• Critical Vulnerability and Privacy LoopHole Found in RoboForm Password Manager

    Unless you are a human supercomputer, remembering password is not so easy, and that too if you have a different password for each site. But luckily...
  • miniLock - Open Source File Encryption Tool from CryptoCat Developer

    It’s the age of surveillance what made the Use of Encryption so widely that it has become a need of law enforcement agencies, cyber criminals as...
  • A BEGINNERS GUIDE TO HACKING UNIX

      *************  *       A BEGINNERS GUIDE TO:        *  *        ...
  • CASH! CASH! Hacking ATM Machines with Just a Text Message

    As we reported earlier, Microsoft will stop supporting the Windows XP operating system after 8th April, apparently 95% of the world’s 3 million...
  • Microsoft Word Zero-Day Vulnerability is being exploited in the Wild

    Microsoft warned about a zero-day vulnerability in Microsoft Word that is being actively exploited in targeted attacks and discovered by the...
  • Snoopy Drone Can Hack Your Smartphones

    The use of unmanned aerial vehicles (UAVS) called Drones is rapidly transforming the way we go to war. Drones were once used for...
  • Android Privilege Escalation Flaws leave Billions of Devices vulnerable to Malware Infection

    Android - a widely used Smartphone platform offered by Google is once again suspected to affect its users with malicious software that puts...
  • Introduction to Netcat

    Introduction : So I was messing around on the internet and came across a tool called Netcat.  I've been messing with it for a couple of...
  • Google Nexus phone vulnerable to SMS-based DOS attack

    Google’s Nexus Smartphones are vulnerable to SMS-based DOS attack, where an attacker can force it to restart, freeze, or lose network...
  • Linux worm targeting Routers, Set-top boxes and Security Cameras with PHP-CGI Vulnerability

    A Symantec researcher has discovered a new Linux worm, targeting machine-to-machine devices, and exploits a PHP vulnerability...

Thursday, 14 November 2013

Federal Judge ruled at Child pornography case, 'Your Peer-to-Peer file sharing data is not a private matter '





Today computer telecommunications have become one of the most prevalent techniques used by pedophiles to share illegal photographic images of minors and to lure children into illicit sexual relationships. The Internet has dramatically increased the access of the preferential sex offenders to the population they seek to victimize and provides them greater access to a community of people who validate their sexual preferences.

The Fourth Amendment is the most implicated and litigated portion of the Constitution. Courts are increasingly confronting the problems associated with adapting Fourth Amendment principles to modern technology.
If you think that your peer-to-peer file sharing can be kept under wraps, then please think again. A federal judge 'Christina Reiss' in Vermont has ruled that there should be no expectation of privacy for data shared across peer-to-peer file-sharing services.

In a Child pornography case, three defendants argued that information gained from a P2P network had been illegally obtained by police without a search warrant.
District Court Judge Christina Reiss wrote in a decision released on Friday: "The evidence overwhelmingly demonstrates that the only information accessed was made publicly available by the IP address or the software it was using... Accordingly, either intentionally or inadvertently, through the use of peer-to-peer file sharing software, Defendants exposed to the public the information they now claim was private."

Police found the files using the Child Protection System, which features a number of software tools to help locate these files. The tools send out automated searches for files known to contain data of this kind, and then maps out matching files with an IP address, data and time, as well as various other details about the particular computer.

A P2P network consists of a group of PCs that can exchange files with one another without going through a centralized server, saving time and bandwidth space. This distributed arrangement, however, makes tracing the source of a file difficult, given that different pieces of a file typically come from different PCs in the network.

In July, Oak Ridge National Laboratory engineers have developed BitPredator and BitThief, tools to automate the tracking of P2P content distributed using the BitTorrent protocol, so it can help law enforcement crack down on child abusers.

No comments:

Post a Comment