{"id":901,"date":"2009-11-17T00:00:00","date_gmt":"2009-11-17T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/11\/17\/federal-government-using-ps3-to-crack-pedophile-passwords\/"},"modified":"2021-12-30T11:38:21","modified_gmt":"2021-12-30T11:38:21","slug":"federal-government-using-ps3-to-crack-pedophile-passwords","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/11\/17\/federal-government-using-ps3-to-crack-pedophile-passwords\/","title":{"rendered":"Federal government using PS3 to crack pedophile passwords"},"content":{"rendered":"<p>The U.S. Customs Enforcement Cyber Crimes Center (C3) has begun using Sony consoles running Linux to solve child pornography cases.  C3 needs the processing power of about $11,000 worth of computers, which is now being provided by a network of PS3 consoles at a quarter of the cost.Though they aren&#8217;t using the new PS3 Slim (since you can&#8217;t install Linux on the new models) purchasing 20 old PS3 units is still about $8,000 cheaper than the Dell servers C3 had used previously.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The unorthodox console approach has been so effective that agents are scouring eBay to find the best deal on another 40 consoles to round out their collection.<\/p>\n<p>Agents need computing power to break these codes because while a search warrant allows them to seize incriminating documents or digital evidence, the Fourth Amendment grants suspects the right to withhold their password information.<\/p>\n<p>http:\/\/www.gamepro.com\/article\/news\/212992\/federal-government-using-ps3-to-crack-pedophile-passwords\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-901","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=901"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/901\/revisions"}],"predecessor-version":[{"id":3388,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/901\/revisions\/3388"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}