‘Felony murder law does not require that a defendant pull the trigger'… is attracting attention across the tech world. Analysts, enthusiasts, and industry observers are watching closely to see how this story develops.
This update adds another signal to a fast-moving sector where product decisions, platform changes, and competition can quickly shape the market.
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.
Get full access to premium articles, exclusive features and a growing list of member rewards.
If a ransomware actor targets a hospital, and the attack results in a patient dying, the hacker should be charged with felony murder. This is what Cynthia Kaiser, former deputy assistant director of the FBI’s cyber division, urged the US Justice Department to consider, just recently.
In testimony before a US House of Representatives subcommittee hearing, Kaiser explained that ransomware attackers are causing deaths, citing University of Minnesota research documenting at least 47 deaths attributable to hospital ransomware attacks between 2016 and 2021. She added that the number is “almost certainly in the hundreds today”.

She also stressed that healthcare is now the number one ransomware target, claiming that attacks against hospitals nearly doubled from 238 in 2024, to 460 in 2025. Kaiser says this is a deliberate calculation, since attackers know when lives are on the line, hospitals are more likely to pay.
“Felony murder law does not require that a defendant pull a trigger, only that they commit a dangerous felony that results in death,” she said during the hearing, urging the DOJ to pursue homicide charges using existing felony murder law.
She also said that terrorism designations should be explored, as well. Kaiser urged that the Department of State, Justice, and Treasury formally evaluate whether existing terrorism statutes apply to ransomware actors who knowingly and repeatedly target hospitals, which would unlock sanctions, travel restrictions, and diplomatic consequences.
“I worked on these issues for years at the FBI and we need to step up even more,” she said. “They need additional authorities and resources to be able to [do so].”
Some ransomware actors have deliberately avoided hospitals and critical infrastructure organizations – not because they were too difficult to target, but because they immediately attract the attention of the FBI and other law enforcement agencies. In fact, some ransomware groups publicly terminated partnerships with affiliates who would use their encryptors against hospitals.
➡️ Read our full guide to the best antivirus1. Best overall:Bitdefender Total Security2. Best for families:Norton 360 with LifeLock3. Best for mobile:McAfee Mobile Security

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds.
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.
Please logout and then login again, you will then be prompted to enter your display name.
Why This Matters
This development may influence user expectations, future product strategy, and the competitive balance inside the broader technology industry.
Companies in adjacent segments often react quickly to similar moves, which is why stories like this tend to matter beyond a single announcement.
Looking Ahead
The full impact will become clearer over time, but the story already highlights how quickly the modern tech landscape can evolve.
Observers will continue tracking the next steps and how they affect products, users, and the wider market.