Journal of Digital Forensics, Security and Law (Dec 2014)

Technical Soddi Defenses: The Trojan Horse Defense Revisited

  • Chad Steel

Journal volume & issue
Vol. 9, no. 4
pp. 49 – 62

Abstract

Read online

In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals. The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts. In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense. In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter. On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.

Keywords