I originally wrote this essay in May 1999.

This time he was sentenced to 21 months in prison,followed by two years of "supervised release"during which time he was forbidden to eitherown or use any computer for his personal use.

There are three major classes of criminal activity with computers:

Experts in computer security, who are  attorneys,speak of

The online application consists of two (2) parts:

Second, Colorado also says that wedding cakes convey no message unless they have words on top. And here the couple hadn’t yet told Phillips whether they wanted words on the cake. So Phillips should lose.

Unauthorized changing of data is generally a fraudulent act.

So I began to wonder, as I taught at Yale, what leadership really consists of. My students, like you, were energetic, accomplished, smart, and often ferociously ambitious, but was that enough to make them leaders? Most of them, as much as I liked and even admired them, certainly didn’t seem to me like leaders. Does being a leader, I wondered, just mean being accomplished, being successful? Does getting straight As make you a leader? I didn’t think so. Great heart surgeons or great novelists or great shortstops may be terrific at what they do, but that doesn’t mean they’re leaders. Leadership and aptitude, leadership and achievement, leadership and even ex­cellence have to be different things, otherwise the concept of leadership has no meaning. And it seemed to me that that had to be especially true of the kind of excellence I saw in the students around me.

Unauthorized UseUnauthorized use of computers tends generally takes the following forms:

Yahoo was pinged at the rate of one gigabyte/second.

This can be particularly damaging when the disgruntled employee is thecomputer system administrator, who knows master password(s) and can enterany user's file area.

Each attack lasted between one and four hours.

The computer voyeurs, like petty criminals who peek in other people's windows,generally hack into other people's computers for the thrill of it.

The Best Argument for Jack Phillips, in Three Steps

In the 1970s and early 1980s, many of these computer voyeurs alsoused technology to make long-distance telephone calls for free,which technology also concealed their location when they were hackinginto computers.

Candidates are not successful in the PQE for numerous reasons, including the following:

That computer stored records of cancerpatients' radiation treatment.

Next week, the Supreme Court will hear one of the most important free speech cases in years, a case of special concern to libertarians and conservatives, small business-owners, artisans, and religious believers. involves , a baker who claims a First Amendment right not to be compelled to design and create custom wedding cakes for same-sex weddings. Many legal commentators think the case is either a very close call or a certain defeat for Phillips.

* Course names, numbers, and descriptions from the Los Angeles City College 06-07 Catalog

Attacking the FBI website is like poking a lion with a stick.

Forcing Phillips to custom-design and create same-sex wedding cakes is compelled speech: it forces him to create an expressive (artistic) product carrying a message he rejects. It forces certain content onto his artistic work, in a kind of . And it does so without serving the type of interest that our constitutional law would consider a legitimate (much less a compelling) justification for interfering with anyone’s free speech. So Colorado’s decision violates Phillips’s First Amendment rights.

The traditional laws were no longer adequate topunish criminals who used computer modems.

The Internet is a medium for freely sharing information and opinions.

Not only should you refuse to provide such information, but please report such requests to the management of the online service or the local police, so they can be alert to an active criminal.