{"id":4822,"date":"2010-10-27T09:12:53","date_gmt":"2010-10-27T09:11:57","guid":{"rendered":""},"modified":"-0001-11-30T00:00:00","modified_gmt":"2010-10-27T09:11:57","slug":"en-US","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=4822","title":{"rendered":"W.D.Ky.: PC for CP was shown off hashmarks on image found on a German computer associated with a US IP address"},"content":{"rendered":"<p>The search warrant for defendant\u2019s computer for child pornography was not stale when the information was only ten months old, considering that CP is commonly kept for a long time. The probable cause here was based on a known CP file with a specific hash value being accessed in Germany from an IP address in the U.S. which was sent by German police to ICE which established that during the relevant time period was associated with defendant. The government also showed in the affidavit that defendant was involved with CP before that. United States v. Hampton, 2010 U.S. Dist. LEXIS 112970 (W.D. Ky. September 10, 2010).* <\/p>\n<p>See Ralph C. Losey, Hash: the New Bates Stamp, 12 J. Tech. L. &amp; Pol&#8217;y 1, 12 (2007):<\/p>\n<blockquote><p>What is hash? As the term is used today in electronic discovery, it is neither a food nor an illegal substance; hash is a mathematical process. To be precise, hash is an encryption algorithm. Hashing generates a unique alphanumeric value to identify the total combination of bits and bytes that make up a particular computer file, group of files, or even an entire hard drive. The unique number of a computer file is its hash value, also known in mathematical parlance as the &#8220;condensed representation&#8221; or &#8220;message digest&#8221; of the original message. It is more popularly known today as a &#8220;digital fingerprint.&#8221;\n<\/p><\/blockquote>\n<p>[This is case is proof that one cannot even access child porn in another country without the U.S. government being able to find out about it.]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>b2evALnk.b2WPAutP <a class=\"more-link\" href=\"http:\/\/fourthamendment.com\/?p=4822\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"","ping_status":"pingsdone","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-4822","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/4822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4822"}],"version-history":[{"count":0,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/4822\/revisions"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4822"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}