SlideShare uma empresa Scribd logo
1 de 56
Legal IssuesLegal Issues
inin
Peer to PeerPeer to Peer
CasesCases
Joseph LesniakJoseph Lesniak
Law Offices of Joseph Lesniak, LLCLaw Offices of Joseph Lesniak, LLC
Delaware County, PennsylvaniaDelaware County, Pennsylvania
2
Butner Study (2009)Butner Study (2009)
 155 child pornography offenders in an 18155 child pornography offenders in an 18
month voluntary treatment program.month voluntary treatment program.
 At time of sentencing 115 (74%) had noAt time of sentencing 115 (74%) had no
documented contact offenses.documented contact offenses.
 40 (26%) had known histories of contact40 (26%) had known histories of contact
offenses.offenses.
3
Butner Study (2009)Butner Study (2009)
 The total number of victims, at sentencingThe total number of victims, at sentencing
was 75, or 1.88 victims per offender.was 75, or 1.88 victims per offender.
4
Butner Study (2009)Butner Study (2009)
 By the end of treatment 24 (15%) deniedBy the end of treatment 24 (15%) denied
contact offences and 131 subjects (85%)contact offences and 131 subjects (85%)
admitted to at least 1 hands-on offense.admitted to at least 1 hands-on offense.
An increase of 59%.An increase of 59%.
 The number of reported victims, at the endThe number of reported victims, at the end
of treatment, wasof treatment, was 1,7771,777 for an average offor an average of
13.56 victims per offender.13.56 victims per offender.
5
Butner Study (2009)Butner Study (2009)
High % of crossover:High % of crossover:
 70% had both child and adolescent victims70% had both child and adolescent victims
 Approximately 40% had both male andApproximately 40% had both male and
female victimsfemale victims
 68.7% had no prior conviction for a sex68.7% had no prior conviction for a sex
offense.offense.
 30.1% had participated in acts of30.1% had participated in acts of
bestiality.bestiality.
TOPICS WE WILL COVERTOPICS WE WILL COVER
 44thth
Amendment IssuesAmendment Issues
 Probable Cause (drafting the search warrant)Probable Cause (drafting the search warrant)
 Plain ViewPlain View
 Charging considerationsCharging considerations
 Trying a Peer to Peer CaseTrying a Peer to Peer Case
Fourth Amendment Issues inFourth Amendment Issues in
Peer to Peer CasesPeer to Peer Cases
ECPAECPA
(Electronic Communication Provider Act)(Electronic Communication Provider Act)
Title 18, Section §2701,Title 18, Section §2701, et.seq.et.seq.
 Applies to Public ISPs.Applies to Public ISPs.
 A Four-Tiered Approach to Privacy Issues.A Four-Tiered Approach to Privacy Issues.
 The More Private the Info Sought - TheThe More Private the Info Sought - The
More Process Required.More Process Required.
The Four TiersThe Four Tiers
 Customer Information - SubpoenaCustomer Information - Subpoena
 Transactional Information - § 2703(d)Transactional Information - § 2703(d)
OrderOrder
 Content - Search WarrantContent - Search Warrant
 Real-Time Interception - Title III WiretapReal-Time Interception - Title III Wiretap
Use of Subpoena/ Court OrderUse of Subpoena/ Court Order
in a P2P Investigationin a P2P Investigation
 Once you obtain IP Address of targetOnce you obtain IP Address of target
computer what then?computer what then?
 Determine which ISP was assigned the IPDetermine which ISP was assigned the IP
address .address .
 Subpoena/ Court Order to the ISP forSubpoena/ Court Order to the ISP for
information relating to the account assignedinformation relating to the account assigned
IP address on specific date at specific time.IP address on specific date at specific time.
 Make sure that customer will not be notified ofMake sure that customer will not be notified of
your subpoena by requestingyour subpoena by requesting 90 day non-90 day non-
disclosure - - Supervisor statementdisclosure - - Supervisor statement
ECPAECPA
“Customer Information”“Customer Information”
(Subpoena/ Court Order)(Subpoena/ Court Order)
1) name;1) name;
2) address;2) address;
3) records of session times and3) records of session times and
durations;durations;
4) Other IP addresses assigned; and4) Other IP addresses assigned; and
5) length of service (including start5) length of service (including start
date) and types of service utilized.date) and types of service utilized.
Expectation of Privacy inExpectation of Privacy in
P2P CasesP2P Cases
U.S. v. BorowyU.S. v. Borowy, 595 F.3d 1045 (9, 595 F.3d 1045 (9thth
Cir. 2010)Cir. 2010)
Defendant claimed he attempted to turn off theDefendant claimed he attempted to turn off the
share function of Limewire, thus he argued he hadshare function of Limewire, thus he argued he had
expectation of privacy in contents of share folder.expectation of privacy in contents of share folder.
Expectation of Privacy inExpectation of Privacy in
P2P CasesP2P Cases
U.S. v. BorowyU.S. v. Borowy, 595 F.3d 1045 (9, 595 F.3d 1045 (9thth
Cir. 2010)Cir. 2010)
““Borowy’s subjective intention not to share his filesBorowy’s subjective intention not to share his files
did not create an objectively reasonabledid not create an objectively reasonable
expectation of privacy [in the contents of sharedexpectation of privacy [in the contents of shared
folder].”folder].”
 Downloading from share folder on target computerDownloading from share folder on target computer
files with names suggestive of child pornographyfiles with names suggestive of child pornography
does not violate 4does not violate 4thth
Amendment.Amendment.
Expectation of Privacy inExpectation of Privacy in
P2P CasesP2P Cases
U.S. v. BorowyU.S. v. Borowy, 595 F.3d 1045 (9, 595 F.3d 1045 (9thth
Cir. 2010)Cir. 2010)
Downloading from share folder on target computerDownloading from share folder on target computer
files with names suggestive of child pornographyfiles with names suggestive of child pornography
does not violate 4does not violate 4thth
Amendment.Amendment.
Search Warrants in P2P CasesSearch Warrants in P2P Cases
 Computer search warrants present uniqueComputer search warrants present unique
problems.problems.
 Amount of material that may be stored onAmount of material that may be stored on
computer is enormous.computer is enormous.
 Highly technical information needs to beHighly technical information needs to be
drafted into the warrant in andrafted into the warrant in an
understandable fashion.understandable fashion.
 Problems such as scope of warrant,Problems such as scope of warrant,
staleness, and how the data will bestaleness, and how the data will be
analyzed need to be considered.analyzed need to be considered.
Drafting the Search WarrantDrafting the Search Warrant
 Things to consider:Things to consider:
 Is sufficientIs sufficient backgroundbackground information in theinformation in the
affidavit in support of search warrant?affidavit in support of search warrant?
 Does affidavit contain facts constitutingDoes affidavit contain facts constituting
probable causeprobable cause??
 Does the affidavit discussDoes the affidavit discuss searchsearch
methodology?methodology?
 Is the warrantIs the warrant particular enoughparticular enough in describingin describing
items to be seized yet broad enough to coveritems to be seized yet broad enough to cover
important evidentiary items you will want toimportant evidentiary items you will want to
seize?seize?
BackgroundBackground
 Affiant’s training and experience.Affiant’s training and experience.
 Statutory violations that may have beenStatutory violations that may have been
violated.violated.
 Remember the target at this point isRemember the target at this point is
computer and storage media – not acomputer and storage media – not a
person.person.
 Background information to educate theBackground information to educate the
judge:judge:
 Definitions if necessary.Definitions if necessary.
 Description of how peer to peer file sharing works.Description of how peer to peer file sharing works.
 Overview of investigative techniques used in P2POverview of investigative techniques used in P2P
cases.cases.
Probable CauseProbable Cause
 P/C to believe that evidence, fruits, orP/C to believe that evidence, fruits, or
contraband can be found on each computercontraband can be found on each computer
and/or storage media at location.and/or storage media at location.
 In P2P case describe file list obtained in browse.In P2P case describe file list obtained in browse.
 Describe with specificity images of childDescribe with specificity images of child
pornography that may be on computer –pornography that may be on computer –
 Describe diminutive stature, lack of breast/pubic hairDescribe diminutive stature, lack of breast/pubic hair
development, say if prepubescent.development, say if prepubescent.
 Affiant may approximate age; okay to say childAffiant may approximate age; okay to say child
“appeared” to affiant to be under 18 or 10 or 5 yoa.“appeared” to affiant to be under 18 or 10 or 5 yoa.
 How are actors clothed? Or lack thereof.How are actors clothed? Or lack thereof.
 Describe sexual activityDescribe sexual activity
Probable CauseProbable Cause
 Search warrant drafting 101:Search warrant drafting 101:
 Who, what, when, where, why, and how.Who, what, when, where, why, and how.
 Make sure that you understand theMake sure that you understand the
background portion of the warrant and thatbackground portion of the warrant and that
you reference it as necessary in P/C portionyou reference it as necessary in P/C portion
of S/W.of S/W.
 Don’t overlook details like signatures,Don’t overlook details like signatures,
accurate description of place to be searchedaccurate description of place to be searched
etc.etc.
Probable CauseProbable Cause
State v. NussState v. Nuss, 2010 WL 1405245 (Neb., 2010 WL 1405245 (Neb.
2010)2010)
P2P case.P2P case.
Affidavit related that 20 files downloaded fromAffidavit related that 20 files downloaded from
target computer “appeared to be childtarget computer “appeared to be child
pornography.”pornography.”
Probable CauseProbable Cause
State v. NussState v. Nuss, 2010 WL 1405245 (Neb., 2010 WL 1405245 (Neb.
2010).2010).
Nebraska Supreme Court ruled that warrantNebraska Supreme Court ruled that warrant
did not use or even refer to the statutorydid not use or even refer to the statutory
definitions of sexually explicit conduct indefinitions of sexually explicit conduct in
describing the images.describing the images.
Used terms: “appear to be child pornography”Used terms: “appear to be child pornography”
“…“…consistent with child pornography”consistent with child pornography”
Probable CauseProbable Cause
U.S. v. Henderson,U.S. v. Henderson, 595 F.3d 1198 (10595 F.3d 1198 (10thth
Cir. 2010).Cir. 2010).
P2P search warrant.P2P search warrant.
Be sure to include every critical investigativeBe sure to include every critical investigative
step.step.
who, what, where, when, why and how.who, what, where, when, why and how.
Probable CauseProbable Cause
U.S. v. Henderson,U.S. v. Henderson, 595 F.3d 1198 (10595 F.3d 1198 (10thth
Cir. 2010).Cir. 2010).
Affidavit “failed to identify how [agent whoAffidavit “failed to identify how [agent who
applied for search warrant]’s source [agentapplied for search warrant]’s source [agent
who sent P2P lead] determined that computerwho sent P2P lead] determined that computer
with relevant IP address – rather than somewith relevant IP address – rather than some
other computer – shared child pornographyother computer – shared child pornography
videos.”videos.”
Probable Cause – Do We NeedProbable Cause – Do We Need
a Download?a Download?
 U.S. v. Miknevich, 638 F.3d 178, (3U.S. v. Miknevich, 638 F.3d 178, (3rdrd
Cir.Cir.
2011)2011)
 State warrant. No download and vagueState warrant. No download and vague
description of files that were viewed as adescription of files that were viewed as a
result of browse. However, based uponresult of browse. However, based upon
statement of affiant that he knew the filestatement of affiant that he knew the file
contained child porn based the SHA1 value ofcontained child porn based the SHA1 value of
the file and the file name itself the court foundthe file and the file name itself the court found
sufficient P/C to uphold the warrant.sufficient P/C to uphold the warrant.
Probable Cause – OvercomingProbable Cause – Overcoming
StalenessStaleness
 Characteristics of Persons SexuallyCharacteristics of Persons Sexually
Interested in ChildrenInterested in Children
 U.S. v. GourdeU.S. v. Gourde, 430 F.3d 1065 (9, 430 F.3d 1065 (9thth
Cir. 2006)Cir. 2006)
(affidavit said collectors store pics on computer).(affidavit said collectors store pics on computer).
 U.S. v. AbrahamU.S. v. Abraham, 2006 WL 1344303 (W.D. Pa.), 2006 WL 1344303 (W.D. Pa.)
(affidavit said collectors keep pics for long time).(affidavit said collectors keep pics for long time).
E.g., “I am aware that persons who collect childE.g., “I am aware that persons who collect child
pornography cherish their collections and tend topornography cherish their collections and tend to
retain their collections for very long periods of time,retain their collections for very long periods of time,
often for years.”often for years.” BUTBUT, especially in the 9, especially in the 9thth
Circuit,Circuit,
make sure you say why your target is a collector.make sure you say why your target is a collector. SeeSee
U.S. v. WeberU.S. v. Weber, 923 F.2d 1338, 923 F.2d 1338 (9(9thth
Cir. 1990).Cir. 1990).
Probable Cause – Role ofProbable Cause – Role of
Officer ExpertiseOfficer Expertise
 Listing of an officer’s training andListing of an officer’s training and
experience helps to enhance probableexperience helps to enhance probable
cause.cause.
 PitfallsPitfalls
 Failing to place the suspect within the class ofFailing to place the suspect within the class of
persons being describedpersons being described
 Broad conclusions without expertiseBroad conclusions without expertise
Probable Cause – Role ofProbable Cause – Role of
Officer ExpertiseOfficer Expertise
U.S. v. Weber,U.S. v. Weber, 923 F.2d 1338 (9923 F.2d 1338 (9thth
Cir. 1990)Cir. 1990)
Expert information consisted of ramblingExpert information consisted of rambling
boilerplate recitations that did not connect at allboilerplate recitations that did not connect at all
to the facts of the specific case or defendant.to the facts of the specific case or defendant.
Expert reported he knew the habits of “childExpert reported he knew the habits of “child
molesters”, “pedophiles” and “child pornographymolesters”, “pedophiles” and “child pornography
collectors”collectors”
Probable Cause – Role ofProbable Cause – Role of
Officer ExpertiseOfficer Expertise
U.S. v. Weber,U.S. v. Weber, 923 F.2d 1338 (9923 F.2d 1338 (9thth
Cir. 1990)Cir. 1990)
““If the government presents expert opinionIf the government presents expert opinion
about the behavior of a particular class ofabout the behavior of a particular class of
persons, for the opinion to have any relevance, itpersons, for the opinion to have any relevance, it
must lay a foundation which shows that themust lay a foundation which shows that the
person subject to the search is a member of theperson subject to the search is a member of the
class.”class.”
Probable Cause – Role ofProbable Cause – Role of
Officer ExpertiseOfficer Expertise
Burnett v. State,Burnett v. State, Fla.2d DCA 2003Fla.2d DCA 2003
Defendant videotaped two boys engaged inDefendant videotaped two boys engaged in
lewd conduct found during a consent search oflewd conduct found during a consent search of
his home.his home.
As a result detective sought a search warrantAs a result detective sought a search warrant
for the computer. In the affidavit it is alleged thatfor the computer. In the affidavit it is alleged that
based on her expertise, child pornography wouldbased on her expertise, child pornography would
be found on the computer.be found on the computer.
Probable Cause – Role ofProbable Cause – Role of
Officer ExpertiseOfficer Expertise
Burnett v. State,Burnett v. State, Fla.2d DCA 2003Fla.2d DCA 2003
The court ruled that the affidavit failed toThe court ruled that the affidavit failed to
describe a factual link between the video cameradescribe a factual link between the video camera
and the computer. The expertise was notand the computer. The expertise was not
enough.enough.
Probable Cause – Role ofProbable Cause – Role of
Officer ExpertiseOfficer Expertise
Burnett v. State,Burnett v. State, Fla.2d DCA 2003Fla.2d DCA 2003
In the opinion the court discussed two flawsIn the opinion the court discussed two flaws
in the detective’s affidavit:in the detective’s affidavit:
1) She never expounded on her expertise in1) She never expounded on her expertise in
the habits of child pornographers.the habits of child pornographers.
2) She never stated if the computer had2) She never stated if the computer had
internet capabilities or was able to be connectedinternet capabilities or was able to be connected
to the video camera where the childto the video camera where the child
pornography was located.pornography was located.
Probable Cause – OvercomingProbable Cause – Overcoming
StalenessStaleness
 The term “collector” can be problematic.The term “collector” can be problematic.
 Persons “with a sexual interest in children”Persons “with a sexual interest in children”
has worked in some districts.has worked in some districts.
 Be sure to give the court some basis toBe sure to give the court some basis to
conclude that the subject is a “collector.”conclude that the subject is a “collector.”
Probable Cause – OvercomingProbable Cause – Overcoming
StalenessStaleness
 Defeating staleness through language re:Defeating staleness through language re:
deleted images still indeleted images still in unallocated space.unallocated space.
 E.g., “Based on my training andE.g., “Based on my training and
experience, I know that just because anexperience, I know that just because an
image is deleted does not mean it isimage is deleted does not mean it is
erased from the computer. It can beerased from the computer. It can be
retained indefinitely in an area of theretained indefinitely in an area of the
computer known as unallocated spacecomputer known as unallocated space
until overwritten.”until overwritten.”
 See, e.g.,See, e.g., U.S. v. GourdeU.S. v. Gourde, 440 F.3d 1065 (9, 440 F.3d 1065 (9thth
Cir. 2006)Cir. 2006)
Probable Cause - StalenessProbable Cause - Staleness
 What is too stale? Depends upon theWhat is too stale? Depends upon the
judge and the district...judge and the district...
 U.S. v. IsgutU.S. v. Isgut, 1996 WL 775064 (SDFL 1996):, 1996 WL 775064 (SDFL 1996):
11 mo. old information too stale where profile11 mo. old information too stale where profile
language failed to spell out affiant’slanguage failed to spell out affiant’s
experience and lacked opinion that target wasexperience and lacked opinion that target was
a collector.a collector.
 U.S. v. ZimmermanU.S. v. Zimmerman, 277 F.3d 426 (3, 277 F.3d 426 (3rdrd
Cir.Cir.
2002): Affidavit stale where it only mentioned2002): Affidavit stale where it only mentioned
one clip of obscenity seen 6 to 10 monthsone clip of obscenity seen 6 to 10 months
earlier.earlier.
Probable Cause - StalenessProbable Cause - Staleness
 What is fresh enough?What is fresh enough?
 U.S. v. LacyU.S. v. Lacy, 119 F.3d 742 (9, 119 F.3d 742 (9thth
Cir. 1997):Cir. 1997):
Ten months ok since D was a “collector ofTen months ok since D was a “collector of
child porn.”child porn.”
 U.S. v. DiazU.S. v. Diaz, 2004 WL 212787 (D.Conn, 2004 WL 212787 (D.Conn
2/13/04): Given crime was production, 162/13/04): Given crime was production, 16
months not stale after cessation of two yearmonths not stale after cessation of two year
on-going abuse.on-going abuse.
 U.S. v. HornU.S. v. Horn, 187 F.3d 781 (8, 187 F.3d 781 (8thth
Cir. 1999):Cir. 1999):
Three months not stale.Three months not stale.
Staleness – Pony JacksonStaleness – Pony Jackson
 Age 33Age 33
 Food service workerFood service worker
 AutomobileAutomobile
repossessedrepossessed
 Personal belongingsPersonal belongings
within car seized bywithin car seized by
tow truck operatortow truck operator
 Briefcase in vehicleBriefcase in vehicle
ParticularityParticularity
 Affidavit must establish with particularityAffidavit must establish with particularity
what evidence will be seized.what evidence will be seized.
 Offenses being investigated will helpOffenses being investigated will help
define what can be seized.define what can be seized.
 C/P images and all storage media thatC/P images and all storage media that
might contain such images.might contain such images.
 Cameras, cell phones, CDs, thumb drives, etc.Cameras, cell phones, CDs, thumb drives, etc.
 Child erotica/incest literature.Child erotica/incest literature.
 Pictures of children that don’t meet the definition ofPictures of children that don’t meet the definition of
child pornography.child pornography.
 Items pertaining to a sexual interest in children likeItems pertaining to a sexual interest in children like
little girls’ panties or kids’ clothing catalogues – at thelittle girls’ panties or kids’ clothing catalogues – at the
very least photograph these types of materials.very least photograph these types of materials.
ParticularityParticularity
 Your need to determine who isYour need to determine who is
responsible for placing the C/P onresponsible for placing the C/P on
computer can also broaden the scope ofcomputer can also broaden the scope of
search.search.
 Correspondence re: child exploitation.Correspondence re: child exploitation.
 Billing records/proof of payment.Billing records/proof of payment.
 Records regarding computer ownership.Records regarding computer ownership.
 Software applications.Software applications.
 Need to rule out possible intruder activityNeed to rule out possible intruder activity
at the computer that might be attributed toat the computer that might be attributed to
the owner of the computer.the owner of the computer.
Possession & Distribution
Issues
Com Vs. Diodoro (932 A2d 172, Pa.Super. 2007)
Defendant was convicted of “possessing”
images of child pornography. These
images were not downloaded, saved or
printed by the Defendant.
Defense claims that merely opening the
files is not possession.
“Defendant intentionally sought out and viewed
pornography, actions of operating computer mouse,
locating websites, opening sites, displaying images on
computer screen, and closing sites, were affirmative
steps corroborating intent to control child pornography.”
“Officer stated that fact that multiple images were stored
in cache files indicated that someone, after accessing
websites, had to click “next” button to view successive
images.”
“While defendant was viewing images, he could
download, print, copy, or email them to others.”
Possession & Distribution
Issues
U.S. v. Shaffer ( 2007 WL 10770 (C.A. 10(Kan.)
Defendant shared files of child
pornography using Kazaa a peer-to-peer
file sharing program
Defense claims there was insufficient
evidence to prove “distribution”
Possession & Distribution
Issues
Court concluded that the term “distribute”
means: “…to deliver, transfer, dispense…”
In this case the Defendant allowed access
to his stash. Just like a self-service gas
station the Defendant was in the business
of distributing child pornography.
Further, the Defendant could have
activated a feature on Kazaa to preclude
the taking of files.
Possession & Distribution
Issues
U.S. v. Abraham (2006 WL 3052702 (W.D.Pa.)
Again a Defendant was sharing files on a peer-
to-peer network
Several of these files were downloaded by a PA
State Trooper and verified they were known
depictions of child pornography
Possession & Distribution
Issues
The court held that distribution occurred
when as a result of the Defendant’s
installation of a peer-to-peer file sharing
program a trooper was able to download
the child pornography to his computer.
Possession & Distribution
Issues
U.S. v. SlaninaU.S. v. Slanina
 U.S. v. Slanina, 359 F.3d 356 (5U.S. v. Slanina, 359 F.3d 356 (5thth
Cir.Cir.
2004)2004)
 Expert testimony not necessary to proveExpert testimony not necessary to prove
child pornography images depict a realchild pornography images depict a real
childchild
Proving Image is Child –Proving Image is Child –
Jury QuestionJury Question
 ““Free Speech CoalitionFree Speech Coalition did not establish a broaddid not establish a broad
requirement that the Government must present expertrequirement that the Government must present expert
testimony to establish that the unlawful image depicts atestimony to establish that the unlawful image depicts a
real child. Three circuits that have considered this issuereal child. Three circuits that have considered this issue
take the same position.take the same position. See United States v. KimlerSee United States v. Kimler, 335, 335
F.3d 1132, 1142 (10F.3d 1132, 1142 (10thth
Cir. 2003)Cir. 2003);; United States v.United States v.
DeatonDeaton, 328 F.3d 454, 455 (8, 328 F.3d 454, 455 (8thth
Cir. 2003) (citingCir. 2003) (citing UnitedUnited
States v. VigStates v. Vig 167 F.3d 443. 449-50 (8167 F.3d 443. 449-50 (8thth
Cir. 1999);Cir. 1999); UnitedUnited
States v. HallStates v. Hall, 312 F.3d 1250, 1260 (11, 312 F.3d 1250, 1260 (11thth
Cir. 2002).”Cir. 2002).”
 ““Juries are still capable of distinguishing between realJuries are still capable of distinguishing between real
and virtual images; and admissibility remains within theand virtual images; and admissibility remains within the
province of the sound discretion of the trial judgeprovince of the sound discretion of the trial judge.”.”
KimlerKimler, 335 F.3d at 1142, 335 F.3d at 1142
GOING TO TRIAL IN THEGOING TO TRIAL IN THE
PEER TO PEER CASEPEER TO PEER CASE
DEFENSES TO UC OPSDEFENSES TO UC OPS
 Particular to Peer to Peer Prosecutions:Particular to Peer to Peer Prosecutions:
 Lack of Knowledge.Lack of Knowledge.
 Accident or Mistake.Accident or Mistake.
 SODDI.SODDI.
 Good Samaritan.Good Samaritan.
KnowledgeKnowledge
 Did defendantDid defendant KNOWINGLYKNOWINGLY produce,produce,
distribute, receive and/or possess childdistribute, receive and/or possess child
pornography?pornography?
 U.S. v. X-Citement VideoU.S. v. X-Citement Video, 513 U.S. 64, 513 U.S. 64
(1994)(1994)
 ““knowingly” extends both to the sexuallyknowingly” extends both to the sexually
explicit nature of the material and to theexplicit nature of the material and to the
minority of the performers.minority of the performers.
Knowledge - ProofKnowledge - Proof
 Volume of evidence on computer.Volume of evidence on computer.
 Look for patterns of use through forensic exam.Look for patterns of use through forensic exam.
 When was C/P downloaded.When was C/P downloaded.
 What other use going on during that timeWhat other use going on during that time
frame.frame.
 ““Index.dat” file.Index.dat” file.
 How is C/P organized on computer.How is C/P organized on computer.
 Has C/P been transferred to other storageHas C/P been transferred to other storage
media.media.
 Past relevant conduct.Past relevant conduct.
 ““OTHER EVIDENCE” – writings, non-OTHER EVIDENCE” – writings, non-
pornographic images of kids etc.pornographic images of kids etc.
Accident or MistakeAccident or Mistake
 ““I was looking for adult pornography andI was looking for adult pornography and
this stuff got on my computer by mistake.”this stuff got on my computer by mistake.”
 Ratio of C/P to adult pornRatio of C/P to adult porn
 Look at file creation, last modified and lastLook at file creation, last modified and last
accessed dates and times.accessed dates and times.
 Has the material been moved out of sharedHas the material been moved out of shared
folder? Organized?folder? Organized?
 Has material been transferred to otherHas material been transferred to other
storage media?storage media?
Technologically IneptTechnologically Inept
 This is the “I have been run over by theThis is the “I have been run over by the
technology” defense.technology” defense.
 Refute with: interview of defendant; wayRefute with: interview of defendant; way
computer files organized; programs andcomputer files organized; programs and
peripherals.peripherals.
Identity (SODDI)Identity (SODDI)
 Someone else in the household had access.Someone else in the household had access.
 Friend(s) knew the password to the account andFriend(s) knew the password to the account and
must have done it.must have done it.
 An unknown perpetrator must have done it.An unknown perpetrator must have done it.
 Remote access.Remote access.
 Refute defense with:Refute defense with:
 What time images downloaded.What time images downloaded.
 Who had access to computer during that specificWho had access to computer during that specific
time.time.
 Other activity surrounding time when c/p downloaded.Other activity surrounding time when c/p downloaded.
 Lack of evidence relating to remote access.Lack of evidence relating to remote access.
Good SamaritanGood Samaritan
 Meet defense by: volume of evidence seized;Meet defense by: volume of evidence seized;
how collected (i.e., no notes/records of activity).how collected (i.e., no notes/records of activity).
 Best evidence: if made no effort to contact lawBest evidence: if made no effort to contact law
enforcement; if target distributed any of the childenforcement; if target distributed any of the child
pornography [undermines the credibility of thepornography [undermines the credibility of the
claim].claim].
Good SamaritanGood Samaritan
 Variations of this defense:Variations of this defense:
 Collecting evidence for the police, just haven’tCollecting evidence for the police, just haven’t
had time to turn it over.had time to turn it over.
 Helping out -- e.g., know how busy the policeHelping out -- e.g., know how busy the police
are, or police dept. said don’t have a specializedare, or police dept. said don’t have a specialized
unit, etc.unit, etc.
 OR - - Target is a police officer doing UC work.OR - - Target is a police officer doing UC work.
 Affirmative defense, 18 USC § 2252(c),
18 USC § 2252A(d).
Good SamaritanGood Samaritan
 Meet defense: target never advised co-Meet defense: target never advised co-
workers or police or superior of activity;workers or police or superior of activity;
maintaining the pictures but little or nomaintaining the pictures but little or no
information as to subjects engaged in theinformation as to subjects engaged in the
conduct; extent of activity (i.e., very time-conduct; extent of activity (i.e., very time-
consuming and to the exclusion of otherconsuming and to the exclusion of other
activity).activity).

