Feeds

Mother pleads not guilty in cyber-bullying suicide test case

Can giving dodgy details online be hacking?

Designing a Defense for Mobile Applications

A Missouri woman alleged to have set up a fake MySpace account to taunt a teenage girl, who later committed suicide, has pleaded not guilty to conspiracy and accessing a protected computer to obtain information used to inflict emotional distress.

The landmark Federal case against 47-year-old Lori Drew began yesterday, AP reports. Prosecutors claim she created the persona of a 16-year-old boy to flirt with and then cruelly spurn her neighbour's daughter, Megan Meier. The 13-year-old hanged herself in the wake of the rejection and a message on her MySpace profile that said "The world would be a better place without you".

According to TV news, Drew had set-up the "Josh Evans" account after her own daughter had a falling out with Megan Meier.

The prosecution of Drew has sparked a fierce debate about identity online. Authorities initially struggled to find a law she could be tried for, but public outrage over the alleged bullying was intense. Missouri prosecutors were unable to find a state law that had been violated.

Federal indictment eventually followed, based on hacking law, and alleging that Drew violated MySpace's terms of service when she invented "Josh Evans", and that it amounted to unauthorised network access.

US legal experts are worried that a succesful prosecution could criminalise anyone who posts fake information online.

Drew's trial is set to begin on 26 July. A conviction could carry 20 years jail time. ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.