Yahoo chat nude pics
He received a message from an individual logged in Yahoo Messaging Chat as "stevedragonslayer." This individual invited James Vanlandingham to view his web cam. records or other information sought, are relevant and material to an ongoing criminal investigation." 18 U. The district court dismissed this as "of no moment" because Yahoo! Both Cheung's testimony and the actual document turned over by Yahoo! Perrine admitted he was "stevedragonslayer" and gives no explanation for who else could have been logged on to Yahoo! Furthermore, despite his wholly speculative arguments to the contrary, Perrine presents no evidence that anyone else "hijacked" his computer and went on line using the name "stevedragonslayer." the identifying information at issue here — defendant's name, address, etc.
stated as follows: Officer Humbert received information from Leetsdale Police Officer Wayne Drish indicating that a resident of his jurisdiction had received what appeared to be child pornography via his computer while in a Yahoo! Officer Humbert interviewed the resident, James Vanlandingham, and learned that he was logged into Yahoo Messaging Chat on September 2, 2005 at approximately PM EDT. Perrine also alleges that the application for the order was deficient because it failed to show that "stevedragonslayer" was on line with Vanlandingham on September 2, 2005, at 2 PM. account and maintains that information for approximately thirty days. 's records also revealed that "stevedragonslayer" with IP address 188.8.131.52 had logged on to Yahoo! We agree with the district court that the absence of a specific record of "stevedragonslayer" with IP address 184.108.40.206 or 220.127.116.11 being logged on at 2 PM on September 2, 2005, does not undermine the adequacy of the affidavit. fails to maintain records for more than thirty days. Since Perrine admitted he was "stevedragonslayer" and both Vanlandingham and Officer Humbert observed the chat session with "stevedragonslayer," there can be little doubt that the individual chatting with Vanlandingham on September 2, 2005, and showing pornographic videos was, in fact, Perrine. Every federal court to address this issue has held that subscriber information provided to an internet provider is not protected by the Fourth Amendment's privacy expectation.
Further investigation revealed that this IP address was maintained by Cox Communications, Inc.
White, Ariagno, Kerns, Mank White, LLC, Wichita, Kansas, with her on the brief) for Defendant-Appellant. Anderson, Assistant United States Attorney, Wichita, Kansas (Eric F. Perrine appeals the denial of his motion to suppress evidence following his conviction by a jury on three counts relating to the distribution, receipt and/or possession of child pornography, one count of possession of a firearm by a convicted felon, and two counts of criminal forfeiture. "The IP, or Internet Protocol, address is unique to a specific computer. Pennsylvania authorities then contacted Kansas authorities, who discovered that Steve Perrine had a prior state conviction for sexual exploitation of a child, for which he was still on probation. Files with descriptive fields containing the search term are listed for the searcher, who can then see all the descriptive fields for each file on the list. Based on these descriptions, the searcher decides which of the available files to download onto his computer. Vanlandingham asked if "stevedragonslayer" had any more videos, to which "stevedragonslayer" replied he did not know what might offend "dana_hotlips05." After Vanlandingham informed "stevedragonslayer" that he liked "the young hard stuff," "stevedragonslayer" played several videos depicting young girls in various explicit sexual acts. website from the IP address 18.104.22.168 on October 9, 2005, October 22, 2005, October 29, 2005, October 30, 2005, November 1, 2005, and November 6, 2005. A forensic examination of Perrine's computer revealed thousands of images of child pornography. § 2252(a)(2); one count of receiving child pornography, in violation of 18 U. After subsequent briefing, the district court denied Perrine's motions. A Wichita Police Department Computer Forensics detective, Detective Stone, testified that he found in excess of 16,000 images of child pornography on Perrine's computer. "stevedragonslayer" stopped sending video clips to "dana_hotlips05" prior to the arrival of police officers at Vanlandingham's house, but Vanlandingham was able to preserve a copy of the chat room conversation. On February 7, 2006, Perrine was charged in a superceding indictment with one count of distributing child pornography, in violation of 18 U. Detective Stone also found Kazaa, a peer-to-peer file sharing program, installed on Perrine's computer.
Search for Yahoo chat nude pics:
These fields generally describe the file's contents and can be edited by a file's possessor.