[go: up one dir, main page]

Grossman, 2004 - Google Patents

No, don't IM me-Instant messaging, authentication, and the best evidence rule

Grossman, 2004

Document ID
3991022152075333044
Author
Grossman A
Publication year
Publication venue
Geo. Mason L. Rev.

External Links

Snippet

You are defending a client who stands charged with importuning a 14-year old (really a police detective). The crime took place during an instant message conversation, and the only evidence of the crime is an instant message log that the prosecutors would like to admit …
Continue reading at heinonline.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Real-time or near real-time messaging, e.g. instant messaging [IM] interacting with other applications or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/28Details regarding addressing issues

Similar Documents

Publication Publication Date Title
Tsikerdekis et al. Online deception in social media
Wortley et al. Internet child pornography: Causes, investigation, and prevention
Mason et al. Electronic evidence
Steele et al. Cyber crime investigations: Bridging the gaps between security professionals, law enforcement, and prosecutors
Shinder et al. Scene of the Cybercrime
Chase et al. You've got dissent! Chinese dissident use of the Internet and Beijing's counter-strategies
Grimm et al. Authenticating digital evidence
Goode The admissibility of electronic evidence
Watson et al. Social engineering penetration testing: executing social engineering pen tests, assessments and defense
Strutin Social media and the vanishing points of ethical and constitutional boundaries
Raynes-Goldie Privacy in the age of Facebook: Discourse, architecture, consequences
Schell et al. Webster's new world hacker dictionary
Kierkegaard Twitter thou doeth?
Marcum et al. Social networking as a criminal enterprise
Ohm Probably probable cause: The diminishing importance of justification standards
Bosua et al. Going public: Researching external whistleblowing in a new media age
Robbins Writings on the Wall: The Need for an Authorship-Centric Approach to the Authentication of Social-Networking Evidence
Grossman No, don't IM me-Instant messaging, authentication, and the best evidence rule
Ndyulo Protecting the Right to Identity against Catfishing: What’s the Catch?
Shimonski Cyber reconnaissance, surveillance and defense
du Pont The time has come for limited liability for operators of true anonymity remailers in cyberspace: an examination of the possibilities and perils
Rand What Would Learned Hand Do: Adapting to Technological Change and Protecting the Attorney-Client Privilege on the Internet
Borradaile Defend dissent
Stephen et al. Electronic Evidence
Brown et al. I see what you did there: The use of social networks to gather evidence