SlideShare uma empresa Scribd logo
1 de 36
Digital Forensics and
Child Pornography
Frederick S. Lane
DE Assoc. of Criminal Defense Lawyers
Wilmington, DE
6 December 2013
www.FrederickLane.com

www.ComputerForensicsDigest.com
1
Seminar Overview
• Introduction and
Overview
• Digital Technology and
CP
• Digital Investigations
• Defending Child
Pornography Cases
www.FrederickLane.com

www.ComputerForensicsDigest.com
2
Introduction and Overview
• Background and
Expertise
• What Is Child
Pornography?
• Digital Technology and
the Spread of Child
Pornography
www.FrederickLane.com

www.ComputerForensicsDigest.com
3
Background and Expertise
• Attorney and Author of 7
Books
• Computer Forensics
Expert -- 15 years
• Over 100 criminal cases
• Lecturer on ComputerRelated Topics – 20+
years
• Computer user
(midframes, desktops,
laptops) – 35+ years
www.FrederickLane.com

www.ComputerForensicsDigest.com
4
What Is Child Pornography?
•
•
•
•

Federal Laws
State Laws
International Law
Determining Age of
Person Depicted

www.FrederickLane.com

www.ComputerForensicsDigest.com
5
Federal CP Laws
• 18 U.S.C. c. 110 – Sexual
Exploitation and Other Abuse
of Children
• 18 U.S.C. § 2251 – Production
• 18 U.S.C. § 2252 – Possession,
Distribution, and Receipt
• 18 U.S.C. § 2256 -- Definitions
www.FrederickLane.com

www.ComputerForensicsDigest.com
6
“Child Pornography”
18 U.S.C. § 2256(8): “any visual depiction, including
any photograph, film, video, picture, or computer or
computer-generated image or picture, whether made
or produced by electronic, mechanical, or other
means, of sexually explicit conduct, where—
(A) the production of such visual depiction
involves the use of a minor engaging in sexually
explicit conduct; [or]
(B) such visual depiction is a digital image,
computer image, or computer-generated image that is,
or is indistinguishable from, that of a minor engaging in
sexually explicit conduct; or
(C) such visual depiction has been created,
adapted, or modified to appear that an identifiable
minor is engaging in sexually explicit conduct.”
www.FrederickLane.com

www.ComputerForensicsDigest.com
7
Other Relevant Definitions
• “Minor” [18 U.S.C. § 2256(1)]: <18

• 18 U.S.C. § 2257: Record-keeping requirements

• “Sexually Explicit Conduct” [18 U.S.C. §
2256(2)(A)]:

• (i) sexual intercourse, including genital-genital, oral-genital,
anal-genital, or oral-anal, whether between persons of the
same or opposite sex;
• (ii) bestiality;
• (iii) masturbation;
• (iv) sadistic or masochistic abuse; or
• (v) lascivious exhibition of the genitals or pubic area of any
person.

• Slightly Different Definitions for Computer
Images [18 U.S.C. § 2256(2)(B)]
www.FrederickLane.com

www.ComputerForensicsDigest.com
8
NCMEC
• “National Center for Missing
and Exploited Children”
• Created by Congress in 1984
• Child Recognition and
Identification System –
database of hash values of CP
images
• Child Victim Identification
Program
www.FrederickLane.com

www.ComputerForensicsDigest.com
9
State CP Laws
• All 50 states have their own CP
laws
• Age of minority varies: 16 (30
states); 17 (9 states); and 18
(12 states)
• Prosecution can be federal or
state, or both.
• Can include “harmful to
minors” standard (states only)
www.FrederickLane.com

www.ComputerForensicsDigest.com
10
Delaware CP Laws
• DEL CODE § 1103 – Definitions
Relating to Children
• DEL CODE § 1108 – Sexual
Exploitation of a Child
• DEL CODE § 1109 – Dealing in Child
Pornography
• DEL CODE § 1110 – Subsequent
Convictions …
• DEL CODE § 1111 – Possession of
Child Pornography
www.FrederickLane.com

www.ComputerForensicsDigest.com
11
DEL CODE

1103

•

“Child”: Anyone under age of 18 or any individual intended to appear
<14.

•

“Prohibited Sexual Acts”:
• (1) Sexual intercourse;
• (2) Anal intercourse;
• (3) Masturbation;
• (4) Bestiality;

• (5) Sadism;
• (6) Masochism;
• (7) Fellatio;
• (8) Cunnilingus;
• (9) Nudity, if such nudity is to be depicted for the purpose of the sexual stimulation or
the sexual gratification of any individual who may view such depiction;

