Grossman, 2004 - Google Patents
No, don't IM me-Instant messaging, authentication, and the best evidence ruleGrossman, 2004
- Document ID
- 3991022152075333044
- Author
- Grossman A
- Publication year
- Publication venue
- Geo. Mason L. Rev.
External Links
Snippet
You are defending a client who stands charged with importuning a 14-year old (really a police detective). The crime took place during an instant message conversation, and the only evidence of the crime is an instant message log that the prosecutors would like to admit …
- 230000001568 sexual 0 abstract description 16
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Real-time or near real-time messaging, e.g. instant messaging [IM] interacting with other applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/28—Details regarding addressing issues
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tsikerdekis et al. | Online deception in social media | |
Wortley et al. | Internet child pornography: Causes, investigation, and prevention | |
Mason et al. | Electronic evidence | |
Steele et al. | Cyber crime investigations: Bridging the gaps between security professionals, law enforcement, and prosecutors | |
Shinder et al. | Scene of the Cybercrime | |
Chase et al. | You've got dissent! Chinese dissident use of the Internet and Beijing's counter-strategies | |
Grimm et al. | Authenticating digital evidence | |
Goode | The admissibility of electronic evidence | |
Watson et al. | Social engineering penetration testing: executing social engineering pen tests, assessments and defense | |
Strutin | Social media and the vanishing points of ethical and constitutional boundaries | |
Raynes-Goldie | Privacy in the age of Facebook: Discourse, architecture, consequences | |
Schell et al. | Webster's new world hacker dictionary | |
Kierkegaard | Twitter thou doeth? | |
Marcum et al. | Social networking as a criminal enterprise | |
Ohm | Probably probable cause: The diminishing importance of justification standards | |
Bosua et al. | Going public: Researching external whistleblowing in a new media age | |
Robbins | Writings on the Wall: The Need for an Authorship-Centric Approach to the Authentication of Social-Networking Evidence | |
Grossman | No, don't IM me-Instant messaging, authentication, and the best evidence rule | |
Ndyulo | Protecting the Right to Identity against Catfishing: What’s the Catch? | |
Shimonski | Cyber reconnaissance, surveillance and defense | |
du Pont | The time has come for limited liability for operators of true anonymity remailers in cyberspace: an examination of the possibilities and perils | |
Rand | What Would Learned Hand Do: Adapting to Technological Change and Protecting the Attorney-Client Privilege on the Internet | |
Borradaile | Defend dissent | |
Stephen et al. | Electronic Evidence | |
Brown et al. | I see what you did there: The use of social networks to gather evidence |