A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


David Hickman/Joshua Restivo - The Government Found Child Porn on (Phreaknic 12) (Hacking Illustrated Series InfoSec Tutorial Videos)

David Hickman/Joshua Restivo - The Government Found Child Porn on
My PC. Now What? (Phreaknic 12)

        Most users of the Internet are acquainted with peer to peer filesharing and the amount of pornography available therein and elsewhere on the Internet. Any active filesharing user has likely downloaded some form of child pornography unintentionally. Law enforcement has taken the stance that downloading, possession, and/or distribution of child pornography, even accidental or system compromise, is a crime that will be prosecuted to
the fullest extent of the law. As a result, there are task forces, which scour p2p networks looking for the hashes of known child pornography. When found, the local jurisdiction is notified to investigate. In many cases these local investigators do not have the computer skills or experience handle the case correctly. Unfortunately, once the computers are seized, the accused automatically inherit the stigma of being associated with this type of crime. Only if they have access to competent defense forensics do they have a chance of avoiding charges, having existing charges dropped or winning their case in court. This talk will concentrate on what happens in the pre-indictment and post-indictment stages of a case from the defense forensics viewpoint.

This talk never happened for some reason.

 

Thanks to the Phreaknic crew, SkyDog, Lady Merlin and the A/V team SomeNinjaMaster, Night Carnage, Greg, Brimstone, Poiu Poiu, Mudflap, and Drunken Pirate for setting up the rigs and capturing the video.

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast