Re: He did however pretend to be other than who he was
Your analogy is also incorrect. Technical matters don't map properly to real-world objects.
Your analogy could just as easily be used to describe port scanning, connecting to a HTTP server and checking the Server field, or exploiting a service and then unaming. It's imprecise and it's not a fair analogy.
Also, it probably was necessary. Weev didn't act particularly cleverly, but have you ever reported a vulnerability to any vendor?
I have. Many times, I don't get a reply whatsoever from them. Twice, I've been threatened with legal action. Sometimes, the vendor has just discarded the vulnerability as "not critical/no evidence of it being used in the wild/exploit is too difficult to pull off/exploit reveals information but doesn't grant a system shell", etc.
If you want responsible disclosure, encourage responsible corporations.
Also, weev was charged with fraud and one count of accessing a computer without authorization, not "publishing private data".