Cybercrimes

Peer-to-Peer Sharing and Child Pornography Crimes

Matthew White admits he was surfing the Internet looking for a “Girls Gone Wild” video – a perfectly legal act – when he happened upon a file using the peer-to-peer network Limewire.com.  The file was child pornography.  White did not intend to download it, and immediately deleted the file.  He went on with his life.…

Read More

Is Brian Leiter guilty of cyber-stalking?

Paul Campos, a professor at the University of Colorado, raised the issue of whether Brian Leiter has been cyber-stalking critics on Lawyers, Guns & Money earlier this week. A little back story: Brian Leiter is a professor at the University of Chicago. He is wont to hurl insults, for instance by calling critics or people…

Read More

Technology, the Fourth Amendment, and the Drug War

The United States Supreme Court’s jurisprudence on the Fourth Amendment is hopelessly naive, incoherent, and stupefying. Chalk that up to the Drug War, which for forty years has been a tool by both drug warriors and government officials to expand the government’s power to conduct searches. Let’s take one example: Kyllo v. US, 533 US…

Read More

Peer to Peer Software, LimeWire, and the Threat of Criminal Prosecution

The threat of criminal prosecution is very real in North Carolina, particularly if people use peer-to-peer based file sharing software and either intentionally or even inadvertently download pornography that includes child pornography. While few Raleigh criminal lawyers are familiar with the way this software works, it is important that any lawyer you hire be familiar…

Read More

What if Your Cell Phone Logged all of your Data?

What if everything you pressed on a cell phone was secretly recorded and logged on your cell phone, and saved to a log file that could later be accessed by anyone with access to the phone? Scary? YES! Turns out that some computer experts have discovered secret software on many Android phones called Carrier IQ…

Read More

Child Pornography: Throwing Away the Key

When asked about their thoughts on child pornography, most people have this reaction: “Lock ’em up and throw away the key.” This is just as true in North Carolina – maybe even more so. The best evidence from studies, surveys, and research, indicates that even people who view child pornography almost never actually participate in…

Read More

What is a Hash?

A hash is a string of data – series of letters and numbers in a row – that is unique to a set of a data given a specific hash function. While hashing may be used for may different purposes, in computer forensic work, a seized computer or harddisk or flash drive is usually hashed…

Read More

Forensic Analysis and Computer Crimes

I recommend this short article Digital Smoke (pdf) by Al Lewis of Paradigm Solutions. Mr. Lewis has accurately characterized the problems facing not only police agencies, but also users (and defendants), and lawyers as they deal with allegations of computer crimes or internet crimes. About the user, Mr. Lewis writes: Today?s computer users can be…

Read More

Computer Forensics in the Courtroom

After more than eight weeks in trial, and more than two years in preparation for trial, Cary computer engineer Brad Cooper was found guilty of first degree murder in the death of his wife Nancy Cooper. Many in Raleigh and the Research Triangle were captivated by the salacious details – marital infidelity, rumors, and gossip…

Read More