Hacker News new | past | comments | ask | show | jobs | submit login

> breaking into a house is a violation of physical safety and comfort

There is an interpretation of your above words that the occupants are unsafe because of what the intruder could do even it doesn't happen.

That is analogous to the argument that the privacy and integrity of the data stored in that computer were unsafe, because of "who knows what this teenager might have done".

> One's home is one's sanctuary, and an invasion is quite frightening.

Whereas, say, an invasion of your e-mail, social networking, bank account, credit card, or medical or government file or whatever else just something you can brush off and move on with your life.




Hmm, on further thought, my intuition is that the severity of the crime actually depends on being caught in the act, versus caught after the prank.

Situation one: Imagine the students break into the teachers house to pull some prank while the teacher is sleeping. The teacher gets terrified, calls the cop, and the students get caught.

Situation two: the students wait until they know nobody is home, then break into the teachers house and pull some prank, like leaving a naught blow-up doll on the couch. Later someone tattles and they find out which students did it.

Situation one, you are more likely to have to treat the crime like felony burglary, since they caused trauma, and for all you know the claim of it being a prank is just an after the fact excuse. If you let them use that excuse, then any burglar could use that excuse.

Situation two, you treat them leniently, since obviously if they intended to do real harm, they would not have left a call sign, and they would have actually stolen something. So you know there was no malicious intent, so you do not need to treat them like felons.

It's the same with the computer. If the teacher walked in on the students using the computer, you would have to treat it a lot more seriously, because you would have to assume maliciousness. But once the prank is pulled, then you treat it more leniently, since if they were truly malicious they would have stole the information without leaving any footprints.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: