The Virus Did It 373
scubacuda writes "The Inquirer and Get Reading report that a UK man accused of having pornographic pictures of kids on his computer was acquitted after a court heard that his machine was infected with a Trojan on his PC which probably auto-downloaded the images. (In light of moves like Operation Ore, we'll probably hear more defenses like this.)"
Insanity (Score:5, Funny)
Computer: I plead trojan. I wasn't aware of my actions at the time that I was doing them. I can't be held responsible.
Re:Insanity (Score:5, Informative)
Consider this: you are driving your car. you hit a baby, baby dies. You weren't driving particularly recklessly, under the speedlimit, visibility was just low. It's sad and it happens.
Consider this: you are drunk, driving your car. And by drunk, I mean you are impaired. You aren't driving particularly recklessly, but the same thing as above happens.
Now, this doesn't apply to NGRI directly, but consider this: the circumstances around a crime impact the meaning of it. Both of those situations flat out suck, but the argument is that you were being especially irresponsible in the second case, but not in the first.
Let's say you are sane and you kill a guy named Sam. (Sorry, Sam.) He kicked your dog, and now you're going to pump his head full of lead and do some of that stuff out of the first scene of "Way of the Gun".
Now, consider case two: you are insane, and you believe that Jodie Foster is in love with you and tells you to do things, and you feel complied to do so. You are not even aware of your delusion, and the fact that you are having the delusion implies that a great deal of your judgement is impaired. In fact, you could say that you didn't know what you were doing - you can still remember doing them, but you thought you were killing the martian high leader of the invasion force or something. In this case, are you responsible for killing a man, or are you responsible for falling for a delusion, which to you seemed very, very real.
I argue that in this case, you are not guilty of the crime you are charged with because you frankly were not in control of your reality.
And ultimately, if you look up statistics on the defense, you'll find that it is hardly ever used, does not work when it should, and that the mean time spent incarcerated in mental hostpitals by NGRI people is higher than the mean time spent in prison for the same crime.
There is actually a famous case where a guy shot somebody very important under the compulsion of one of his delusionary characters and was found not guilty by reason of insanity, who is now sitting, treated, recovered, in a mental hospital, getting clean review after clean review and not being released by the board that controlls his release.
Whine as much as you want about the implications of this trojan defense, but don't equate it or compare it to the not guilty be reason of insanity defense. They are quite different.
Also, note that it *IS* possible that a trojan's job would be to search for child pornography on Kazaa or something. Ultimately it'll probably just pull up legit porn, but somebody COULD design such a program.
Now, granted that, the prosecution should have made a serious attempt to disprove the defendants claims. I suspect they did otherwise.
One more thing (Score:5, Informative)
Re:Insanity (Score:2)
Re:Insanity (Score:2)
The point of justice is not actually what you think it is, either. It's rehabilitation.
Someone who is insane probably does not have an accurate view of reality - like in the example I listed earlier. Someone who goes around murdering people out of malice, knowing full well what he is doing is not necessarily insane, and certainly not by virtue of his actions by our legal definitons.
And that point about releasing people who are fo
Re:Insanity (Score:2)
What country to you live in, hippie!! THis heres america. Whe thro em into overcrowed prisons with basic cable where the classrooms have been turned into bunkrooms, becasue after 10 years of that, theyre bound to come out and not ever want to commit any heinous crimes like pot smoking ever again.
Re:Insanity (Score:2, Interesting)
What if you wake up in the middle of the night and find someone in your house hurting a family member. You approach the situation and the person starts running away. I do not know exactly what I would do but there is a chance that the average person would be inclined to chase him down and cause great harm with any weapon they could find. Does that mean you'd be a potential harm to society and should be locked up? You were never a treat to the general public, only someo
Re:Insanity (Score:2)
Lets say you have a wireless phone. Very common here in Europe. One day somebody comes by and notices that they have cracked your digital code. The digital codes are not that hard to crack. At that point the person makes a phone call and it turns out to be a murderer or terrorist (popular term these days). The question is if you are liable? Answer not likely since this was done without you knowing what is going on. At the worst you can be held as an
Re:Insanity (Score:2)
However, I don't think that a cell phone call is sufficient evidence to build a case around you without some other stuff - and yes, it is very conceivable that a number of circumstantial
Re:Insanity (Score:2, Insightful)
I don't care what is the reason sopmeone pumps the guy's head full of lead. Insane or sane. They need to be taken off the streets for everyone else's protection. No nonsense about "you were insane, so you should go free".
