• Basic Glitch@sh.itjust.works
    link
    fedilink
    arrow-up
    24
    ·
    edit-2
    15 hours ago

    He was accused of accessing a device issued to another who did not authorize its use, conspiracy – accessing a device issued to another who did not authorize use, theft by deception—false impression, conspiracy—theft by deception, criminal use of a communication facility, and unlawful use of a computer—access to disrupt function.

    Uhh are we sure a different agency didn’t perhaps target him for arrest bc they thought he was a spy, and then murder him while in custody? This doesn’t seem like run of the mill trumped up ice bullshit.

    Not that they wouldn’t torture and murder somebody, but this seems a bit more professional than I would expect CBP to pull off. Especially if it’s true he didn’t have any defensive marks.

    Never really thought about how easy it might be to sprinkle in a few government trained assassins in the chaos of every new batch of rushed ice recruits. Like if you had already been keeping people on a DHS watchlist for decades beforehand, this could be an easy way to detain them without drawing attention.

    An autopsy report seen by Newsweek showed Ge was found tied with a bedsheet, with linens around his wrists and ankles in what the report described as a “hog-tied” position. The medical examiner noted that there had been other reported incidents of people who had hung themselves having done something similar, and that there were no obvious defense wounds.

    Other reports of people hog tying themselves? To commit suicide?

      • Basic Glitch@sh.itjust.works
        link
        fedilink
        arrow-up
        4
        ·
        edit-2
        5 hours ago

        Apparently he allegedly admitted to having a bunch of stolen credit card numbers on his phone, but I can’t find anything about him using a stolen phone/computer

        access to disrupt function seems like a weird charge to give somebody for just having stolen credit card numbers on a phone, but I guess it would depend on how he obtained them

        “access to disrupt function” is a specific element of the criminal charge “Unlawful Use of Computer” under the Pennsylvania Crimes Code, 18 Pa. Cons. Stat. § 7611. It refers to gaining unauthorized access to a computer or network with the intent to interfere with its normal operation or the services it provides.

        • chiliedogg@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          5 hours ago

          That’s kinda a catch-all for use of someone else’s device or accessing protected data device or service.

          It sounds like an add-on charge related to accessing the CC numbers.