not handled as such. Is it out of hand? If someone here learns something about the crimes committed and as a result is never caught doing so because they will not do it, great and I do not think this is out of hand. If you still think it is OK to steal, that is your prerogative I will just have to make sure the valuables are locked up if you ever come over my house. Is Mel a great guy? I have no doubt he is in most respects and believe that this issue no withstanding would get along with him just fine but not on this particular one and am sorry that some people feel that it is a crusade against him. It is not. For me it is about laws that have been broken intentionally and incorrect use of the reading and intent of certain laws used to make it look OK which may make others think it is legal when it is not. Is Mel a criminal, in this particular case my personal opinion is a crime has been committed but I am not an attorney and it is for a court to decide which I am sure will not and hope for his sake never happens.