Feeds

Man fights felony hacking charge for accessing wife's email

Gmail showed her having extramarital affair

The Essential Guide to IT Transformation

A Michigan appeals court is trying to decide whether the state's anti hacking law should be invoked against a man who broke into his wife's Gmail account to see if she was having an affair.

Leon Walker, 34, faces a maximum of five years in prison for using a shared family computer to read his wife's personal email after she failed to return home one night. It turns out Clara Walker was indeed involved with another man, who just happened to be her previous husband.

Attorneys for Leon Walker told judges with the Michigan Court of Appeals that the law their client was charged under was ambiguous and was never intended for domestic matters. It was passed in 1979 and was designed to prevent identity and trade secret theft. They also warned if charges go forward the law could criminalize activities such as parents monitoring their children's online activities.

Judges hearing the case, according to USA Today, didn't sound so sure.

"Your client is being charged with security intellectual property – her email, accessing her intellectual property," judge Pat Donofrio said.

The three-judge panel is expected to issue an opinion next year.

More coverage from The Detroit News is here. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
Canada's boffins need A WHOLE YEAR to recover from China hack attack
'State-sponsored actor' breached National Research Council network
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.