Computer Forensics and Child Exploitation
How a computer forensics investigation firm can help with child exploitation cases. (Pt. 1) Child Exploitation cases are difficult for everyone involved. The alleged victims encounter a range of emotions. This type of accusation can destroy reputations and wreck havoc on all those involved. The nature of this accusation is intense.
The very word, exploit, means to “use unfairly for one’s own advantage.” Child exploitation is a blanket term describing crimes involving; producing, owning, distributing child erotica, child harassment, child coercion, or even just forcing someone younger and weaker to do your will.
If accused of such a crime, the first thing to do is to get an attorney. The second thing is to get a Computer Forensic Investigator. The majority of Computer Forensic Investigators are accustomed to working for the defense in such cases. The District Attorney and FBI have their own departments to investigate these things. Whether using a Public Defender or a private attorney, ask to get a Computer Forensic Investigator on the case.
Find a professional who can provide all the needed support services, such as responding to interrogatories, providing court reports, and providing expert testimony. Save time and effort by limiting the number of consultants you will have to coordinate.
Search for a computer forensics specialist who is an experienced expert witness. It is preferable for the expert witness to be able to explain and discuss how he or she conducted the investigation, came to various conclusions, and determined their findings, rather than relying on another expert witness to interpret your specialist's investigation.
Have the expert explain the process of computer forensics to you. Can he or she explain the process in language that a jury can understand or is it described using scientific jargon that will sound like gibberish to the court?
Discuss the preparation of court reports. The expert you choose should have ample experience in the generation of court reports, and should be knowledgeable of the intricacies that should be contained in this documentation.
Instead of e-mailing to receive a resume first, talk to experts on the telephone. Consider how the individual's voice will sound in court. The expert you choose should be articulate and self-assured without sounding pretentious or arrogant.
Additionally, explore his or her knowledge concerning the Federal Rules of Evidence, its relation to the admissibility of expert testimony, the Hearsay Rule and its exceptions, chain of custody, and suitable documentation. The expert's knowledge in these areas is critical - it could make or break the case and impact your reputation, as well.
Form a partnership with the expert. Be sure that the lines of communication between you remain open and that the expert is informed of every twist and turn in the case that might impact his or her role in the matter.
The earlier a forensics specialist is involved in the matter, the greater the chance that usable evidence will result from the investigation. Attorneys should do their best to ensure that non-forensic professionals, including IT professionals, do not have access to the drive. If someone has accessed the drive - even turned it on or off - since the time the computer.
Next month: I’ve chosen an expert, now what?
By Expert Data Forensic Investigation
Computer Forensics, Data Recovery and Investigations Expert Witness Services
ABOUT THE AUTHOR: Adrian Leon MareComputer Forensics, Data Recovery and Investigations Expert Witness Services
Professional Summary Knowledge, training and experience in computer forensic investigator, electronic evidence discovery, data recovery and analysis, consulting and expert witness services for criminal and civil cases.
Over ten (10) years of progressive technical experience in designing, implementing, structuring, supporting, administrating, upgrading, documenting and maintaining networking environments.
Especially proficient in troubleshooting, audits, consulting, user support, customer relations, network topology, forensics, data recovery, backup strategies, designing, planning and implementation of network and wireless environments. Over ten (10) years in law enforcement.
Copyright Expert Data Forensic Investigation
Disclaimer: While every effort has been made to ensure the accuracy of this publication, it is not intended to provide legal advice as individual situations will differ and should be discussed with an expert and/or lawyer.For specific technical or legal advice on the information provided and related topics, please contact the author.