{"id":18880,"date":"2015-09-19T05:05:13","date_gmt":"2015-09-19T10:05:13","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=18880"},"modified":"2015-09-19T05:05:13","modified_gmt":"2015-09-19T10:05:13","slug":"w-d-okla-the-detailed-nature-of-how-cp-file-sharing-tracking-software-works-isnt-required-to-show-pc","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=18880","title":{"rendered":"W.D.Okla.: The detailed nature of how CP file sharing tracking software works isn&#8217;t required to show PC"},"content":{"rendered":"<p>In a child pornography investigation, DHS used investigative software named Torrential Downpour which is used to track file sharing on P2P computers looking for child porn for transfer and monitoring data flow. There is no reasonable expectation of privacy in P2P file sharing. \u201cThe material fact law enforcement was obligated to disclose was its use of investigative technology to track, identify, and download the files from Defendant&#8217;s computer. This fact was fully disclosed. More exacting details and disclosures simply were not required to establish probable cause.\u201d United States v. Maurek, 2015 U.S. Dist. LEXIS 123449 (W.D.Okla. September 16, 2015).<\/p>\n<p>There is no reasonable expectation of privacy in P2P file sharing. United States v. Carter, 2015 U.S. Dist. LEXIS 123690 (N.D.Ohio September 16, 2015).*<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a child pornography investigation, DHS used investigative software named Torrential Downpour which is used to track file sharing on P2P computers looking for child porn for transfer and monitoring data flow. There is no reasonable expectation of privacy in &hellip; <a class=\"more-link\" href=\"http:\/\/fourthamendment.com\/?p=18880\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,18],"tags":[],"class_list":["post-18880","post","type-post","status-publish","format-standard","hentry","category-franks-doctrine","category-reasonable-expectation-of-privacy"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/18880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=18880"}],"version-history":[{"count":1,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/18880\/revisions"}],"predecessor-version":[{"id":18881,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/18880\/revisions\/18881"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=18880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=18880"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=18880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}