But then, what about "I was insane, it was temporary. Now at trial, I am sane. Because I was not responsible, I must not be punished."? Hey
RTFP (Score:2)
You don't go free after being declared NGRI. It's quite different than being declared not guilty. You go to a mental hospital until such time as some guy on some board decides that the hospital is correct and that you are sane. Until then, and that can be a long time after you've regained your sanity, you are in a mental hospital.
Thinking this through... (Score:4, Insightful)
And drinking is the interesting analogy because you generally begin sober and aware that drinking will lead to a lack of accountability. In many jurisdictions, this knowledge means you are still liable because the ultimate consequences are forseeable.
So now, what if I offered a site that wanted to distribute a banned kind of material (kiddie porn, secure encryption technology, that kind of thing) and it was known that anyone connecting could not legally ask for what they surely wanted. Isn't the obvious solution for me to make a virus that will "helpfully" download it for you? You'd just pay for "time at my site" browsing my fine HTML pages, not for the content. But, magically, the content would just get thrust upon you. Escort services use this dodge. Customer pays for time, not service. But customers get service, typically, or they don't come back. Still, legally, the transaction may be quite distinct from prostitution (so I'm told).
Then again, the escort service model obliges me to come to the issue of "victimless crime". Driving drunk and injuring someone has a victim, and we want to fix the legal system to minimize such cases. Escort services have no obvious victim, IMO, and so I'd argue the other way--that perhaps the simpler solution is just to legalize prostitution.
Child porn is caught in between these two scenarios, I think, with some parts of it falling into one scenario and some into the other. Certainly, if the pics are of real children, then that's bad. But it's within range of technology to make the entire industry based on fabricated images. Then who would be the victim? If no child was abused in the taking of the pictures, for all we know, the people in possession of them are sublimating urges they might otherwise carry out. Is taking the photos away going to cause them to not have the urge? Or just cause them to be out on the street seeking real children? We're so quick to make assumptions in this area, I just don't know why we don't just make a death penalty for anyone even suspected of child abuse or kiddie porn and be done with it mercifully, because nothing the person can do for the rest of their life after they're found in possession of something like this will ever be normal.
When I see a child being abused, it's not erotic to me. That it is to someone shouldn't make it a crime for me to see it--maybe I and all of us need to see that picture to understand someone's outrage about a crime. How do we know when someone is seeing something for a "legitimate" reason or not? There may be pictures of murders that arouse people, but we distinguish between "snuff films" (which are illegal because of their filming technique, not their content) and other films about murder, because murder is a fact of life we need to understand. I am alarmed at the concept that the mere possession of certain kinds of topic material, in and of itself, a crime. Who will study this crime if no one may possess its materials? Will images of murder, of feces, or other things that turn others on but not me one day also be illegal to possess? Where does it stop?
Sure--people are legitimately angry at people who harm children, and they want someone to punish. They can't catch the guy who makes it, so they find someone else to lash out at. (The drug war is the same way. Sometimes drugs cause problems, so we make all uses of drugs illegal whether they hurt anyone or not, just so there's always someone handy to punish when we're mad.) I just hope that in our rush to make it possible to punish people who too easily elude our present systems, we don't take away rights which are not causally related to any kind of harm. And I have to say, the idea of criminalizing the viewing a picture, any picture, in privacy, whether it's a field of daisies or a torture chamber somewhere, is
Re:Thinking this through... (Score:4, Insightful)
It is important to recognize, however, that the legal system is not an appropriate place to deal with medical issues. It does no good to this consumer, nor to society at large, and in particular the children within society, to deal with that person's mental problem, if it is such, by putting the person in prison. However, this is the approach that our society prefers to take, primarily, I presume, because it's easier than actually dealing with the real problem. The same holds true with current drug laws.
"It is important to recognize that in our society it is unacceptable not only to abuse children, but to enjoy abusing children ... That is why these laws are important."
