Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Mississippi man gets prison in 'very technical' child pornography case: news reports
NOLA.com | The Times-Picayune ^ | 6/27/15 | James Varney, NOLA.com | The Times-Picayune

Posted on 06/27/2015 6:06:58 PM PDT by BBell

A Saucier, Miss., man whose computer had a child pornography IP address registered to someone else will still have to serve time, according to a report in The SunHerald. The sentence was a bifurcated one.

Circuit Court Judge Larry Bourgeois sentenced Keith Joseph Cuevas, 37, to a 10-year sentence but then suspended 6 ½ years of it, meaning Cuevas must serve 3 ½ years. Cuevas, who will not be eligible for early release, will then face five years of supervised probation and lifetime registration as a convicted sex offender, the paper reported.

(Excerpt) Read more at nola.com ...


TOPICS: Constitution/Conservatism; Crime/Corruption; Culture/Society; US: Mississippi
KEYWORDS:
Navigation: use the links below to view more comments.
first 1-2021-34 next last
Read the article before commenting. It is a short article.

This could set a dangerous precedent. The guy lived in a house with multiple people and the IP address used to commit the crime was not even his. This could make it easy to frame someone. If the guy is guilty he deserves what he got.

Remember to always password protect access to your computer.

1 posted on 06/27/2015 6:06:58 PM PDT by BBell
[ Post Reply | Private Reply | View Replies]

To: BBell

This is thankfully how it should have been done.

If I pay the internet bill, but a friend or family member downloads on to their computer illegal images, the person who did that should be the one who goes to jail—not the bill payer.

That sounds like what happened, here.


2 posted on 06/27/2015 6:15:33 PM PDT by ConservativeMind ("Humane" = "Don't pen up pets or eat meat, but allow infanticide, abortion, and euthanasia.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: ConservativeMind

May be accessory to the crime, but not the full crime.


3 posted on 06/27/2015 6:18:29 PM PDT by sagar
[ Post Reply | Private Reply | To 2 | View Replies]

To: sagar

Accessory to the crime would require knowledge or some activity.

Cafe owners don’t go to jail for what patrons download.


4 posted on 06/27/2015 6:22:10 PM PDT by ConservativeMind ("Humane" = "Don't pen up pets or eat meat, but allow infanticide, abortion, and euthanasia.")
[ Post Reply | Private Reply | To 3 | View Replies]

To: ConservativeMind

“Accessory to the crime would require knowledge or some activity.

Cafe owners don’t go to jail for what patrons download.”

It is their responsibility to ensure that their property (computers, internet access, etc) is not used in a crime. Make money from criminals paying you, you should pay for it.


5 posted on 06/27/2015 6:27:05 PM PDT by sagar
[ Post Reply | Private Reply | To 4 | View Replies]

To: sagar

guy phones in a bomb threat... is AT&T responsible? no

guy drives a ryder rental into a building and it blows up... ryder responsible? no


6 posted on 06/27/2015 6:32:45 PM PDT by sten (fighting tyranny never goes out of style)
[ Post Reply | Private Reply | To 5 | View Replies]

To: sten

Thanks for the clarity.


7 posted on 06/27/2015 6:34:15 PM PDT by rsobin
[ Post Reply | Private Reply | To 6 | View Replies]

To: sten

“guy phones in a bomb threat... is AT&T responsible? no

guy drives a ryder rental into a building and it blows up... ryder responsible? no”

Are airlines responsible for terrorists hijacking their airlines? no

Are cruise ships responsible for icebergs capsizing their ships? no


8 posted on 06/27/2015 6:44:51 PM PDT by sagar
[ Post Reply | Private Reply | To 6 | View Replies]

To: BBell

It was his computer and he was using someone else’s IP address. He’s guilty. The owner of the IP address is a dupe.


9 posted on 06/27/2015 6:47:17 PM PDT by BuffaloJack (Political Correctness is Supression of Free Speech. Thank the Commies for Political Correctness.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: sagar

“It is their responsibility to ensure that their property (computers, internet access, etc) is not used in a crime.”

No it’s not. That turns the law on its head.


10 posted on 06/27/2015 7:02:52 PM PDT by Boogieman
[ Post Reply | Private Reply | To 5 | View Replies]

To: BuffaloJack

Where did you get your info? I did not read anywhere that he was using someone else’s I.P.


11 posted on 06/27/2015 7:06:31 PM PDT by BBell (Identifies as a knight who says "NI"!!!!!! I want a shrubbery!!!!!!)
[ Post Reply | Private Reply | To 9 | View Replies]

To: sagar

Justice Kagan, is that you?


12 posted on 06/27/2015 7:06:50 PM PDT by Lurker (Violence is rarely the answer. But when it is it is the only answer.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: BBell
Hooboy. I've tried three times to write something intelligible on this and come up with IT-gibberish three times. The article is nearly devoid of useful information, but here's my guess at what was happening.

Internet traffic comes through an ISP, a service provider, who has a router. That router assigns IP addresses to its customers, who also have routers. (These can either be static, or permanent, or vary by session through something called DHCP). What an IP address trace does is to get you through the ISP's router to the home router, usually through the logs on the ISP's router.

The home router has multiple computers attached to it. It has its own little bag of IP addresses that are different from the one used at the vendor (this is NAT, or network address translation). Its job is to take traffic sent to it by its common IP address and split it up into the various computers hooked up to it. Only here is there a hook between the IP address the vendor knows about and the one assigned to the computer. This information can be logged but seldom is because who would read it?

So that's where the IP trace breaks down. The investigator knows that the illegal traffic reached the home router, which is registered to whoever has the account at the vendor. That's all the investigator knows.

What happened at that home router level to divvy that traffic up to the ultimate destination is normally not recoverable, although for routers managed by IT staff at places like companies, it can be. For home routers, not so much; they either don't log it at all or the logs roll over from limited storage space.

So what happens is that the guy with the computer hits his home router, offers his only unique, hardware-level ID known as a MAC address (machine access code), is matched to an IP address by the home router that is good only for that session (it's actually called a "lease"). For the duration of that session only, the connection is traceable all the way from source to destination. When the session ends, the IP address assigned by the home router is recycled.

That's why there were different IP addresses and the true route was probably not recoverable. But it was enough to tell the investigator that something attached to the home router received the illegal traffic, probably enough for a search warrant. Again, only guessing, but it was probably the presence of the illegal material itself on the guy's computer that resulted in the conviction.

All of this is not true all the time for all setups, so this is nothing more than a guess. But that's why the guy's computer had a different IP address from the furthest one the investigator could trace. The guy registered to the home router was also the last guy the investigator could trace to. But he wasn't the perp, and I doubt if anyone even tried to charge him because it wouldn't have stood up in court.

God, this is still IT gibberish, I'm sorry. Welcome to my world. :-(

13 posted on 06/27/2015 7:08:29 PM PDT by Billthedrill
[ Post Reply | Private Reply | To 1 | View Replies]

To: BBell

> Where did you get your info? I did not read anywhere that he was using someone else’s I.P.
Read the article. His computer. He lived in a home with other people and he was using the IP address of one of the other residents. In my opinion, he was using the other address and not his own, so things wouldn’t get traced back to him.


14 posted on 06/27/2015 7:16:20 PM PDT by BuffaloJack (Political Correctness is Supression of Free Speech. Thank the Commies for Political Correctness.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: BBell

In several Intellectual Property cases the courts have held that an IP address does not identify a user. There must be other facts not included in the article.


15 posted on 06/27/2015 7:23:46 PM PDT by SeeSharp
[ Post Reply | Private Reply | To 1 | View Replies]

To: BBell

This article really doesn’t make a lot of sense. What is a “child pornography IP address registered to someone else”?

Also the article seems to dodge around whether or not any actual pornography was found on anyone’s computer, just an IP address.

This guy needed a better lawyer.


16 posted on 06/27/2015 7:35:04 PM PDT by chaosagent (Remember, no matter how you slice it, forbidden fruit still tastes the sweetest!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BBell

This should remind everyone to lock up their routers and wireless servers. Even then you aren’t protected. You can buy network cards and adapters that will let you change MAC and IP addresses in seconds. Anyone can just go cruising through your neighborhood pinging for that information and spoof it for nefarious uses. Find an open routers like at a McDonald’s and it now appears you are on line doing the crime.


17 posted on 06/27/2015 7:46:03 PM PDT by Organic Panic
[ Post Reply | Private Reply | To 1 | View Replies]

To: chaosagent
What is a “child pornography IP address registered to someone else”

Probably just crappy journalism.

18 posted on 06/27/2015 7:57:30 PM PDT by BBell (Identifies as a knight who says "NI"!!!!!! I want a shrubbery!!!!!!)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Billthedrill

Thank you. I’m still a bit confused but I’m an illiterate when it comes to technical stuff dealing with computers.


19 posted on 06/27/2015 8:00:30 PM PDT by BBell (Identifies as a knight who says "NI"!!!!!! I want a shrubbery!!!!!!)
[ Post Reply | Private Reply | To 13 | View Replies]

To: BuffaloJack

It does not say that he was using the IP address of one of the other residents anywhere.


20 posted on 06/27/2015 8:05:27 PM PDT by BBell (Identifies as a knight who says "NI"!!!!!! I want a shrubbery!!!!!!)
[ Post Reply | Private Reply | To 14 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-34 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson