Personally, I would contact the FBI quickly - and keep my hands off of it. It's the right thing to do for any children who might be victimized.
On Wed, Sep 9, 2009 at 9:02 PM, Michael Dickey <[email protected]> wrote: > Personally, I think I would wipe it clean off. That's not something I'd > like to ever mess with or run afoul of. > > But there may be value in forensically examining the files or the victims, > so it might be best to report the incident and turn over evidence. > > This might make a good opportunity to introduce yourself to your local > field office. :) Maybe someone in a local Infragard chapter can put you in > touch with someone cyber-friendly at the local office? > > By the way, Adrian, excellent question! > > > On Wed, Sep 9, 2009 at 8:49 PM, Adrian Crenshaw <[email protected]>wrote: > >> >> While doing research on anonymizing networks, what is the best policy to >> follow concerning inadvertently captured contraband (child porn, copyright >> infringing files, etc.)? In the case of child porn, the authorities should >> be notified under normal circumstances, but with anonymizing networks the >> origin of the files is hard if not impossible to determine. Would it be >> correct to just wipe the data after research on the network is done? As I >> understand it, even having it on your hard drive because of peripherally >> relevant research would be a crime. >> >> Adrian >> >> _______________________________________________ >> Pauldotcom mailing list >> [email protected] >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >> Main Web Site: http://pauldotcom.com >> > > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com > -- Connie
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
