Duh, Don't Leave A Thumb Drive With Child Porn Plugged Into A Shared Computer

from the plain-view dept

Jim submitted this story about a paramedic who left a thumb drive containing child pornography plugged into a shared computer. A coworker later found the files on the thumb drive, and the owner of the drive was brought up on charges for the offending files.

Obviously child pornography is a serious crime and needs to be stopped; that's not the issue that is in question here. As law professor Orin Kerr points, out, the concern here is whether or not looking through the contents of an inadvertently plugged in thumb drive constitutes an unreasonable search and seizure and a violation of our fourth amendment rights. In this case, United States v. Durdley, the district court ruled that leaving a thumb drive in a shared computer removed an expectation of privacy since no extraordinary means were necessary to access those files:
Durdley's files were exposed to anyone who sat down at the computer station who used the traditional means for opening and viewing files (such as Windows Explorer and the My Computer icon). Johnson encountered the files without employing any special means or intruding into any area which Durdley could reasonably expect to remain private once he left the drive attached to the common-use computer. The Court concludes, therefore, that Mr. Durdley had no more reasonable expectation of privacy in the contents of the thumb drive once he attached it to the common-use computer than the defendant in King did in his drive once he attached it to the airbase network.
Kerr disagrees with the ruling, and equates leaving a thumb drive plugged into a shared computer to leaving luggage in a bus terminal:
I think the social norm is that when you see a private person's thumb drive on a shared-use computer, it's understood that you're invading that person's privacy if you start clicking around to see what the files are. It's kind of like someone leaving their luggage in the waiting room of a bus station. If the owner leaves the luggage behind for some reason, no one would see that as a waiver of privacy rights in the luggage or an invitation to unzip the luggage and look around.
It's hard to see how opening someone else's luggage is remotely close to looking at files on a thumb drive. Whereas luggage has clear physical boundaries, once a thumb drive is part of a file system, those barriers no longer exist. After all, when a thumb drive is plugged into a PC, it appears as a drive under "My Computer" and looks very similar to the other drives attached to the computer. So, if we really want a real-world analogy, a more appropriate one would be an open suitcase in a public bus station. Sure, while it's kind of nosy to peek inside, things in plain view have long been understood to not be protected under the fourth amendment.

So, the moral of the story is, if you have files you don't want people looking at, it's best to not leave your thumb drives plugged into shared computers. Even better, don't have illegal files in the first place.
Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: fourth amendment, privacy


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • icon
    Rose M. Welch (profile), 22 Apr 2010 @ 2:13am

    More like an unzipped suitcase in a public bus station.

    Because the files on the drive are accessible, but you have to navigate to them to actually see what's in there. The unzipped suitcase is accessible, but you have to open it to actually see what's there.

    To be like an open suitcase, he would have had to open some files, and then walk away from the computer. Then you can see what's there without having to open the files, or the suitcase.

    link to this | view in chronology ]

    • icon
      slander (profile), 22 Apr 2010 @ 8:52am

      Re:

      No, the open suitcase analogy is right because anyone passing by (casual browsing) can look down and see the KP. Opening the files is analogous to opening up his November issue of Loli-Land and shoving the centerfold in someone's face...

      link to this | view in chronology ]

    • identicon
      Anonymous Coward, 22 Apr 2010 @ 9:26am

      Re:

      Thumb drive ownership is not like suit case ownership, suit cases could possibly can be traced back to an owner with many methods whereas a thumb drive is much harder to prove ownership.

      I could easily put a thumb drive into anyone of my co-worker's computers (I work at a tech reseller, 100's of computers around) to get them fired, blackmail, etc. There are hundreds of them laying around. The same thing could happen to me.

      Proving ownership should be the standard, not just discovering the evidence.

      link to this | view in chronology ]

      • identicon
        Anonymous Coward, 22 Apr 2010 @ 9:46am

        Re: Re:

        Now that they have probable cause, I'm sure they could get a warrant for the HDD on his home computer? I'm sure a quick scan would easily prove or disprove ownership. Judging by this guy's level of technical skill, if he is truly guilty, it's likely to all be in an aptly-named folder on his desktop.

        If it is a plant, then his drive should come up clean. Now, I don't want to set off a "OMG guilty until innocent!!!" argument. They already have the guy, so it is reasonable for them to want to fully investigate his belongings to see if he is innocent or guilty.

        link to this | view in chronology ]

  • icon
    BearGriz72 (profile), 22 Apr 2010 @ 3:14am

    Not an easy call...

    This case makes for a tough call, the liked article says "[The Defendant] was an emergency paramedic for the local county who was at work using a shared computer. When he was done using the shared computer, he forgot to take away the thumb drive had attached to one of the computer's USB ports. Later on, a captain of the paramedic team [Name Removed] was using the computer and saw the thumb drive attached. [The Captain] decided to see what was on the thumb drive".

    There a are a few issues here, now often evidence discovered by a civilian even if the search would have been improper by law enforcement standards is still considered admirable as long as that person was not acting as an agent of said law enforcement, however because they were county employees that question gets a little muddy. On the other side of the equation is the fact that this was a work computer, with most employers you agree to the fact that those systems are NOT considered private in any way. Therefore when (presumably) his supervisor inspected what was being done with that machine, it was quite likely perfectly legitimate.

    link to this | view in chronology ]

    • icon
      Richard (profile), 22 Apr 2010 @ 3:46am

      Re: Not an easy call...

      Therefore when (presumably) his supervisor inspected what was being done with that machine, it was quite likely perfectly legitimate.

      No it isn't. Suppose that drive had been left by a more senior officer and contained confidential information about other employees outside the supervisors area of responsibility.

      Alternatively, even if the owner is identified as an employee in the supervisor's area of responsibility there are all kinds of private information that could quite legitimately be there that it would be improper for the supervisor to access.

      To my mind the situation is quite clear. You don't poke around in what isn't yours without permission from the owner - except in the cause of finding out who the owner is.

      The suitcase analogy is somewhat flawed, however I would say that anything that is clearly visible (an open file or perhaps a top level directory listing - assuming that the drive name doesn't clearly identify the owner) is OK - but opening files or sub-directories is not - just like you wouldn't assume that the suitcase being open means that you can open up the washbag inside it.

      link to this | view in chronology ]

      • icon
        R. Miles (profile), 22 Apr 2010 @ 3:58am

        Re: Re: Not an easy call...

        "To my mind the situation is quite clear. You don't poke around in what isn't yours without permission from the owner - except in the cause of finding out who the owner is."
        Sorry, but you're mistaken here. The first thing one must do is recognize who owns the computer in question.

        From this position, the owner certainly has full rights to view anything on their machine. In this regard to the article, any employee had every right to search the computer's open ports storing files.

        If owners are concerned about issues like this, they would have prevented any need to attach additional storage for which the computer itself was not capable of providing on its own.

        Now, had this been a computer at "Local Cafe", the line gets gray. Truth be told, most people will fish in files which don't belong to them, if not only out of curiosity (or possible identification) to return the thumb drive.

        However, at this point, "Local Cafe" would be completely justified to re-attach the thumb drive to ensure their systems weren't compromised or additional files were not added. Owners should have this power (just as they have the power to block).

        I concur, in part, with the moral. But the better moral would be "Don't be stupid to use a personal drive on public computer". The risks to the data increase if one is completely unaware how the computer is set up.

        It blows my mind how people still remain PC illiterate despite them being commonplace for over 20 years now.

        link to this | view in chronology ]

        • icon
          vivaelamor (profile), 22 Apr 2010 @ 4:49am

          Re: Re: Re: Not an easy call...

          "It blows my mind how people still remain PC illiterate despite them being commonplace for over 20 years now."

          Sometimes I get the sense that people do so intentionally to reduce responsibility. Contrast it with real world examples and it can seem stupid; if I don't post a letter properly it is my fault not the person who handles the mail.

          Back to the story. While it would not make sense to do so, it is feasible for a computer to be set up to index files on all attached drives. Should that be seen as an unauthorised search? Many sane Windows admins do in fact mandate full scans on any attached media, would that be a violation also? You may even have an audit policy in place for particularly secure environments that tracks information about attached devices in case of an attack attempt.

          From the over side, what is the difference between viewing your secure private email on a shared computer (reasonable expectation of privacy) and viewing information on an attached device? I would argue that you only have a reasonable expectation of privacy on the email because you have made attempts to secure it, any sane browser should not cache HTTPS sites by default because it is presumed that they are private. Had the information on the drive been encrypted then as long as it stays on the device I would say there would be reasonable expectation of privacy.

          link to this | view in chronology ]

      • identicon
        Anonymous Coward, 22 Apr 2010 @ 8:27am

        Re: Re: Not an easy call...

        "To my mind the situation is quite clear. You don't poke around in what isn't yours without permission from the owner - except in the cause of finding out who the owner is."

        To my mind, the situation isn't nearly as clear.

        When I attach my thumb drive to someone else's computer, it becomes a part of that machine. I expect that any process in that machine may access the data on my thumb drive. The drive becomes, in effect, public space as soon as I plug it into any machine that I don't own.

        If I have information that is actually private (and I do -- business plans, etc.), then I encrypt it while it's on the drive.

        link to this | view in chronology ]

  • icon
    Richard (profile), 22 Apr 2010 @ 3:26am

    I would expect someone who found an unknown thumb drive attached to a computer to have a look through the files. I actually have a file in the root of my thumb drive that says "I belong to . Please give me back".
    I believe a better analogy would be a piece of paper left in the out tray of a printer. You would simply expect people to read it to find out who printed it so that it could be given to them.

    link to this | view in chronology ]

    • icon
      Cohen (profile), 22 Apr 2010 @ 7:13am

      Totally agree

      Unless there was some sort of label attached to the drive with name and contact info, it is totally reasonable for someone to open the drive, even if they know it is the private thumb drive, to discover who owns it.

      But I disagree with the concept of the luggage in the bus terminal as not something that should be opened. If the luggage has no luggage tag, there is no way to figure out who owns it.

      And many people have been told by airlines and travel experts to put their name, contact information, and destination in a piece of paper inside the luggage to help someone find them should the luggage be lost and the tag missing.

      link to this | view in chronology ]

    • icon
      Dennis Yang (profile), 22 Apr 2010 @ 9:07am

      Re:

      Aha.. yes. the left printout in a shared printer is a great analogy -- the printout would be face down, so you'd have to pick it up to look at what was on it, but there's no real social norm that would make you feel bad or creepy for just glancing at it.

      Good one. Thanks.

      Yah, I used the bus station analogy since Kerr used it in his post analyzing the case, so I just modified his analogy a bit.

      The shared printer analogy works particularly well because it makes the additional distinction between a "shared space" and a "public" place.

      link to this | view in chronology ]

  • icon
    Richard (profile), 22 Apr 2010 @ 3:35am

    Anoyther case

    Say I (as a University lecturer) use a thumb drive in a common access lab computer.

    If I leave it behind and a student searches through the files, finds and makes a copy of a "live" exam paper I would say the student has committed an academic misconduct.

    My expectation would be that anyone finding the drive might look through the directory listing to see if there is a file that would help identify the owner - but beyond that it is a no-no.

    link to this | view in chronology ]

    • icon
      Cohen (profile), 22 Apr 2010 @ 7:17am

      A file that might identify the owner

      What if the file that identifies the owner is labeled "Pictures of kids"

      Wouldn't it be logical and expected that a co-worker would open those files to see if they recognized any of the "kids".

      Remember, it's a shared computer for a limited number of people who are affiliated with each other.

      The co-worker could have the most benevolent of motives to look at the files.

      And the owner of the thumb drive really has no expectation of privacy.

      link to this | view in chronology ]

      • icon
        Chronno S. Trigger (profile), 22 Apr 2010 @ 9:03am

        Re: A file that might identify the owner

        It's not even that complex. Windows (assuming this PC is windows based) has a tendency to default to thumbnail view if there are enough pictures in that directory. This guy may not have had to click on anything at all.

        I would like to point out to the University Lecturer that you knew the PC was public and you knew you were plugging your USB drive into said public PC. The consequences are yours. If you are so worried about it, encrypt your files (it's not that hard).

        link to this | view in chronology ]

  • identicon
    OtherKevin, 22 Apr 2010 @ 3:39am

    Not to rain on the parade, but I suspect that if you left your luggage unattended in a bus station, train station, or airport then you would be virtually guaranteed that someone would go through it. Most likely someone from security/TSA or the Police.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 22 Apr 2010 @ 3:44am

    I think it's a violation of privacy. That said, I've never felt that discovering grossly criminal misconduct through a search like this should be discounted.

    But let's say it's not wrong. Do you have a reasonable expectation of Microsoft not searching everything on your thumbdrive and sending that back to Redmond?

    I just don't see where it stops. The suitcase is a valid analogy, you click a few buttons and it opens. The same is true of a flash drive. You can't see it, unless you click on it.

    link to this | view in chronology ]

    • icon
      btrussell (profile), 22 Apr 2010 @ 4:25am

      Re:

      "I think it's a violation of privacy"

      It is in "My Computer."

      "You can't see it, unless you click on it"

      If I do a search on the PC for ".jpg" I don't necessarily look at the source of the file before viewing AND the thumb drive will be included in the search and return results if they match the criteria.

      link to this | view in chronology ]

      • icon
        Richard (profile), 22 Apr 2010 @ 5:24am

        Re: Re:

        When you see the thumb drive you know it's there - so you should remove it before searching.

        Also note that such search capabilities are typically disabled in publically accessible machines (they are at my University).

        link to this | view in chronology ]

        • icon
          IshmaelDS (profile), 22 Apr 2010 @ 8:39am

          Re: Re: Re:

          1)Not everyone has computers that have USB ports in the front of the computer.
          2)unless the computer is on the desk I'm not going to notice the thumbdrive unless I'm plugging my own in.

          link to this | view in chronology ]

  • identicon
    Anonymous Coward, 22 Apr 2010 @ 4:07am

    This is why all businesses and agencies need effective acceptable use policies that spell out the penalties for violating said policy, and clear warnings that using government or company owned equipment means you have no expectation of privacy. Any time you log on to a DoD computer system you are presented with a warning banner that spells this out.

    This is part of the reason that the DoD has banned thumb drives: they're too easy to lose or misplace and too often contain sensitive or even classified information.

    link to this | view in chronology ]

    • icon
      Richard (profile), 22 Apr 2010 @ 5:26am

      Re:

      his is why all businesses and agencies need effective acceptable use policies that spell out the penalties for violating said policy, and clear warnings that using government or company owned equipment means you have no expectation of privacy.

      Those same regs will tell you not to poke around in stuff that doesn't concern you.

      link to this | view in chronology ]

      • identicon
        Any Mouse, 22 Apr 2010 @ 6:51am

        Re: Re:

        If I'm your boss, and you plug something into my computer network? It concerns me. Period.

        I don't get where people can ever believe anything you put onto a WORK COMPUTER is private. Seriously. You do not own the system. Yeah, you own the thumb drive, but you're using company equipment to access it. There goes your right to privacy.

        link to this | view in chronology ]

      • identicon
        Anonymous Coward, 22 Apr 2010 @ 7:48am

        Re: Re:

        Define "poke around." This wasn't looking inside a system directory or even somebody else's My Documents folder. If you were looking for a file and did a search on the whole system and it pulled up questionable files, legally you can report it to the sysadmin and they can start an investigation.

        Since it is a shared machine it is reasonable to expect that any user might need to do a full search at any given time, and the search very well could return thumbnails of the images.

        link to this | view in chronology ]

    • identicon
      van692, 22 Apr 2010 @ 5:51am

      Re: #9

      Here's an example line of the computer usage policy at my place of employment. All employees are required to sign the policy prior to being hired.

      "CompanyX reserves the right to routinely audit systems usage for violations of the Computer and Systems Resources Acceptable Use Policy by authorized personnel, without advance notice to the user. Both activity and/or content may be monitored."

      link to this | view in chronology ]

      • icon
        Richard (profile), 22 Apr 2010 @ 8:01am

        Re: Re: #9

        CompanyX reserves the right to routinely audit systems
        is NOT the same thing as a random employee looking at files on someone else's thumbdrive - nowhere near.

        link to this | view in chronology ]

  • icon
    BwainHertz (profile), 22 Apr 2010 @ 4:54am

    Who put the content there?

    Just a simple thought... A drive plugged into a system can have content put there by anyone. How do you prove who put it there? Did the hapless fool even know that content was there?

    Back to bus station, put something stolen that you don't want to be caught with into a pocket of an open case and wait to pick it up after customs.

    Stool Pigeon

    link to this | view in chronology ]

  • identicon
    John Doe, 22 Apr 2010 @ 5:08am

    Not unlawful search...

    It was not an unlawful by the police as the police were not the ones to find it and initially search it. A co-worker did and reported it. Once reported, the police had probable cause to search it themselves. So if anything, the co-worker invaded the guys privacy, but the police were within the law to act on it.

    Now "license check" road blocks on the street is an example of unlawful search.

    link to this | view in chronology ]

  • icon
    Andy (profile), 22 Apr 2010 @ 5:09am

    Analogy

    Actually - I believe that the anology to any suitcase is tenuous at best. Luggage left unattended in a public transportation station is most likely not protected from search by authorities - especially in this day and age. It is probably required for most unattended luggage to be searched.

    In the case of the thumbdrive - it could be argued that the perosn who finds it is reasonably expected to look at the files to try and determine ownership. Or at the leat - semi-polite to see if perhaps pictures can be found that could help return the dirve to the owner. If the person who found it saw who left the drive than they probably should have jsut pulled it and handed it to the owner. However, when people find electronic devices - picture files are the most common place to find clues concerning ownership - which would explain why the pictures were found so easily.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 22 Apr 2010 @ 5:20am

    Just a question here, but by the judge's definition of why the items on the drive are not privet also be used as the guys defense that the criminal images are not his? Public computer, easy access, anyone can open the thumb drive by just going into My Computer and seeing it.

    Seems to me the very reason it's admissible might be the best defense.

    link to this | view in chronology ]

  • icon
    Mr RC (profile), 22 Apr 2010 @ 5:23am

    Viewing options in explorer

    The guy wouldn't have even needed to open the pictures if the explorer view settings were on 'thumbnails', literally opening the directory that the (or any) images were stored in would have displayed little mini-pics of the contents (including some of the documents if they were .pdfs)..

    link to this | view in chronology ]

  • icon
    lawlady (profile), 22 Apr 2010 @ 5:27am

    Computers at work

    There is no expectation of privacy on shared work computers. The employer (or supervisor, in this case) has every right to search content on the workplace computer. If you're dumb enough to have illegal content on a portable drive that you're dumb enough to leave in the workplace computer, you deserve to be found out and prosecuted. The suitcase analogy doesn't apply because we are talking about workplace computers, not private property (nor is your portable drive still "private property" if you leave it in a shared computer). The coffee cafe analogy is an interesting "what if," but also doesn't apply to workplace computers. HOW the information is accessed is not the case. WHERE the information was located is the key. Had the portable drive been on the employee's personal laptop computer and left at the workplace, we would have a different story, though still an icky employee.

    link to this | view in chronology ]

  • identicon
    aikiwolfie, 22 Apr 2010 @ 5:46am

    I think it's reasonable to look at what's on a thumb drive to find out what it is and who it belongs to. The police or station staff would do the same thing with an unattended suit case if there were no identifying tags on the outside.

    They'd open it up and look around for some kind of ID. If they then found child porn in that suit case and you returned to claim the case just at that moment. You'd be arrested and charged.

    I'm not American and frankly don't give a monkeys about 4th amendment rights or whatever. This is a clear cut case of a paedophile being caught red handed and trying to use a convoluted technicality to worm his way out of charges and jail time with Bubba.

    Why do courts tolerate this nonsense?

    link to this | view in chronology ]

    • icon
      Chris Rhodes (profile), 22 Apr 2010 @ 7:45am

      Re:

      This is a clear cut case of a paedophile being caught Not to be pedantic, but (1) I don't see anything here that says the man is actually a pedophile. Being a pedophile would require that he actually molests children, rather than simply own a video of them. (2) Even if you want to equate the possession of child porn with actual child molestation, it's at all certain that the video in question counts as pedophilia, since pedophilia is related to pre-pubescent children. For example, if the child in the video is 17, it would still be considered "child porn" under the law, but it wouldn't be linked to pedophilia. Why do courts tolerate this nonsense? Because tacitly giving the government/police license to do whatever they want with no regard for the rule of law or rights of citizens is much more dangerous than a man who possesses a disgusting video.

      link to this | view in chronology ]

  • icon
    rwahrens (profile), 22 Apr 2010 @ 5:52am

    Better analogy

    I'd say a better analogy would be leaving a folder of child porn on a common use desk at the office, with your name somewhere that could link it to you.

    Nobody would question the right of the supervisor to look at the contents of the folder to find out who left it there.

    They would question the sanity of the guy that would leave something like that lying around with his name on it...

    link to this | view in chronology ]

  • identicon
    NullOp, 22 Apr 2010 @ 6:12am

    Third Problem....

    1. Child Porn
    2. Found Child Porn

    3. LAWYER TRYING TO DEFEND SOMEONE CONSUMING CHILD PORN!!!

    link to this | view in chronology ]

    • icon
      vivaelamor (profile), 22 Apr 2010 @ 6:28am

      Re: Third Problem....

      "3. LAWYER TRYING TO DEFEND SOMEONE CONSUMING CHILD PORN!!!"

      Yawn.

      link to this | view in chronology ]

    • icon
      Dark Helmet (profile), 22 Apr 2010 @ 6:48am

      Re: Third Problem....

      "3. LAWYER TRYING TO DEFEND SOMEONE CONSUMING CHILD PORN!!!"

      You're right! Only certain criminals deserve the legal representation they are entitled to in our country!

      I mean, c'mon! Do we REALLY need to defend these obviously guilty child porn consumers? Wouldn't our time be better served elsewhere? Child porn consumers don't deserve representation, and neither do rapists.

      link to this | view in chronology ]

    • icon
      Chris Rhodes (profile), 22 Apr 2010 @ 6:58am

      Re: Third Problem....

      Worse than a lawyer trying to defend someone who allegedly committed some other serious crime?

      link to this | view in chronology ]

    • identicon
      Joshua, 22 Apr 2010 @ 9:24am

      Re: Third Problem....

      Everybody deserves a competent defense. Period.

      link to this | view in chronology ]

    • identicon
      The Anonymous Hero, 23 Apr 2010 @ 5:41am

      Re: Third Problem....

      Say, you committed mass-murder (pretty horrendous, isn't it), would you be okay, if you could only defend yourself, and you are denied access to a real lawyer?

      link to this | view in chronology ]

  • identicon
    known coward, 22 Apr 2010 @ 6:27am

    it is more like

    They are writting tiny exceptions each time they want to do something. Child porn is bad, they all agree. They have to punish the criminal, they all agree, but the law says no unreasonable searches and seizures.

    So what tiny paragraph can we write to make this seem legal, but really it is not.

    A thumb drive is an open file, There is no expectation of privacy in Garbage. The list goes on and on.

    Honestly we should just stop lying about what this country is about. Repeal the bill of rights and be done with it.

    link to this | view in chronology ]

    • icon
      vivaelamor (profile), 22 Apr 2010 @ 6:30am

      Re: it is more like

      "A thumb drive is an open file, There is no expectation of privacy in Garbage. The list goes on and on."

      Please continue, so far you've listed two things and one of them is this story.

      link to this | view in chronology ]

      • identicon
        known coward, 22 Apr 2010 @ 6:40am

        Re: Re: it is more like

        a cop can make a "good faith" mistake in a search and seizure yet it the results of the search can still be used in court. 3/4's of the Patriot act, My assemblies can be videotaped by the police (like a mob funeral for example). Computer confiscations without a warrent . . . Computer confiscations by private actors without a warrent. School's videotaping their students without their consent.

