> If I send a standard request to a website, with no special forged auth or anything, and that website gives me back data, you can't blame the person who made the request. It is up to the website to tell me "no, you are not allowed to access that."
Many remote exploits are going to fit this description. Sometimes it's just magic parameters or misconfigured URL routes.
Your concept of computer crime requires a bit more depth than that. Intent matters, as does what you do with data on their end and on your end.
The room analogy may be reasonable. Except weev realized the room contained private company records. He proceeded to copy everything, then went home and published it in the newspaper. He wasn't really prosecuted for the entering of the room, it was that second part that did it.
Many remote exploits are going to fit this description. Sometimes it's just magic parameters or misconfigured URL routes.
Your concept of computer crime requires a bit more depth than that. Intent matters, as does what you do with data on their end and on your end.
The room analogy may be reasonable. Except weev realized the room contained private company records. He proceeded to copy everything, then went home and published it in the newspaper. He wasn't really prosecuted for the entering of the room, it was that second part that did it.