Was Hacker's actions the behavior of a private person or state action?
A computer hacker ("Hacker") in Turkey sent an untraceable e-mail to the Montgomery, Alabama Police Department (MPD), saying that he discovered evidence of child sexual abuse on a computer in Montgomery; he said that the victimizer "is a doctor or a paramedic." The anonymous hacker attached an electronic image file of a white male sexually abusing a young white female approximately five years old. MPD officers replied by e-mail, asking Hacker for more information. He sent attached images of a adult white male nude from the waist down fondling the young girl, exposing her genitalia, and depicting "clamps connected to a chain attached to the child's labia." Hacker identified the molester's name and provided identifying information including Steiger's Internet service account information with AT&T WorldNet. MPD officers e-mailed Hacker and in response Hacker provided the Internet Protocol ("IP") address (a unique address assigned to a particular computer connected to the Internet). An investigator corroborated identifying information about Steiger. Based on this information investigators prepared a search warrant affidavit without mentioning that the source of information was a hacker. A search of Steiger's home produced incriminating evidence that was used to convict him.
What will be an ideal response?
Private action – evidence admissible
You might also like to view...
The nation's counterterrorism efforts have created a new respect for due process rights
a. true b. false
The sociological perspective considers crime to be a(n) __________ act
Fill in the blank(s) with the appropriate word(s).
James Coleman suggests that individuals commit delinquent acts because they lack ________
A) strong resistance B) beneficial rewards C) discipline D) social capital
Judicial-_____ program helps beginning judges learn their new roles
Fill in the blank(s) with correct word