        I need to get some work done today, I will list more later if you want.

        link to this | view in chronology ]

        • icon
          vivaelamor (profile), 23 Apr 2010 @ 9:42am

          Re: Re: Re: it is more like

          "a cop can make a "good faith" mistake in a search and seizure yet it the results of the search can still be used in court. 3/4's of the Patriot act, My assemblies can be videotaped by the police (like a mob funeral for example). Computer confiscations without a warrent . . . Computer confiscations by private actors without a warrent. School's videotaping their students without their consent."

          Thanks, that makes your point much more clear.

          link to this | view in chronology ]

  • identicon
    joe, 22 Apr 2010 @ 6:32am

    thumb drive

    Evil gets what evil deserves, its divene intervention. This cancer is spreading too fast its gotta be stoped, no matter how its done.

    link to this | view in chronology ]

  • identicon
    Mystic Kitsune, 22 Apr 2010 @ 6:45am

    pedo-files beware.

    really. it's legal to prosecute him. he's knowingly harboring/storing contraband. End Of File

    link to this | view in chronology ]

  • identicon
    Jo Watson, 22 Apr 2010 @ 7:20am

    Amazing

    This actually makes sense to me. But, seems this guy could have at the very least used whole disk encryption. I mean if you are going to have "sensitive" data like that on a thumb drive, might as well encrypt it.

    Lou
    www.r-u-being-logged.es.tc

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 22 Apr 2010 @ 8:05am

    if Durdley has a problem with his prick boss going though his thumb drive he should just burn down said pricks house and be done with it. dont get mad, get even...

    link to this | view in chronology ]

  • identicon
    NAMELESS.ONE, 22 Apr 2010 @ 8:05am

    the truth

    hes in the public doing work for the public, if hes violating the law he shuld be punished and having that in any place a person in public or a fellow worker can find it well you get what you deserve mister sicko and anyone defending that is WRONG sickly wrong

    now if its in his locker , guess what thats still public property granted to you to put your items in for safety reasons not privacy

    this is truth
    justice shall follow

    your house your privacy
    you at work NO Privacy

    link to this | view in chronology ]

  • icon
    Atkray (profile), 22 Apr 2010 @ 8:18am

    About thumb drives

    1: In my IT classes it has come up multiple times that one of the easiest ways to compromise a system is to drop a thumb drive outside in the employee parking lot. A helpful employee will almost certainly pick it up and take it inside and plug it in to the first USB port they find.

    2: As mentioned,encrypting a thumb drive is a straightforward and simple process.

    link to this | view in chronology ]

  • icon
    WammerJammer (profile), 22 Apr 2010 @ 8:23am

    Shared computer?

    You did say it was shared. Right?

    link to this | view in chronology ]

  • icon
    Hugh Mann (profile), 22 Apr 2010 @ 8:30am

    Fourth Amendment doesn't protect against private nosiness...

    The prohibition against unreasonble search is a Constiutional protection against GOVERNMENT activities, and is not directly applicable to private citizens. If I rifle through your files on an unattended thumb drive (or your unattended bag in a bus station), you may have some claim against me for trespass to chattels or something, but not a Fourth Amendment claim that you can't be prosecuted for the illegal stuff I found and then turned over to the police.

    Based on the very brief description of this situation in the original post here, this was a private actor, not an agent of law enforcement, who found the child porn.

    This pervert was caught because of his own carelessness, not because the governmetn obatined any evidence in an illegal manner.

    Book 'im, Dan-o.

    HM

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 22 Apr 2010 @ 8:36am

    As this is a shared computer, not his own, I would tend to compare it with trash in a trashcan. The trash may be his, but the trashcan it is in is municipal propery, there for open to the public with no need for a warrant or permission.

    link to this | view in chronology ]

  • identicon
    Mike C, 22 Apr 2010 @ 9:13am

    New issue arrises

    So this seems to be overlooked but this brings up a new potential problem.

    What say happens if I dislike a coworker and brought something illegal on a thumb drive copied files with his/her name on it and then handed it to police telling them i found it plugged into a shared computer at work.

    how can you now prove who actually had the illegal files the bad citizen or the good one?

    link to this | view in chronology ]

    • icon
      John Fenderson (profile), 22 Apr 2010 @ 10:28am

      Re: New issue arrises

      Technically, the law would have to prove that your victim put the files there, the victim wouldn't have to prove he didn't. (Technically. I know that in practice it's a bit different.)

