Feeds

Legal experts wary of MySpace hacking charges

'We are all felons if this flies'

The essential guide to IT transformation

On October 16, 2006, 13-year-old Megan Meier fled from her family's computer, distraught over the cutting comments of her supposed "friends" on MySpace. Twenty minutes later, the troubled teen was dead; she had hung herself in her closet.

The story, widely reported, garnered the girl's family widespread sympathy on the Internet. The twist that Lori Drew, a 47-year-old neighbor and mother of a former friend of Megan's, had allegedly created the fake persona of a 16-year-old boy to befriend and later torment the girl brought outrage. Yet, state investigators could not find a law under which Drew could be charged.

More than a year and a half later, federal prosecutors finally have their case. On Thursday, the US Attorney for the Central District of California announced that Lori Drew, now 49 years old, was indicted on conspiracy and hacking charges. The indictment charges Drew, a resident of O'Fallon, Missouri, with three counts of unauthorized access by violation of MySpace's terms of service and one count of conspiracy.

"This adult woman allegedly used the Internet to target a young teenage girl, with horrendous ramifications," US Attorney Thomas P. O' Brien said in a statement announcing the indictment. "After a thorough investigation, we have charged Ms. Drew with criminally accessing MySpace and violating rules established to protect young, vulnerable people. Any adult who uses the Internet or a social gathering website to bully or harass another person, particularly a young teenage girl, needs to realize that their actions can have serious consequences."

Yet, legal experts argue that charging a person for violating computer-crime statutes because they broke the terms-of-service agreement of an online site could lead to the ability to charge nearly anyone with computer crime. Using residential broadband for business purposes? A violation of the terms of service and, thus, potentially a crime. Checking sports sites while at work? A violation of corporate policy and, thus, potentially a crime.

"'Hard cases make bad law' is an axiom in the legal world," said Mark Rasch, managing director of enterprise-services firm FTI Consulting and a former U.S. prosecutor. "This is a case where people have seen bad conduct and have said there must be something we can do, but if prosecution of this case is successful, every pseudonym and every minor violation of the terms of service becomes a computer crime."

According to the indictment, Drew and others allegedly conspired to violate MySpace's terms of service and intentionally inflict emotional distress on Megan, identified only as MTM in the court documents. The indictment alleges that Drew obtained a MySpace account under a fictitious name, used the account to garner information from a juvenile, and used that information to torment, humiliate and harass that member -- all violations of the social-networking site's terms of service.

While the US Attorney's office refused interview requests, a spokesperson said that the harm done to Megan is key to the case. Known as a "tortious act," the legal argument is generally the basis for civil lawsuits, but can be used as the basis of criminal prosecution. In this case, the tortious act elevates the unauthorized access charges from misdemeanors to felonies, FTI's Rasch said.

The essential guide to IT transformation

More from The Register

next story
GCHQ protesters stick it to British spooks ... by drinking urine
Activists told NOT to snap pics of staff at the concrete doughnut
Britain's housing crisis: What are we going to do about it?
Rent control: Better than bombs at destroying housing
What do you mean, I have to POST a PHYSICAL CHEQUE to get my gun licence?
Stop bitching about firearms fees - we need computerisation
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
Redmond resists order to hand over overseas email
Court wanted peek as related to US investigation
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.