Mais conteúdo relacionado

Semelhante a Icac peer to peer presentation

Legal issues related to dna fingerprinting in india
Legal issues related to dna fingerprinting in indiaLegal issues related to dna fingerprinting in india
Legal issues related to dna fingerprinting in indiaIndianScholars
 
The President has just presented some proposed legislation to Congre
The President has just presented some proposed legislation to CongreThe President has just presented some proposed legislation to Congre
The President has just presented some proposed legislation to Congrelourapoupheq
 
How To Collect Child Support
How To Collect Child SupportHow To Collect Child Support
How To Collect Child SupportGeraldine Jensen
 
Informal Discovery Simple Strategies for Cost-Effective Litigation
Informal Discovery  Simple Strategies for Cost-Effective LitigationInformal Discovery  Simple Strategies for Cost-Effective Litigation
Informal Discovery Simple Strategies for Cost-Effective LitigationAmy Morgan
 
The Law of Whistleblowing Slides class 4 s wf14
The Law of Whistleblowing Slides class 4 s wf14The Law of Whistleblowing Slides class 4 s wf14
The Law of Whistleblowing Slides class 4 s wf14Washington University
 
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!Wayne Norris
 
Cybercrime (1)
Cybercrime (1)Cybercrime (1)
Cybercrime (1)aw222
 
Medical Legal Aspects and Concerns of the Mid-Level Pratcioner
Medical Legal Aspects and Concerns of the Mid-Level PratcionerMedical Legal Aspects and Concerns of the Mid-Level Pratcioner
Medical Legal Aspects and Concerns of the Mid-Level PratcionerBernard Racey
 
Forensic Evidence
Forensic EvidenceForensic Evidence
Forensic EvidenceTara Smith
 
Informal Discovery - Simple Strategies for Cost-Effective Litigation
Informal Discovery - Simple Strategies for Cost-Effective LitigationInformal Discovery - Simple Strategies for Cost-Effective Litigation
Informal Discovery - Simple Strategies for Cost-Effective LitigationAmy Morgan
 
How To Make A First Sentence Of An Essay
How To Make A First Sentence Of An EssayHow To Make A First Sentence Of An Essay
How To Make A First Sentence Of An EssayLilian Gerlin
 
Assignment 2 Criminal Defenses and Criminal Punishments Due Week .docx
Assignment 2 Criminal Defenses and Criminal Punishments Due Week .docxAssignment 2 Criminal Defenses and Criminal Punishments Due Week .docx
Assignment 2 Criminal Defenses and Criminal Punishments Due Week .docxchandaronald
 
