Feeds

Tas magistrate finds legal book of filth illegal on computer

Court convicts careless councillor

  • alert
  • submit to reddit

SANS - Survey on application security programs

You can’t invent cases as strange as this: a book that is not only legal, but can be borrowed from various Australian libraries* can, in digital form, land the owner with a child porn conviction.

According to News's Hobart Mercury, David Traynor, an alderman in the Clarence council in Tasmania, was convicted for possessing child exploitation material when police found a copy of the 150-year-old book The Pearl stored on his council laptop (among a large number of pornographic but legal images).

The book is not only legal in Australia, but can be ordered from a host of bookshops and is even published as an ebook.

Even more mortifying for the alderman, the material was only reported to police after his laptop was stolen, then recovered, and finally (for reasons not explained in the story) handed over to a forensics expert who duly found deleted pornography.

While it's established that anybody who stores porn on a work computer is acting foolishly, the Tasmanian courts – or law-makers – may have found a new peak of prudishness to determine that material that’s legal on paper is more menacing on a computer. Erotica fans would, it seems, do well to avoid buying it on Kindle or even, as Amazon offers, reading the first chapter online for free.

The alderman has been convicted and sentenced with a two-year good behaviour bond, and placed on Tasmania's sex offenders' register. He is launching an appeal. ®

Bootnote

*My thanks to the Twitterer @NetwonMark who identified the library catalogue entry. ®

High performance access to file storage

More from The Register

next story
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Whoever you vote for, Google gets in
Report uncovers giant octopus squid of lobbying influence
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.