Don't Cache out Your Case: Prosecuting Child Pornograpy Possession Laws Based on Images Located in Temporary Internet Files
نویسنده
چکیده
This Article explores issues surrounding the prosecution of child pornography possession laws based on images located in temporary Internet files. The Article begins with a technical background of both caches and the forensic examinations used by investigators. After reviewing the pertinent case law, the Article introduces the two conceptual approaches-the Present Possession approach and the Evidence Of approach-and discusses how conceptual choices affect the analysis of knowing possession. Using the two conceptual approaches as a guide, the Article then reevaluates the various factors courts have considered, and the various defenses defendants have forwarded, when faced with a possession case based upon cached images. For courts, that reevaluation suggests that the approach to which they have defaulted may not be the most technologically accurate. For prosecutors, the reevaluation suggests that their choice of conceptual approach could have serious effects on their case strategy as well as on how best to serve the punitive and penological goals of child pornography possession laws.
منابع مشابه
Crying Over the Cache: Why Technology Has Compromised the Uniform Application of Child Pornography Laws
As thousands of individuals surf the internet daily, every image on every web page is saved automatically to their computer's cache, absent user direction. Sections 2252(a)(2) and 2252(a)(4)(B) of Title 18 of the U.S. Code criminalize knowing possession and knowing receipt of child pornography images. For the defendant who intentionally saves illicit images to his computer, the cache simply ver...
متن کاملDefining Child Pornography: Law Enforcement Dilemmas in Investigations of Internet Child Pornography Possession1
This study examines law enforcement dilemmas in child pornography possession investigations in which no offender was arrested. A mail survey of US law enforcement agencies identified a sample of Internet child pornography possession cases where no arrest was made. Telephone surveys with law enforcement investigators were used to collect casespecific data and information on dilemmas in these inv...
متن کاملQuick Identification of Child Pornography in Digital Videos
Computer forensics has the main objective to find digital evidences of crimes. One of the most researched digital crimes is the sexual abuse of children, including the production, sharing and possession of child pornographic files. Aiming to quickly detect files of child pornography at crime scenes, the NuDetective Forensic Tool was previously developed and it uses techniques like nudity detect...
متن کاملThe Role of Individual Differences in Predicting the Type of Images Collected by Internet Child Pornography Consumers
Seigfried-Spellar, Kathryn C. Ph.D., Purdue University, August 2011. The Role of Individual Differences in Predicting the Type of Images Collected by Internet Child Pornography Consumers. Major Professor: Marcus K. Rogers. The current study was the first to analyze the relationship among psychological characteristics, personality, and the types of images preferred or collected by selfreported c...
متن کاملTowards flectronhc Customer Relationship Management: An e-CRM Solutions Development Methodolo
customer is felt more and more. Today organizations can't make it faraway without giving attention to their customer's needs. For this purpose organizations try out many concepts which can help them be leader in managing their customers. One such concept is the Customer Relationship Management (CRM). CRM has come a long way since its inception in business circles and its major change is felt in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015