Feeds

Internet child porn investigators net South Aust MP

‘Operation decimate’ nabs pollie

  • alert
  • submit to reddit

Security for virtualized datacentres

A South Australian state Labor MP has been arrested and charged for using the Internet to access child exploitation material, in an ongoing police operation called Operation Decimate*.

According to South Australia Police, the MP was arrested at home and charged with possession of child pornography, an aggravated count of possession of child pornography, and two counts of trying to access child pornography.

Under SA laws, child pornography offenses may be aggravated either because the offender knew the victim was aged under 14, or because the offence was committed in company with others.

The accused cannot be named, because such offences invoke an automatic suppression order. He was bailed after being charged, and will next appear in court on May 20th.

Adelaide Now reports that police first raided his home last Tuesday, and spent a day analyzing the contents of his computer. Another computer was seized on Wednesday prior to the arrest. ®

*We presume South Australia Police don’t know that “decimate” only gets rid of one in ten. ®

Beginner's guide to SSL certificates

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.