Recent content by law123123123

  1. L

    Computer Crimes, Hacking How do you prove invasion of privacy (by cell phone hacking)?

    Okay, then that probably narrows it down to family members, former classmates, and former co-workers. The only proof of the hacking is in the similarities between the victim's internet activities and subsequent statements by people who know the victim (Those people fall into the categories of...
  2. L

    Computer Crimes, Hacking How do you prove invasion of privacy (by cell phone hacking)?

    Okay, thanks, army judge. It's helpful to have those additional details on who the involved parties would likely be. If the stalker is having a psychotic break or is having a delusion about the victim, then I suppose that it is only a matter of time before they come forward to state what their...
  3. L

    Computer Crimes, Hacking How do you prove invasion of privacy (by cell phone hacking)?

    Thanks, army judge, for going through all of those options in such detail. It is helpful! Based on what you're saying, it seems like the victim either has a very persistent stalker or that she has been suspected of some sort of espionage. As far as a possible espionage case, the victim did...
  4. L

    Computer Crimes, Hacking How do you prove invasion of privacy (by cell phone hacking)?

    Thank you, army judge. The victim is not a criminal defendant in a federal or state case. They suspect that this is just malicious. The fact that it has been going on for more than a year now seems to suggest that it is not law enforcement acting legally (i.e., in the process of building an...
Back
Top