Feeds

Ex-judge jailed for child abuse

Vigilante hacker claims scalp after six year legal wrangle

Internet Security Threat Report 2014

A former senior judge from California has been jailed for 27 months for possession of child pornography in a case initially based on evidence from a vigilante hacker.

The sentencing of Ronald C Kline, 66, on Tuesday brought an end to six years of legal wrangling over the admissibility of evidence obtained after Kline's PC was infected with Trojan code planted by Brad Willman, a Canadian hacker dubbed "Citizen Tipster" by police.

Willman (AKA Omni-Potent) planted the Trojan, which posed as images of child abuse on newsgroups frequented by paedophiles, in 1999. Willman then began obsessively monitoring the activities of the 3,000 suspected perverts whose PCs he had infected, focusing on those he suspected were planning to molest children, such as Kline.

Willman discovered explicit images of young boys on Kline's PC and, even more seriously, a diary detailing his fantasies about abusing young boys.

Results of these investigations, in themselves illegal, were in May 2000 passed onto the police who executed search warrants, recovering evidence from Kline's home PC and his court computer. These in turn led to federal charges against Kline of possessing child porn and child molestation charges in state court.

The state case was dismissed after the Supreme Court ruled that the prosecution had extended beyond the statute of limitations. The federal case also looked likely to collapse after US District Court Judge Consuelo Marshall ruled in 2003 that images of child abuse obtained from Kline's computer had been seized illegally because Willman was acting as an agent for the police.

But an appeal court overturned this ruling in 2004 and sent the case back to the lower court for trial. In December 2005, Kline pleaded guilty to four counts of possession of child pornography after admitting that he'd stored more than 100 explicit images of underage boys.

Kline, who has a history of heart disease, hoped his guilty plea would act in mitigation against his offences. He fainted after he was sentenced to imprisonment on Tuesday, The Orange County Register reports.

Kline will not be eligible for release until he serves at least 23 months of his sentence. Upon his release, the former judge (who lost his job in 2002 as a result of the child abuse charges against him) will be placed on probation for three years and obliged to register as a sex offender for the rest of his life. ®

Beginner's guide to SSL certificates

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.