Technical Soddi Defenses: The Trojan Horse Defense Revisited

نویسنده

  • Chad M. S. Steel
چکیده

In 2004, the Trojan horse defense was at a crossroads, having been successfully employed in two child pornography cases in the United Kingdom, resulting in acquittals. Despite the early successes, the Trojan horse defense has failed to become a regularly employed strategy. The original Trojan horse defense has now become part of the more general technical SODDI (Some Other Dude Did It) defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts. In the past ten years, it has not been effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense. Where the technical SODDI defense has been successfully used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter. On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical Defenses Against Storage Jamming

Storage jamming [15] is malicious but surreptitious modification of stored data, to reduce its quality. The person initiating the storage jamming does not receive any direct benefit. Instead, the goal is more indirect, such as deteriorating the position of a competitor. We assume that a Trojan horse does the storage jamming, since the Trojan horse may access data that the attacker cannot. Manua...

متن کامل

Evidence of a Third Party's Guilt of the Crime that the Accused is Charged with: The Constitutionalization of the SODDI (Some Other Dude Did It) Defense 2.0

INTRODUCTION ........................................................................................ 92 I. A DESCRIPTION OF THE TRADITIONAL SODDI DEFENSE ................... 96 A. The Majority View ...................................................................... 96 1. Evidence of the Third Party’s Involvement in the Charged Crime .............................................................

متن کامل

SOC IC Trojan Thwarting by Identification of Trojan

IC Trojan horse is a serious technical problem faced by SOC developers. Most of the SOC developers use third party IP components for their design purpose. So comparing with a Trojan-less counterpart is impossible. Villasenor and Kim proposed bus architecture to detect Trojan activity where, when the circuit realizes the presence of a Trojan, it informs the CPU by an interrupt. In this paper, we...

متن کامل

ELT: A Trojan Horse in Disguise?

Many people believe that language teaching is a neutral practice. However, this belief is not without its own opponents. To many scholars, teaching languages cannot be devoid of teaching cultural values of the target language, which tacitly aims at denigrating cultural values of the community of the learners who are learning it. The ultimate purpose of such cultural oppression, according to the...

متن کامل

Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physical Layer

Trojan insertion has been made difficult in modern communications in the recent years, due to extensive research work in the direction to protect Integrated Circuits (ICs). Several Trojan detection techniques have been developed to prevent the destruction caused by malicious insertion of Trojan in physical layer, making the process of Trojan insertion much more difficult. In this paper, we high...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JDFSL

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2014