Ithaca Ppt Revised
Ithaca Ppt RevisedIthaca Ppt Revised
Ithaca Ppt RevisedRedwine9
 

Semelhante a Icac peer to peer presentation (17)

Legal issues related to dna fingerprinting in india
Legal issues related to dna fingerprinting in indiaLegal issues related to dna fingerprinting in india
Legal issues related to dna fingerprinting in india
 
Workshop LOE
Workshop LOEWorkshop LOE
Workshop LOE
 
Wiretaps
WiretapsWiretaps
Wiretaps
 
The President has just presented some proposed legislation to Congre
The President has just presented some proposed legislation to CongreThe President has just presented some proposed legislation to Congre
The President has just presented some proposed legislation to Congre
 
How To Collect Child Support
How To Collect Child SupportHow To Collect Child Support
How To Collect Child Support
 
Informal Discovery Simple Strategies for Cost-Effective Litigation
Informal Discovery  Simple Strategies for Cost-Effective LitigationInformal Discovery  Simple Strategies for Cost-Effective Litigation
Informal Discovery Simple Strategies for Cost-Effective Litigation
 
The Law of Whistleblowing Slides class 4 s wf14
The Law of Whistleblowing Slides class 4 s wf14The Law of Whistleblowing Slides class 4 s wf14
The Law of Whistleblowing Slides class 4 s wf14
 
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
 
Cybercrime (1)
Cybercrime (1)Cybercrime (1)
Cybercrime (1)
 
Cybercrime (1)
Cybercrime (1)Cybercrime (1)
Cybercrime (1)
 
Medical Legal Aspects and Concerns of the Mid-Level Pratcioner
Medical Legal Aspects and Concerns of the Mid-Level PratcionerMedical Legal Aspects and Concerns of the Mid-Level Pratcioner
Medical Legal Aspects and Concerns of the Mid-Level Pratcioner
 
Forensic Evidence
Forensic EvidenceForensic Evidence
Forensic Evidence
 
Informal Discovery - Simple Strategies for Cost-Effective Litigation
Informal Discovery - Simple Strategies for Cost-Effective LitigationInformal Discovery - Simple Strategies for Cost-Effective Litigation
Informal Discovery - Simple Strategies for Cost-Effective Litigation
 
How To Make A First Sentence Of An Essay
How To Make A First Sentence Of An EssayHow To Make A First Sentence Of An Essay
How To Make A First Sentence Of An Essay
 
Assignment 2 Criminal Defenses and Criminal Punishments Due Week .docx
Assignment 2 Criminal Defenses and Criminal Punishments Due Week .docxAssignment 2 Criminal Defenses and Criminal Punishments Due Week .docx
Assignment 2 Criminal Defenses and Criminal Punishments Due Week .docx
 
Ithaca Ppt Revised
Ithaca Ppt RevisedIthaca Ppt Revised
Ithaca Ppt Revised
 
2009 case law overview
2009 case law overview2009 case law overview
2009 case law overview
 

Último

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Último (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Icac peer to peer presentation

  • 1. Legal IssuesLegal Issues inin Peer to PeerPeer to Peer CasesCases Joseph LesniakJoseph Lesniak Law Offices of Joseph Lesniak, LLCLaw Offices of Joseph Lesniak, LLC Delaware County, PennsylvaniaDelaware County, Pennsylvania
  • 2. 2 Butner Study (2009)Butner Study (2009)  155 child pornography offenders in an 18155 child pornography offenders in an 18 month voluntary treatment program.month voluntary treatment program.  At time of sentencing 115 (74%) had noAt time of sentencing 115 (74%) had no documented contact offenses.documented contact offenses.  40 (26%) had known histories of contact40 (26%) had known histories of contact offenses.offenses.
  • 3. 3 Butner Study (2009)Butner Study (2009)  The total number of victims, at sentencingThe total number of victims, at sentencing was 75, or 1.88 victims per offender.was 75, or 1.88 victims per offender.
  • 4. 4 Butner Study (2009)Butner Study (2009)  By the end of treatment 24 (15%) deniedBy the end of treatment 24 (15%) denied contact offences and 131 subjects (85%)contact offences and 131 subjects (85%) admitted to at least 1 hands-on offense.admitted to at least 1 hands-on offense. An increase of 59%.An increase of 59%.  The number of reported victims, at the endThe number of reported victims, at the end of treatment, wasof treatment, was 1,7771,777 for an average offor an average of 13.56 victims per offender.13.56 victims per offender.
  • 5. 5 Butner Study (2009)Butner Study (2009) High % of crossover:High % of crossover:  70% had both child and adolescent victims70% had both child and adolescent victims  Approximately 40% had both male andApproximately 40% had both male and female victimsfemale victims  68.7% had no prior conviction for a sex68.7% had no prior conviction for a sex offense.offense.  30.1% had participated in acts of30.1% had participated in acts of bestiality.bestiality.
  • 6. TOPICS WE WILL COVERTOPICS WE WILL COVER  44thth Amendment IssuesAmendment Issues  Probable Cause (drafting the search warrant)Probable Cause (drafting the search warrant)  Plain ViewPlain View  Charging considerationsCharging considerations  Trying a Peer to Peer CaseTrying a Peer to Peer Case
  • 7. Fourth Amendment Issues inFourth Amendment Issues in Peer to Peer CasesPeer to Peer Cases
  • 8. ECPAECPA (Electronic Communication Provider Act)(Electronic Communication Provider Act) Title 18, Section §2701,Title 18, Section §2701, et.seq.et.seq.  Applies to Public ISPs.Applies to Public ISPs.  A Four-Tiered Approach to Privacy Issues.A Four-Tiered Approach to Privacy Issues.  The More Private the Info Sought - TheThe More Private the Info Sought - The More Process Required.More Process Required.
  • 9. The Four TiersThe Four Tiers  Customer Information - SubpoenaCustomer Information - Subpoena  Transactional Information - § 2703(d)Transactional Information - § 2703(d) OrderOrder  Content - Search WarrantContent - Search Warrant  Real-Time Interception - Title III WiretapReal-Time Interception - Title III Wiretap
  • 10. Use of Subpoena/ Court OrderUse of Subpoena/ Court Order in a P2P Investigationin a P2P Investigation  Once you obtain IP Address of targetOnce you obtain IP Address of target computer what then?computer what then?  Determine which ISP was assigned the IPDetermine which ISP was assigned the IP address .address .  Subpoena/ Court Order to the ISP forSubpoena/ Court Order to the ISP for information relating to the account assignedinformation relating to the account assigned IP address on specific date at specific time.IP address on specific date at specific time.  Make sure that customer will not be notified ofMake sure that customer will not be notified of your subpoena by requestingyour subpoena by requesting 90 day non-90 day non- disclosure - - Supervisor statementdisclosure - - Supervisor statement
  • 11. ECPAECPA “Customer Information”“Customer Information” (Subpoena/ Court Order)(Subpoena/ Court Order) 1) name;1) name; 2) address;2) address; 3) records of session times and3) records of session times and durations;durations; 4) Other IP addresses assigned; and4) Other IP addresses assigned; and 5) length of service (including start5) length of service (including start date) and types of service utilized.date) and types of service utilized.
  • 12. Expectation of Privacy inExpectation of Privacy in P2P CasesP2P Cases U.S. v. BorowyU.S. v. Borowy, 595 F.3d 1045 (9, 595 F.3d 1045 (9thth Cir. 2010)Cir. 2010) Defendant claimed he attempted to turn off theDefendant claimed he attempted to turn off the share function of Limewire, thus he argued he hadshare function of Limewire, thus he argued he had expectation of privacy in contents of share folder.expectation of privacy in contents of share folder.
  • 13. Expectation of Privacy inExpectation of Privacy in P2P CasesP2P Cases U.S. v. BorowyU.S. v. Borowy, 595 F.3d 1045 (9, 595 F.3d 1045 (9thth Cir. 2010)Cir. 2010) ““Borowy’s subjective intention not to share his filesBorowy’s subjective intention not to share his files did not create an objectively reasonabledid not create an objectively reasonable expectation of privacy [in the contents of sharedexpectation of privacy [in the contents of shared folder].”folder].”  Downloading from share folder on target computerDownloading from share folder on target computer files with names suggestive of child pornographyfiles with names suggestive of child pornography does not violate 4does not violate 4thth Amendment.Amendment.
  • 14. Expectation of Privacy inExpectation of Privacy in P2P CasesP2P Cases U.S. v. BorowyU.S. v. Borowy, 595 F.3d 1045 (9, 595 F.3d 1045 (9thth Cir. 2010)Cir. 2010) Downloading from share folder on target computerDownloading from share folder on target computer files with names suggestive of child pornographyfiles with names suggestive of child pornography does not violate 4does not violate 4thth Amendment.Amendment.
  • 15. Search Warrants in P2P CasesSearch Warrants in P2P Cases  Computer search warrants present uniqueComputer search warrants present unique problems.problems.  Amount of material that may be stored onAmount of material that may be stored on computer is enormous.computer is enormous.  Highly technical information needs to beHighly technical information needs to be drafted into the warrant in andrafted into the warrant in an understandable fashion.understandable fashion.  Problems such as scope of warrant,Problems such as scope of warrant, staleness, and how the data will bestaleness, and how the data will be analyzed need to be considered.analyzed need to be considered.
  • 16. Drafting the Search WarrantDrafting the Search Warrant  Things to consider:Things to consider:  Is sufficientIs sufficient backgroundbackground information in theinformation in the affidavit in support of search warrant?affidavit in support of search warrant?  Does affidavit contain facts constitutingDoes affidavit contain facts constituting probable causeprobable cause??  Does the affidavit discussDoes the affidavit discuss searchsearch methodology?methodology?  Is the warrantIs the warrant particular enoughparticular enough in describingin describing items to be seized yet broad enough to coveritems to be seized yet broad enough to cover important evidentiary items you will want toimportant evidentiary items you will want to seize?seize?
  • 17. BackgroundBackground  Affiant’s training and experience.Affiant’s training and experience.  Statutory violations that may have beenStatutory violations that may have been violated.violated.  Remember the target at this point isRemember the target at this point is computer and storage media – not acomputer and storage media – not a person.person.  Background information to educate theBackground information to educate the judge:judge:  Definitions if necessary.Definitions if necessary.  Description of how peer to peer file sharing works.Description of how peer to peer file sharing works.  Overview of investigative techniques used in P2POverview of investigative techniques used in P2P cases.cases.
  • 18. Probable CauseProbable Cause  P/C to believe that evidence, fruits, orP/C to believe that evidence, fruits, or contraband can be found on each computercontraband can be found on each computer and/or storage media at location.and/or storage media at location.  In P2P case describe file list obtained in browse.In P2P case describe file list obtained in browse.  Describe with specificity images of childDescribe with specificity images of child pornography that may be on computer –pornography that may be on computer –  Describe diminutive stature, lack of breast/pubic hairDescribe diminutive stature, lack of breast/pubic hair development, say if prepubescent.development, say if prepubescent.  Affiant may approximate age; okay to say childAffiant may approximate age; okay to say child “appeared” to affiant to be under 18 or 10 or 5 yoa.“appeared” to affiant to be under 18 or 10 or 5 yoa.  How are actors clothed? Or lack thereof.How are actors clothed? Or lack thereof.  Describe sexual activityDescribe sexual activity
  • 19. Probable CauseProbable Cause  Search warrant drafting 101:Search warrant drafting 101:  Who, what, when, where, why, and how.Who, what, when, where, why, and how.  Make sure that you understand theMake sure that you understand the background portion of the warrant and thatbackground portion of the warrant and that you reference it as necessary in P/C portionyou reference it as necessary in P/C portion of S/W.of S/W.  Don’t overlook details like signatures,Don’t overlook details like signatures, accurate description of place to be searchedaccurate description of place to be searched etc.etc.
  • 20. Probable CauseProbable Cause State v. NussState v. Nuss, 2010 WL 1405245 (Neb., 2010 WL 1405245 (Neb. 2010)2010) P2P case.P2P case. Affidavit related that 20 files downloaded fromAffidavit related that 20 files downloaded from target computer “appeared to be childtarget computer “appeared to be child pornography.”pornography.”
  • 21. Probable CauseProbable Cause State v. NussState v. Nuss, 2010 WL 1405245 (Neb., 2010 WL 1405245 (Neb. 2010).2010). Nebraska Supreme Court ruled that warrantNebraska Supreme Court ruled that warrant did not use or even refer to the statutorydid not use or even refer to the statutory definitions of sexually explicit conduct indefinitions of sexually explicit conduct in describing the images.describing the images. Used terms: “appear to be child pornography”Used terms: “appear to be child pornography” “…“…consistent with child pornography”consistent with child pornography”
  • 22. Probable CauseProbable Cause U.S. v. Henderson,U.S. v. Henderson, 595 F.3d 1198 (10595 F.3d 1198 (10thth Cir. 2010).Cir. 2010). P2P search warrant.P2P search warrant. Be sure to include every critical investigativeBe sure to include every critical investigative step.step. who, what, where, when, why and how.who, what, where, when, why and how.
  • 23. Probable CauseProbable Cause U.S. v. Henderson,U.S. v. Henderson, 595 F.3d 1198 (10595 F.3d 1198 (10thth Cir. 2010).Cir. 2010). Affidavit “failed to identify how [agent whoAffidavit “failed to identify how [agent who applied for search warrant]’s source [agentapplied for search warrant]’s source [agent who sent P2P lead] determined that computerwho sent P2P lead] determined that computer with relevant IP address – rather than somewith relevant IP address – rather than some other computer – shared child pornographyother computer – shared child pornography videos.”videos.”
  • 24. Probable Cause – Do We NeedProbable Cause – Do We Need a Download?a Download?  U.S. v. Miknevich, 638 F.3d 178, (3U.S. v. Miknevich, 638 F.3d 178, (3rdrd Cir.Cir. 2011)2011)  State warrant. No download and vagueState warrant. No download and vague description of files that were viewed as adescription of files that were viewed as a result of browse. However, based uponresult of browse. However, based upon statement of affiant that he knew the filestatement of affiant that he knew the file contained child porn based the SHA1 value ofcontained child porn based the SHA1 value of the file and the file name itself the court foundthe file and the file name itself the court found sufficient P/C to uphold the warrant.sufficient P/C to uphold the warrant.
  • 25. Probable Cause – OvercomingProbable Cause – Overcoming StalenessStaleness  Characteristics of Persons SexuallyCharacteristics of Persons Sexually Interested in ChildrenInterested in Children  U.S. v. GourdeU.S. v. Gourde, 430 F.3d 1065 (9, 430 F.3d 1065 (9thth Cir. 2006)Cir. 2006) (affidavit said collectors store pics on computer).(affidavit said collectors store pics on computer).  U.S. v. AbrahamU.S. v. Abraham, 2006 WL 1344303 (W.D. Pa.), 2006 WL 1344303 (W.D. Pa.) (affidavit said collectors keep pics for long time).(affidavit said collectors keep pics for long time). E.g., “I am aware that persons who collect childE.g., “I am aware that persons who collect child pornography cherish their collections and tend topornography cherish their collections and tend to retain their collections for very long periods of time,retain their collections for very long periods of time, often for years.”often for years.” BUTBUT, especially in the 9, especially in the 9thth Circuit,Circuit, make sure you say why your target is a collector.make sure you say why your target is a collector. SeeSee U.S. v. WeberU.S. v. Weber, 923 F.2d 1338, 923 F.2d 1338 (9(9thth Cir. 1990).Cir. 1990).
  • 26. Probable Cause – Role ofProbable Cause – Role of Officer ExpertiseOfficer Expertise  Listing of an officer’s training andListing of an officer’s training and experience helps to enhance probableexperience helps to enhance probable cause.cause.  PitfallsPitfalls  Failing to place the suspect within the class ofFailing to place the suspect within the class of persons being describedpersons being described  Broad conclusions without expertiseBroad conclusions without expertise
  • 27. Probable Cause – Role ofProbable Cause – Role of Officer ExpertiseOfficer Expertise U.S. v. Weber,U.S. v. Weber, 923 F.2d 1338 (9923 F.2d 1338 (9thth Cir. 1990)Cir. 1990) Expert information consisted of ramblingExpert information consisted of rambling boilerplate recitations that did not connect at allboilerplate recitations that did not connect at all to the facts of the specific case or defendant.to the facts of the specific case or defendant. Expert reported he knew the habits of “childExpert reported he knew the habits of “child molesters”, “pedophiles” and “child pornographymolesters”, “pedophiles” and “child pornography collectors”collectors”
  • 28. Probable Cause – Role ofProbable Cause – Role of Officer ExpertiseOfficer Expertise U.S. v. Weber,U.S. v. Weber, 923 F.2d 1338 (9923 F.2d 1338 (9thth Cir. 1990)Cir. 1990) ““If the government presents expert opinionIf the government presents expert opinion about the behavior of a particular class ofabout the behavior of a particular class of persons, for the opinion to have any relevance, itpersons, for the opinion to have any relevance, it must lay a foundation which shows that themust lay a foundation which shows that the person subject to the search is a member of theperson subject to the search is a member of the class.”class.”
  • 29. Probable Cause – Role ofProbable Cause – Role of Officer ExpertiseOfficer Expertise Burnett v. State,Burnett v. State, Fla.2d DCA 2003Fla.2d DCA 2003 Defendant videotaped two boys engaged inDefendant videotaped two boys engaged in lewd conduct found during a consent search oflewd conduct found during a consent search of his home.his home. As a result detective sought a search warrantAs a result detective sought a search warrant for the computer. In the affidavit it is alleged thatfor the computer. In the affidavit it is alleged that based on her expertise, child pornography wouldbased on her expertise, child pornography would be found on the computer.be found on the computer.
  • 30. Probable Cause – Role ofProbable Cause – Role of Officer ExpertiseOfficer Expertise Burnett v. State,Burnett v. State, Fla.2d DCA 2003Fla.2d DCA 2003 The court ruled that the affidavit failed toThe court ruled that the affidavit failed to describe a factual link between the video cameradescribe a factual link between the video camera and the computer. The expertise was notand the computer. The expertise was not enough.enough.
  • 31. Probable Cause – Role ofProbable Cause – Role of Officer ExpertiseOfficer Expertise Burnett v. State,Burnett v. State, Fla.2d DCA 2003Fla.2d DCA 2003 In the opinion the court discussed two flawsIn the opinion the court discussed two flaws in the detective’s affidavit:in the detective’s affidavit: 1) She never expounded on her expertise in1) She never expounded on her expertise in the habits of child pornographers.the habits of child pornographers. 2) She never stated if the computer had2) She never stated if the computer had internet capabilities or was able to be connectedinternet capabilities or was able to be connected to the video camera where the childto the video camera where the child pornography was located.pornography was located.
  • 32. Probable Cause – OvercomingProbable Cause – Overcoming StalenessStaleness  The term “collector” can be problematic.The term “collector” can be problematic.  Persons “with a sexual interest in children”Persons “with a sexual interest in children” has worked in some districts.has worked in some districts.  Be sure to give the court some basis toBe sure to give the court some basis to conclude that the subject is a “collector.”conclude that the subject is a “collector.”
  • 33. Probable Cause – OvercomingProbable Cause – Overcoming StalenessStaleness  Defeating staleness through language re:Defeating staleness through language re: deleted images still indeleted images still in unallocated space.unallocated space.  E.g., “Based on my training andE.g., “Based on my training and experience, I know that just because anexperience, I know that just because an image is deleted does not mean it isimage is deleted does not mean it is erased from the computer. It can beerased from the computer. It can be retained indefinitely in an area of theretained indefinitely in an area of the computer known as unallocated spacecomputer known as unallocated space until overwritten.”until overwritten.”  See, e.g.,See, e.g., U.S. v. GourdeU.S. v. Gourde, 440 F.3d 1065 (9, 440 F.3d 1065 (9thth Cir. 2006)Cir. 2006)
  • 34. Probable Cause - StalenessProbable Cause - Staleness  What is too stale? Depends upon theWhat is too stale? Depends upon the judge and the district...judge and the district...  U.S. v. IsgutU.S. v. Isgut, 1996 WL 775064 (SDFL 1996):, 1996 WL 775064 (SDFL 1996): 11 mo. old information too stale where profile11 mo. old information too stale where profile language failed to spell out affiant’slanguage failed to spell out affiant’s experience and lacked opinion that target wasexperience and lacked opinion that target was a collector.a collector.  U.S. v. ZimmermanU.S. v. Zimmerman, 277 F.3d 426 (3, 277 F.3d 426 (3rdrd Cir.Cir. 2002): Affidavit stale where it only mentioned2002): Affidavit stale where it only mentioned one clip of obscenity seen 6 to 10 monthsone clip of obscenity seen 6 to 10 months earlier.earlier.
  • 35. Probable Cause - StalenessProbable Cause - Staleness  What is fresh enough?What is fresh enough?  U.S. v. LacyU.S. v. Lacy, 119 F.3d 742 (9, 119 F.3d 742 (9thth Cir. 1997):Cir. 1997): Ten months ok since D was a “collector ofTen months ok since D was a “collector of child porn.”child porn.”  U.S. v. DiazU.S. v. Diaz, 2004 WL 212787 (D.Conn, 2004 WL 212787 (D.Conn 2/13/04): Given crime was production, 162/13/04): Given crime was production, 16 months not stale after cessation of two yearmonths not stale after cessation of two year on-going abuse.on-going abuse.  U.S. v. HornU.S. v. Horn, 187 F.3d 781 (8, 187 F.3d 781 (8thth Cir. 1999):Cir. 1999): Three months not stale.Three months not stale.
  • 36. Staleness – Pony JacksonStaleness – Pony Jackson  Age 33Age 33  Food service workerFood service worker  AutomobileAutomobile repossessedrepossessed  Personal belongingsPersonal belongings within car seized bywithin car seized by tow truck operatortow truck operator  Briefcase in vehicleBriefcase in vehicle