      The logs in the computer may provide evidence (when was the drive plugged in? When were the files copied? Does the victim have an alibi during those times?)

      But really, a thumb drive should be treated like a wallet -- very personal, easily tampered with, and to be treated with great caution. You don't leave them lying around. How hard would it be to slip contraband into your victim's wallet and calling the cops on them?

      The ultra-cautious can also use whole disk encryption on their thumb drives, so nobody can write to them without knowing the password.

      link to this | view in chronology ]

  • icon
    www.eZee.se (profile), 22 Apr 2010 @ 10:28am

    I have not read all the comments so forgive me if I am repeating anyone but:

    "So, the moral of the story is, if you have files you don't want people looking at, it's best to not leave your thumb drives plugged into shared computers. Even better, don't have illegal files in the first place. "

    I think the real moral of the story is, if you have child porn AT ALL, you deserve bad things to happen to you.

    link to this | view in chronology ]

    • icon
      vivaelamor (profile), 23 Apr 2010 @ 10:27am

      Re:

      "I think the real moral of the story is, if you have child porn AT ALL, you deserve bad things to happen to you."

      I guess those law enforcement types who track such things should watch their backs then. Perhaps everyone who has watched the recent Wikileaks video should also be flogged, for consistency.

      link to this | view in chronology ]

  • identicon
    Mark H, 22 Apr 2010 @ 11:34am

    Location versus privacy

    I find it interesting that people would see this as an issue with privacy more so idea of where the thumb drive was found; in a work environment on a shared computer. This company should have a definition of the expectation of privacy of information on a shared work computer. This is not someone home computer or person system; rights are not transferred simply because the person own the thumb drive. The thumb drive was found in the property of another company’s computer. The location helps dictate any question of privacy or rights a person would have to their information. A technical issue of how the thumb drive was accessed or viewed becomes null and void once the defendant attached the device to the company computer.

    Just my thoughts…

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 22 Apr 2010 @ 1:28pm

    Leave an unopened bag in a bus station and you will be lucky if the bomb squad doesn't just blow it up after removal.

    link to this | view in chronology ]

  • identicon
    John Fox, 22 Apr 2010 @ 6:43pm

    kids!

    I understand the constitutional question, but please, this is CHILD ponography. May he rot in jail.

    link to this | view in chronology ]

  • icon
    btr1701 (profile), 22 Apr 2010 @ 7:46pm

    Legal Issue

    There shouldn't even be a 4th Amendment issue here since it wasn't the police that conducted the (allegedly) illegal search. It was a co-worker.

    The 4th Amendment only protects against warrantless searches by the police (or by private citizens acting at the direction of the police). There's no 4th Amendment issue when a private citizen conducts the search all on their own.

    If, for example, your next-door neighbor walked into your house, saw illegal drugs on the table, then reported it to the police, there would be no 4th Amendment violation. You might have a valid civil suit against him for invasion of privacy and trespass (and if you went to jail because of his actions, your damages would be substantial), but the evidence could still be used against you in your criminal trial.

    link to this | view in chronology ]

  • identicon
    chubbysumo, 24 Apr 2010 @ 11:06am

    read the ruling carfully, its all in the circumstances

    encrypt your flash drives. This is all i can think when i read this. Not that i condone such illegal activity. This case really brings into play the individual circumstances that the USB drive was under. As the ruling stated:
    1) since it was at the suspects work
    2)plugged in
    3)and readily accessible(meaning no encryption/password needed)
    the suspect had given up his right to reasonable expectations of privacy.

    link to this | view in chronology ]

  • identicon
    Stephanie, 13 Jan 2019 @ 10:41am

    It absolutely is analogous to opening a briefcase. Specifically, an unlocked briefcase, but a private area nonetheless. The files are not "mixed" with those on the machine nor are they opened or in use or otherwise in view or immediately accessible. The boundary is very clearly demarcated.

    link to this | view in chronology ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.