It should never be illegal simply to enjoy something. If I happen to enjoy killing, that's one thing. If I actually go out and kill someone, that's another thing entirely. We have laws against that, and I don't propose that those laws be changed. But to simply be a person who enjoys killing, and not actually do it, should never be illegal. I should, in that case, seek professional help as a preventive measure. But let's not throw people in prison for thoughts, ideas, and desires -- even if those thoughts, ideas and desires are diseased.
Let the medical profession deal with diseases, and the police deal with criminal acts.
Comment removed (Score:4, Funny)
Re:perhaps... (Score:2)
Ever head of an attractive nuisance [nolo.com] ?
Re:perhaps... (Score:4, Funny)
Hmmm... (Score:4, Insightful)
Re:Hmmm... (Score:5, Funny)
What's the Point... (Score:5, Interesting)
Re:What's the Point... (Score:3, Interesting)
Re:What's the Point... (Score:4, Insightful)
Re:What's the Point... (Score:5, Insightful)
Didn't wreak havoc? The guy lost his 500 pounds a day job, didn't work for two years, got his named associated with child pornography...this trojan already made him lose out on two years of his own life. I'd say that constitutes as wreaking havoc.
Re:What's the Point... (Score:2)
Re:What's the Point... (Score:4, Interesting)
So, not only is it possible, it is being done.
I now run UNIX as much as possible--especially since one of my idiot roommates just switched us to RoadRunner (even after I told her about this happening......). This guy whose machine I worked on was behind a firewall, and he still got hacked. UNIX it is for me, thank you.
Highly redundant distributed filesystem. (Score:2)
Make it highly redundant, self healing, replicating data as the "servers" go offline to make sure the information remains available. Hell, I could use something like that here at work.
Re:Highly redundant distributed filesystem. (Score:2)
The goal is to hit 1 terrabyte
Re:What's the Point... (Score:2)
Sounded fishy at first... (Score:5, Interesting)
Re:Sounded fishy at first... (Score:2)
Though I certainly would not put it past a virus maker to attempt a little social sabotage. And it doesn't take much to get a trojan on your PC. A year or two ago I was repairing my mom's Windows machine, and discovered a trojan that had installed itself because she had sharing turned on (not even an open drive). The trojan its
Re:Sounded fishy at first... (Score:2)
Kinda makes you want to keep a compromised Windows box lying around, doesn't it?
Your honor, this Windows box used to be exposed to the net. It must have been compromised by some evil anonymous remote hacker prior to my acquisition of a firewall. That's where all these evil mp3's came from.
What's that? Yes, I did run Windows Update. But that must have occured after the box was root compromised.
(I can
Re:Sounded fishy at first... (Score:3, Insightful)
That may not help much. A couple years back, I inadvertently started a minor "research project" at a place I was working by checking out a link to a bit of cute satire sent to me by a friend. I chuckled at it a bit, and then forgot about it. For about one day. When I came in the next morning, the NT workstation that I'd used was showing a rather pornographic picture.
I quickly verified that the site was indeed
I must have lots of viruses.... (Score:5, Funny)
Re:I must have lots of viruses.... (Score:2, Funny)
Re:I must have lots of viruses.... (Score:4, Funny)
Me: "It was a virus! It downloaded it along with all the other pirated stuff on my computer and it even downloaded the DeCSS code! I don't even know how it got there!"
Prosecutor: "So how did you get that account on fragism.com?"
Me: "The virus stole my credit card # and signed me up! I had nothing to do with it!"
Simple defence... I have Windows XP! (Score:4, Funny)
Re:I must have lots of viruses.... (Score:3, Funny)
Baloney! You did it. You are guilty. You should be sued for $150 Billion. (Can't be taking food out of the mouths of artists now, can we.?)
Your defense does not hold up because, at present, there is no virus that credibly does the things you describe.
hint, hint, wink
Trojans (Score:4, Funny)
Rus
Won't Work (Score:3, Insightful)
I doubt this type of defense will help people who used their credit card to sign up for child porn sites.
Re:Won't Work (Score:3, Interesting)
With all the programs that offer to manage your financial account details, all it would need is an app that automatically fills in those credit card numbers for you when you go to buy something.
Then all you need is a Virus that can get at that data and bingo - a Virus that can sign you up to all sorts of things, and all in your name.
Now imagine if that Virus ran, signed you for an annual subscription to a porn site (at a time you were logged in and browsing) before deleti
Re:Won't Work (Score:3, Interesting)
Yeah, or if it passes through the machine in unencrypted form, even. This is why passwords and credit card numbers (and similar) suck, and why we need biometric identification instead. Credit card numbers are the worst, because you regularly show them to people at stores and whatnot.
Re:Won't Work (Score:3, Funny)
Re:Won't Work (Score:2, Interesting)
>porn, but also used his credit card information
>to sign up for the site, confirmed his
>subscription via email,
If it got his credit card details, registering to a porn site would be no problem. You don't even need his email.
This would be a viable defense IMHO.
--
GCP
Great defense. (Score:4, Funny)
Himmler: My orders were not from Hitler but from a virus.
Tim McVeigh: A virus filled that truck with diesel and fertilizer.
Magic Johnson: I didn't get AIDS from a woman but from a virus.
well.. ok, you can scratch the last one.
UK Law... (Score:5, Insightful)
Yet another example of why the decision to allow defendants in criminal trials to be named was a bad decision *sigh*.
As to the story - sounds strange that a trojan would do that unless someone was using his machine as a proxy and in that case why would the images be cached on his system?
Oh but you misunderstand! (Score:3, Insightful)
I personally think that we should skip the trials altogether. Sure, some innocent people will end up in the nonce wing for life, but it's kiddie porn!
Won't somebody please think of the children!
O.K, I'll stop now. I don't even know if I'm being sarcastic any more...
Could happen.... (Score:2)
The story doesn't seem entirely unlikely though.
A company I know had a server compromised some time ago and had a rootkit installed. They were then used as a warez ftp server.
Why would the cracker do that?
Maybe he was just after some disk space and a fat pipe?
But maybe, just maybe it was warez the cracker absolutely positively didn'
he lived near me (Score:5, Informative)
It's a bit of a wake up call to the moronic masses that people can be innocent as well as guilty!
I see (Score:2, Funny)
Why haven't I deleted them?...
*shifts eyes, and flees*
Don't blame the virus... (Score:2)
It sounds like you were just putting the finishing touches on the latest O'Reilly book:
Pr0n in a Nutshell.
Re:I see (Score:2)
So that's how those pictures of mating llamas got on my hard drive!
That would be the Jeff Minter virus ...
Chris
automated? (Score:2)
the largest security hole is the client machine (Score:5, Interesting)
The more it goes, the more I think that the main issue of online security is not the protocols (SSL, SET...) but the security of the endpoints, and particularly of the clients.
I would not be surprised if we found a virus that searches through the local (and even LAN-accessible) documents for interesting keywords or types of information, then somehow manages to send this information back to some spying agency. In fact, I think this has probably already been done.
Imagine the potential:Of course, most corporate networks are firewalled. Still, lots of binary data is exchanged. You just have to hide yours in the flux... Do you really think this would be noticed in the middle of a virus attack?. Traffic analysis would be thwarted by the viral attack sending information in many directions, with no obvious destination. Onion peel routing and distribution through Usenet or WWW bulletin boards could do the rest - untracable information.
Re:the largest security hole is the client machine (Score:3)
Which includes brain damaged users. I own two Linux boxes and several Windows machines and have yet to get a single virus on any of them.
That's because I only download software from known, trusted sources, carefully inspect attachments I wasn't expecting and NEVER open them directly from the e-mail package. It's OBVIOUS if an att
Re:the largest security hole is the client machine (Score:3, Informative)
There are so many of these Big Brother spying technologies, I don't even know where to begin. You should at least learn about Echelon II [slashdot.org], though.
the defense is a product of the offense (Score:2, Insightful)
Acquitted - but... (Score:5, Insightful)
As he found out from the vigilante attacks before his trial, the maxim "innocent until proven guilty" doesn't seem to apply for some people any more - the witch hunts led by certain newspapers mean that any slight suggestion of paedophilia turns the accused into an immediate fugitive.
Therefore, though it's very kind of the Crown Prosecution Service to accept this explanation at trial, why did they wait before it was up before a judge with all the attendant publicity before letting him off the hook?
In the minds of some people as well, there's going to be an attitude of "that's right, blame it on the computer - he would say that, wouldn't he?". Technology-based defences simply don't hold water for a lot of non-technical people - which with the increasing number of technological offences being put to juries is quite a worry.
So, this guy will still be stigmatised as a paedophile, all for the price of some virus checking software...
Re:Acquitted - but... (Score:2)
That maxim has never applied to me, as I have never been in a jury. As an individual, I have every right to make a judgement of guilt on my own. Of course, its probably not that wise of me to make such a judgement without all the pertinent facts (its called prejudism), but we're all free to make that judgement.
Case in point: If someone walks up to me an
Dubious....... (Score:3, Interesting)
This may have been a case where the jury and judge knew very little about the natures of trojan and computer.
Re:Dubious....... (Score:3, Interesting)
If these things were saved to his desktop or something, thats one thi
Re:Dubious....... (Score:5, Insightful)
Because those of us at Slashdot are more technically adept and let's face it - our computers are a major part of our day-to-day life - we assume incorrectly that everyday people are more capable with their computers and see them more than just a box that balances their checkbook.
Yeah righ! (Score:2)
Beyond that, my computer has hundreds of thousands of files on it, in total. I don't even know how many. I would never notice additions... unle
Negligence Or Delusion (Score:4, Interesting)
This case sounds interesting for a couple of reasons. The defendent's entire case is out the window, of course, if the prosecution shows that the virus was not responsible for downloading kiddie pr0n. Assume such a virus existed for the sake of argument.
First, there is negligence for allowing one's computer to become infected. A related precedent would be the owner of a condemned house allowing it to become a crack house. IANAL, but in a lot of ways it seems the cases are similar. One could claim that the software manufacturer (MS) was responsible for faulty software, or that the virus writer was responsible for letting loose his creation. In the same way, the crackhouse owner could claim that the lock manufacturer did a poor job, or that the addicts breaking into his house were at fault.
Second, if computers become more like personal extensions of ourselves, indispensible, parts of our consciousness in some far-fetched way, then the defendent might take the insanity route. That is, "God told me to take 7 wives and this girl is one of them." However, computers are subject to more detailed forensics that people's brains, so claiming an insane computer might not withstand much scrutiny in court.
Re:Negligence Or Delusion (Score:3, Insightful)
Someday, we may be able to claim this. But I'm really uncomfortable claiming it today.
A couple of computers got hacked. One of them was with a vulnerability that I hadn't even heard of yet in samba; I got my Debian announcement later that day.
Right now, even the most updated computer is just too full of vulnerabilities to make a valid case that it should be possible to maintain a computer that has no vulnerabilities at all. That
Re:Negligence Or Delusion (Score:2)
the most updated computer is just too full of vulnerabilities
Well, that probably says a lot about the overall state of computer security.
But if you've kept your system updated with the latest patches, then most people would think that you've exercised due diligence.
Re:Negligence Or Delusion (Score:2)
Re:Negligence Or Delusion (Score:2)
Unlike a crackhouse, which is an eyesore and reduces quality of life for the people around it...
A lot of people, myself included, would be inclined to believe that a insecured, vulnerable and 0wn3d computer on a high BW connection represents an inconvience and reduction in quality of life to the net community.
Getting a DDOS attack from compromised zombie machines is as bad as getting woke up in the middle of the night by gunshots coming from the crackhouse down the block.
err.... (Score:3, Funny)
Windows (Score:3, Funny)
--
cheap website hosting [cheap-web-...ing.com.au]
Re:Windows (Score:2)
Then again, if you download Britney Spears MP3s you don't need to go to jail, you need to go to an institution for the mentally & audibly handicapped instead...
Re:Windows (Score:2)
"You're under arrest!"
"No Officer, I swear that some hacker took over my computer and downloaded those Britney Spears songs. Honest!"
"Sorry son, but no hacker is that stupid. Come along..."
Re:Windows (Score:2)
You need to keep a compromised Windows box around. It needs to look like it also runs an open FTP server that someone else uses to stash their warez and mp3z.
Hey Judge! It must have been some hacker on my Windoze box. It used to be directly exposed to the net, but sometime in the past, I acquired a new firewall. So the evil intruder must have compromised my Win
Re:Windows (Score:2)
er.. excuse me, is there an uncompromised Windows box? The Windows auto-update and GoToMyPC can puch thru the built-in firewall!
It is safe only when you switch off your Windows computer.
Personal Responsibility Today (Score:3, Interesting)
With that out of the way, I find it amazing the lengths people will go to to blame anybody or anything for their actions but themselves. "I didn't download pictures of naked children, the computer did it!" or "I didn't willingly throw myself upon a flaming mattress, that show on MTV made me do it! or "I didn't want to get pregnant, it was HIS fault!"
I apologize for this somewhat offtopic rant, but it's this kind of lack of personal responsibility that's eroding our society.
Bogus story (Score:2)
Worrying precedent (Score:2, Insightful)
Bye bye Symantec... (Score:5, Funny)
Not unheard of (Score:5, Interesting)
Sure enough, as soon as he got his firewall up he got a slew of alerts about people trying to connect to his computer. I make sure I keep my firewall up at all times now.
Re:Not unheard of (Score:2)
Also, your brother needs a larger hard drive, 100+ gigs are cheap now!
Basically, the majority of the things "insert anyone but my name here" downloads, from xbox games to movies or new music albums is obtained the quickest from places like xdcc channels,
Re:Not unheard of (Score:2)
Firewalls are not the end-all be-all of security, and in many cases promote poor security habits. Turn off the stuff you don
Re:Not unheard of (Score:2)
Hmmm....I think we may found the problem right there. Have you told your brother that it was you yet?
My sad experience (Score:2)
Once I made several mistakes at the same time.
1 Applied an access list to a wrong interface on a router
2 Behind this router I put a Win2k computer, which had been configured for a private network. Computer name, admin account and password for this account was the same word.
One day I found that this computer had a remote control software and FTP server installed on it. I wouldn't be surprised to find some kiddie porn few days later, so I think that the story makes sense.
Yes! (Score:2)
I'll be damned if Norton will "Protect" me from the hoors of pr0n
I wonder how they found the images (Score:2, Interesting)
I suspect there's much more to this case than the articles mention.
Stupidity (Score:2)
M@
More realistically (Score:2)
I've also seen people's pc's hacked and used to serve up free porn and warez.
This particular case may be
Let's take this one step further (Score:5, Funny)
This isn't unrealistic with P2P (Score:2, Interesting)
Anyway, with P2P getting more sophisticated, efficient and private, I can easily see this happening a lot. Of course, I d
Re: (Score:2)
It's possible. I've seen it! (Score:5, Interesting)
I've seen and disinfected a laptop of a friend who was infected with a virus that downloaded porn pages in the background whenever he connected to the internet. I guess it was to collect link credits. His history and cache would fill up with porn crap and he claimed to not be visiting the sites. At first I didn't believe him (obviously) and was surprised when I saw the behavior for myself. Beware!
My experience… (Score:5, Interesting)
My first lesson with an improperly configured Linux box outside the firewall was when my ISP called asking about some insane bandwidth use. What? I checked the box and it seemed fine. Found out the traffic was on FTP, which I was not using. Sure enough, tons of porn and other files were getting uploaded and downloaded... all the files in a hidden directory. The box was owned, and I ended up rebuilding from scratch, this time leaving services off I did not actually use and patching some of the services I did. Than I discovered ssh and a few other key insights that were new to me.
I cannot believe I am the only one this kind of thing happened to...
Re:My experience… (Score:5, Interesting)
Most new Linux folks (myself included) go through the "I don't see why I can't run as root; I know what I'm doing" phase of sysadminning. They also go through the "I'll give everyone I know accounts on my system" phase of sysadminning. Once they get owned a couple of times, most of them learn and don't do that anymore.
No Judge... (Score:5, Funny)
It's not like this hasn't happened before (Score:2, Interesting)
Could it possible that this (or something similar) can get an innocent victim arrested? In a less technologically literate or a far more fundamentallist culture, the "virus did it" defense probably won't work . . .
