Honeypots mailing list archives

Re: Honeypots & reccord industry


From: Kevin Bryan <TenToThe8th () yahoo com>
Date: Tue, 20 Dec 2005 08:02:10 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

As far as I understand it (IANAL, etc), entrapment only applies to law
enforcement.  Since the RIAA is not law enforcement, any data they
collect from a honeypot p2p client should still be admissible.  See the
dictionary entry:

http://dictionary.reference.com/search?q=entrapment

- --Kevin

On Mon, Dec 19, 2005 at 10:22:59AM -0500, Roger A. Grimes wrote:

I don't remember the source, but I have read this several times. I don't
think it is a secret.

People should not be illegally downloading copyrighted material, so I
don't see the problem.

A courtcase based on evidence collected from one of these honeypots
might finally test the entrapment defense theory...but the RIAA would
probably just use the evidence collected to track other more certain
types of evidence.

Roger

*******************************************************************
*Roger A. Grimes, Banneret Computer Security, Consultant 
*CPA, CISSP, MCSE: Security (2000/2003/MVP), CEH, yada...yada...
*email: roger () banneretcs com
*Author of Honeypots for Windows (Apress)
*http://www.apress.com/book/bookDisplay.html?bID=281
*******************************************************************



-----Original Message-----
To: Bruno Joho
Cc: honeypots () securityfocus com
Subject: Re: Honeypots & reccord industry

Bruno Joho wrote:
Hi folks

It came to my ears the reccord industry is collecting information 
about people sharing music files or publishing such files for 
download. They may using honeypot technology to get the data needed 
for proceedings judicially. Does anybody knows more about?

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDqADSA2vFsoV0MMQRAh6vAJ9VrZHnVzfWHc3kNIZSXGxkGRnkQwCgj40F
Y0Lv1zobqH5Al6yc7/TZibY=
=ICTg
-----END PGP SIGNATURE-----


Current thread: