{"id":15122,"date":"2014-12-26T01:58:23","date_gmt":"2014-12-26T06:58:23","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=15122"},"modified":"2014-12-28T10:43:23","modified_gmt":"2014-12-28T15:43:23","slug":"no-rep-in-peer-to-peer-file-sharing-yes-that-issue-is-still-raised","status":"publish","type":"post","link":"https:\/\/fourthamendment.com\/?p=15122","title":{"rendered":"No REP in peer-to-peer file sharing. Yes, that issue is still raised"},"content":{"rendered":"<p>Defendant&#8217;s computer was on the Gnutella peer-to-peer network. The police went in and found 1571 files for sharing and did a software driven search and found child porn on some of them. A week later they went back and found more. There was probable cause for the search warrant for the computer and for associated computer storage devices that might also be found in the same house. August from the entry into the computer to January for the SW wasn&#8217;t stale. United States v. Hawkins, 2014 U.S. Dist. LEXIS 175562 (W.D. Pa. December 19, 2014).<\/p>\n<p>One who leaves his computer on with a file sharing program running has no reasonable expectation of privacy in the files that can be obtained. Here, police were running a training program showing other officers how it was done and, in the class exercise, they went into defendant\u2019s open computer and, running a program looking for the hash values of known child pornography, found several images on defendant\u2019s computer. That led to a search warrant. <a href=\"http:\/\/www.appeals2.az.gov\/Decisions\/CR20130492%20Opinion.pdf\">State v. Welch<\/a>, 2014 Ariz. App. LEXIS 256 (November 14, 2014). [Note: One analogy is putting a sign on your house saying: \u201ccome in and take whatever you want; leave something if you can.\u201d How can anyone have a reasonable expectation of privacy in such circumstances?]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Defendant&#8217;s computer was on the Gnutella peer-to-peer network. The police went in and found 1571 files for sharing and did a software driven search and found child porn on some of them. A week later they went back and found &hellip; <a class=\"more-link\" href=\"https:\/\/fourthamendment.com\/?p=15122\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,18],"tags":[],"class_list":["post-15122","post","type-post","status-publish","format-standard","hentry","category-computer-searches","category-reasonable-expectation-of-privacy"],"_links":{"self":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/15122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15122"}],"version-history":[{"count":2,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/15122\/revisions"}],"predecessor-version":[{"id":15221,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/15122\/revisions\/15221"}],"wp:attachment":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}