ISPs and spying makes this worse (Score:2, Insightful)
In this case a crime was committed. Whether the crime was committed by the accused or some unknown third party is irrelevant. All that is relevant is known security hole
Get around RIAA (Score:2, Insightful)
Computers are dogs. (Score:3, Interesting)
So, the day has come at last. I must say I'm surprised, as I've been expecting it for over 5 years.
The point is that the law has to decide how much responsibility a person has for what their computer decides to do.
Up till now, the assumption has been that whatever your computer does, is done at your request, and you are wholly responsible. This despite the fact that that has never been true, and is getting further from the truth every year.
There is no legal tradition to apply here. The nearest analogy to the relationship between a person and his computer is the relationship between a man and his dog.
People have kept dogs for thousands -- most likely tens of thousands -- of years, so everyone has a rough idea what the deal is. The general legal view is that you have a duty to keep your dog from causing harm under forseeable circumstances, but there is a distinction between what your dog does and what you do. If your dog attacks a child, you are not guilty of Grievous Bodily Harm, but you might be guilty of keeping a dangerous dog. If your dog craps on the street, that is different than if you crap on the street, but you might still be fined.
If you are found guilty of not properly controlling a dog, you can be banned from keeping one. If your dog causes harm and is considered not to be controllable, the court can order it to be destroyed.
(If you deliberately cause your dog to kill someone, that is still murder of course, but your intention is crucial)
This is the only rational legal framework for crimes committed by a computer without the intention of its owner.
When will computers that run MS-Windows be ordered to be put down?
First off.... (Score:3, Insightful)
How can they tell? (Score:4, Insightful)
I imagine many of you have used P2P apps like KaZaA. I'd bet money that almost all of you even downloaded some porn with it. Don't be bashful. There's nothing wrong with it. However I'm sure you too have noticed the overwhelming amount of BS crap files that get turned up in searches. Many of them say "underaged" or "pre-teens" or many other things that indicate a minor child. And many of them are pure junk and are simply pictures ripped from a Girls Gone Wild video. However some times you end up downloading a picture you just can't identify. You really can't tell if those are kids, flat-chested and baby-faced college seniors, or midgets. If you don't delete these files and leave them on your computer, are you now guilty of having child pornography if someone proves that the picture you downloaded 1 year ago and is still in you junk directory?
Lets say for example that your ex knows you have porn on your computer. Hell she and you used to watch it together. You break up with her and she's pissed. She makes an anonymous call to the police one night when drunk. The next day and overzealous police officer has a warrant from a judge looking for some good PR for the election coming up. They confiscate your computer and arrest you, even though all they have as proof is the anonymous tip. A lab goes through your hard drives and CDs while you're grilled by a cop with bad breath over how you abuse children. You don't want to call for a lawyer because you don't want to seem guilty. You think it's all a big mistake. The lab boys come back with the porn. The cops browse through it. A picture comes up of Devon in her early years. "Does she look like a minor to you, Bob?" "She sure looks like a minor to me, Chuck." They arrest you and charge you with child pornography, even though they have confirmed that the person in the photo is a minor. The PD and DAs office goes public to say how they've arrested a vile child pornographer. Media coverage. Citizen outrage at him. yadda yadda yadda. In the meantime he's arrained. This gives an assistant DA time to go through all the porn on the hard drive. Whoops. It turns out that the photo the cops thought was child porn wasn't. Hell it obviously wasn't. Damn overzealous cops. Nevertheless he goes through all the porn. He even enlists the help of a person in the pornography business who can recognize many of his fellow actors. Finally they come down to a small handful of pictures that no one can identify. Of these 3 could be of a minor. The DA picks the most child-like photo as proof and goes to trial. The prosecution paints the defendant as a vile, horrible child pornographer. A few of his ex-girlfriends step into the lime light to say how he was abusive or was obsessed with kids or some other bullshit like that. The defense lays out the facts of law and that the photo can't
Re:wow (Score:2)
Isn't that normal for a windows machine?
Re:Pete Townsend (Score:2, Offtopic)
Stop trying to be clever. It's not working.