  • 37. ParticularityParticularity  Affidavit must establish with particularityAffidavit must establish with particularity what evidence will be seized.what evidence will be seized.  Offenses being investigated will helpOffenses being investigated will help define what can be seized.define what can be seized.  C/P images and all storage media thatC/P images and all storage media that might contain such images.might contain such images.  Cameras, cell phones, CDs, thumb drives, etc.Cameras, cell phones, CDs, thumb drives, etc.  Child erotica/incest literature.Child erotica/incest literature.  Pictures of children that don’t meet the definition ofPictures of children that don’t meet the definition of child pornography.child pornography.  Items pertaining to a sexual interest in children likeItems pertaining to a sexual interest in children like little girls’ panties or kids’ clothing catalogues – at thelittle girls’ panties or kids’ clothing catalogues – at the very least photograph these types of materials.very least photograph these types of materials.
  • 38. ParticularityParticularity  Your need to determine who isYour need to determine who is responsible for placing the C/P onresponsible for placing the C/P on computer can also broaden the scope ofcomputer can also broaden the scope of search.search.  Correspondence re: child exploitation.Correspondence re: child exploitation.  Billing records/proof of payment.Billing records/proof of payment.  Records regarding computer ownership.Records regarding computer ownership.  Software applications.Software applications.  Need to rule out possible intruder activityNeed to rule out possible intruder activity at the computer that might be attributed toat the computer that might be attributed to the owner of the computer.the owner of the computer.
  • 39. Possession & Distribution Issues Com Vs. Diodoro (932 A2d 172, Pa.Super. 2007) Defendant was convicted of “possessing” images of child pornography. These images were not downloaded, saved or printed by the Defendant. Defense claims that merely opening the files is not possession.
  • 40. “Defendant intentionally sought out and viewed pornography, actions of operating computer mouse, locating websites, opening sites, displaying images on computer screen, and closing sites, were affirmative steps corroborating intent to control child pornography.” “Officer stated that fact that multiple images were stored in cache files indicated that someone, after accessing websites, had to click “next” button to view successive images.” “While defendant was viewing images, he could download, print, copy, or email them to others.” Possession & Distribution Issues
  • 41. U.S. v. Shaffer ( 2007 WL 10770 (C.A. 10(Kan.) Defendant shared files of child pornography using Kazaa a peer-to-peer file sharing program Defense claims there was insufficient evidence to prove “distribution” Possession & Distribution Issues
  • 42. Court concluded that the term “distribute” means: “…to deliver, transfer, dispense…” In this case the Defendant allowed access to his stash. Just like a self-service gas station the Defendant was in the business of distributing child pornography. Further, the Defendant could have activated a feature on Kazaa to preclude the taking of files. Possession & Distribution Issues
  • 43. U.S. v. Abraham (2006 WL 3052702 (W.D.Pa.) Again a Defendant was sharing files on a peer- to-peer network Several of these files were downloaded by a PA State Trooper and verified they were known depictions of child pornography Possession & Distribution Issues
  • 44. The court held that distribution occurred when as a result of the Defendant’s installation of a peer-to-peer file sharing program a trooper was able to download the child pornography to his computer. Possession & Distribution Issues
  • 45. U.S. v. SlaninaU.S. v. Slanina  U.S. v. Slanina, 359 F.3d 356 (5U.S. v. Slanina, 359 F.3d 356 (5thth Cir.Cir. 2004)2004)  Expert testimony not necessary to proveExpert testimony not necessary to prove child pornography images depict a realchild pornography images depict a real childchild
  • 46. Proving Image is Child –Proving Image is Child – Jury QuestionJury Question  ““Free Speech CoalitionFree Speech Coalition did not establish a broaddid not establish a broad requirement that the Government must present expertrequirement that the Government must present expert testimony to establish that the unlawful image depicts atestimony to establish that the unlawful image depicts a real child. Three circuits that have considered this issuereal child. Three circuits that have considered this issue take the same position.take the same position. See United States v. KimlerSee United States v. Kimler, 335, 335 F.3d 1132, 1142 (10F.3d 1132, 1142 (10thth Cir. 2003)Cir. 2003);; United States v.United States v. DeatonDeaton, 328 F.3d 454, 455 (8, 328 F.3d 454, 455 (8thth Cir. 2003) (citingCir. 2003) (citing UnitedUnited States v. VigStates v. Vig 167 F.3d 443. 449-50 (8167 F.3d 443. 449-50 (8thth Cir. 1999);Cir. 1999); UnitedUnited States v. HallStates v. Hall, 312 F.3d 1250, 1260 (11, 312 F.3d 1250, 1260 (11thth Cir. 2002).”Cir. 2002).”  ““Juries are still capable of distinguishing between realJuries are still capable of distinguishing between real and virtual images; and admissibility remains within theand virtual images; and admissibility remains within the province of the sound discretion of the trial judgeprovince of the sound discretion of the trial judge.”.” KimlerKimler, 335 F.3d at 1142, 335 F.3d at 1142
  • 47. GOING TO TRIAL IN THEGOING TO TRIAL IN THE PEER TO PEER CASEPEER TO PEER CASE
  • 48. DEFENSES TO UC OPSDEFENSES TO UC OPS  Particular to Peer to Peer Prosecutions:Particular to Peer to Peer Prosecutions:  Lack of Knowledge.Lack of Knowledge.  Accident or Mistake.Accident or Mistake.  SODDI.SODDI.  Good Samaritan.Good Samaritan.
  • 49. KnowledgeKnowledge  Did defendantDid defendant KNOWINGLYKNOWINGLY produce,produce, distribute, receive and/or possess childdistribute, receive and/or possess child pornography?pornography?  U.S. v. X-Citement VideoU.S. v. X-Citement Video, 513 U.S. 64, 513 U.S. 64 (1994)(1994)  ““knowingly” extends both to the sexuallyknowingly” extends both to the sexually explicit nature of the material and to theexplicit nature of the material and to the minority of the performers.minority of the performers.
  • 50. Knowledge - ProofKnowledge - Proof  Volume of evidence on computer.Volume of evidence on computer.  Look for patterns of use through forensic exam.Look for patterns of use through forensic exam.  When was C/P downloaded.When was C/P downloaded.  What other use going on during that timeWhat other use going on during that time frame.frame.  ““Index.dat” file.Index.dat” file.  How is C/P organized on computer.How is C/P organized on computer.  Has C/P been transferred to other storageHas C/P been transferred to other storage media.media.  Past relevant conduct.Past relevant conduct.  ““OTHER EVIDENCE” – writings, non-OTHER EVIDENCE” – writings, non- pornographic images of kids etc.pornographic images of kids etc.
  • 51. Accident or MistakeAccident or Mistake  ““I was looking for adult pornography andI was looking for adult pornography and this stuff got on my computer by mistake.”this stuff got on my computer by mistake.”  Ratio of C/P to adult pornRatio of C/P to adult porn  Look at file creation, last modified and lastLook at file creation, last modified and last accessed dates and times.accessed dates and times.  Has the material been moved out of sharedHas the material been moved out of shared folder? Organized?folder? Organized?  Has material been transferred to otherHas material been transferred to other storage media?storage media?
  • 52. Technologically IneptTechnologically Inept  This is the “I have been run over by theThis is the “I have been run over by the technology” defense.technology” defense.  Refute with: interview of defendant; wayRefute with: interview of defendant; way computer files organized; programs andcomputer files organized; programs and peripherals.peripherals.
  • 53. Identity (SODDI)Identity (SODDI)  Someone else in the household had access.Someone else in the household had access.  Friend(s) knew the password to the account andFriend(s) knew the password to the account and must have done it.must have done it.  An unknown perpetrator must have done it.An unknown perpetrator must have done it.  Remote access.Remote access.  Refute defense with:Refute defense with:  What time images downloaded.What time images downloaded.  Who had access to computer during that specificWho had access to computer during that specific time.time.  Other activity surrounding time when c/p downloaded.Other activity surrounding time when c/p downloaded.  Lack of evidence relating to remote access.Lack of evidence relating to remote access.
  • 54. Good SamaritanGood Samaritan  Meet defense by: volume of evidence seized;Meet defense by: volume of evidence seized; how collected (i.e., no notes/records of activity).how collected (i.e., no notes/records of activity).  Best evidence: if made no effort to contact lawBest evidence: if made no effort to contact law enforcement; if target distributed any of the childenforcement; if target distributed any of the child pornography [undermines the credibility of thepornography [undermines the credibility of the claim].claim].
  • 55. Good SamaritanGood Samaritan  Variations of this defense:Variations of this defense:  Collecting evidence for the police, just haven’tCollecting evidence for the police, just haven’t had time to turn it over.had time to turn it over.  Helping out -- e.g., know how busy the policeHelping out -- e.g., know how busy the police are, or police dept. said don’t have a specializedare, or police dept. said don’t have a specialized unit, etc.unit, etc.  OR - - Target is a police officer doing UC work.OR - - Target is a police officer doing UC work.  Affirmative defense, 18 USC § 2252(c), 18 USC § 2252A(d).
  • 56. Good SamaritanGood Samaritan  Meet defense: target never advised co-Meet defense: target never advised co- workers or police or superior of activity;workers or police or superior of activity; maintaining the pictures but little or nomaintaining the pictures but little or no information as to subjects engaged in theinformation as to subjects engaged in the conduct; extent of activity (i.e., very time-conduct; extent of activity (i.e., very time- consuming and to the exclusion of otherconsuming and to the exclusion of other activity).activity).