• (10) Sexual contact;
• (11) Lascivious exhibition of the genitals or pubic area of any child;
• (12) Any other act which is intended to be a depiction or simulation of any act described
in this subsection.
www.FrederickLane.com

www.ComputerForensicsDigest.com
12
International CP Laws
• Over last 7 years, 100 countries
have adopted new CP laws
• 53 countries still have no CP law
at all
• International Center for Missing
and Exploited Children
• 2012 Child Pornography Model
Laws: http://bit.ly/19eWJPz
www.FrederickLane.com

www.ComputerForensicsDigest.com
13
Determining Age
Is expert testimony need?
Tanner Stage: Outmoded?
Role of environmental factors
Bait and switch
Defendant’s subjective belief
is irrelevant
• Prosecutors prefer clear cases
•
•
•
•
•

www.FrederickLane.com

www.ComputerForensicsDigest.com
14
Digital Technology and CP
A Brief Background
Digital Production of CP
Digital Distribution of CP
Digital Consumption
(Receipt and Possession)
• Societal Changes
•
•
•
•

www.FrederickLane.com

www.ComputerForensicsDigest.com
15
A Brief Background
•

1978: Protection of Children Against Sexual
Exploitation Act

•

1982: New York v. Ferber – Upholding state
law banning child pornography

•

1984: Child Protection Act (prohibiting noncommercial distribution)

•

1992: Jacobson v. United States – Postal
Service entrapment

•

2000: Poehlman v. United States – FBI
entrapped defendant after lengthy email
correspondence
www.FrederickLane.com

www.ComputerForensicsDigest.com
16
Digital Production of CP
• Scanners
• Digital Cameras (still and
video)
• Cameraphones (dumb and
smart)
• Web cams
www.FrederickLane.com

www.ComputerForensicsDigest.com
17
Digital Distribution of CP
• One-to-One
• Sneakernet
• E-mail / Personal File-Sharing
• Instant Messaging / Chat Rooms

• One-to-Many
•
•
•
•

Newsgroups and Forums
Peer-to-Peer Networks
Torrent Networks / File-Hosting
Underground Web Sites

www.FrederickLane.com

www.ComputerForensicsDigest.com
18
Digital Consumption of CP
• Producer of CP may be in
possession without having
“received” it
• Defendant may be in “receipt” of
CP without “knowingly”
possessing it
• The challenges of determining
“intentionally” and “knowingly” in
the context of Internet activity
www.FrederickLane.com

www.ComputerForensicsDigest.com
19
Societal Changes
• Computers and the
Internet
• The Democratization of
Porn Production
• “Porn Chic”
• The “Selfie”
www.FrederickLane.com

www.ComputerForensicsDigest.com
20
Digital Investigations
• Discovery of Possible Child
Pornography
• The Role of IP Addresses
• Intro to Computer
Forensics
www.FrederickLane.com

www.ComputerForensicsDigest.com
21
Discovery of Possible CP
•
•
•
•
•

Angry Spouse or Girlfriend
Geek Squads
Chat Rooms
Hash Flags
P2P and Torrent
Investigations
• Server or Payment Logs
www.FrederickLane.com

www.ComputerForensicsDigest.com
22
Overview of IP Addresses
• Assigned to Every InternetConnected Device
• Two Flavors:

• IPv4: 196.172.0.1
• IPv6:
2001:0db8:85a3:0042:1000:8a2
e:0370:7334

• Leading to “Internet of Things”
www.FrederickLane.com

www.ComputerForensicsDigest.com
23
IP → Physical Address
• Ranges of IP Addresses
Assigned to ISPs by Internet
Assigned Numbers Authority
• Online Tools to Look Up ISP
• Dynamic vs. Static
• Subscriber Records Show
Date, Time, IP Address,
Limited Activity
www.FrederickLane.com

www.ComputerForensicsDigest.com
24
Limitations of IP Addresses
• Links Online Activity to
Device, Not Necessarily a
Specific User
• Data May Not Be Available
from ISP
• Possibility of War-Dialing
www.FrederickLane.com

www.ComputerForensicsDigest.com
25
Intro to Computer Forensics
•
•
•
•

Increasingly Specialized
Forensics Procedures
Forensics Software
A Typical Forensics
Report

www.FrederickLane.com

www.ComputerForensicsDigest.com
26
Increasingly Specialized
• Computer Forensics
• Windows
• Mac OS
• Linux

• Network Forensics
• Mobile Forensics

• Dozens of Mobile OSs
• Hundreds of Models

• Cloud Forensics

• Many Questions, No Clear Answers

www.FrederickLane.com

www.ComputerForensicsDigest.com
27
Forensics Procedures
•
•
•
•
•
•

Field Previews
Mirror Images
Hash Values
Staggering Amounts of Data
Chains of Custody
2006: The Adam Walsh Act

www.FrederickLane.com

www.ComputerForensicsDigest.com
28
A Typical Forensics Report
• There should be at least two
reports:
•
•
•
•
•

• Acquisition
• Evaluation of Evidence

Bowdlerized
Detailed procedures
Hash value checks
Bookmarks of possible contraband
Evidence of user ID
www.FrederickLane.com

www.ComputerForensicsDigest.com
29
Defending CP Cases
• Pre-Trial Issues
• Trial Issues
• Typical Defenses in CP
Cases [Some More Viable
than Others]
www.FrederickLane.com

www.ComputerForensicsDigest.com
30
Pre-Trial Issues
• Retaining a Defense Expert
• Deposition of Government
Experts
• Motion(s) to Produce
• Motion(s) to Suppress or
in limine
www.FrederickLane.com

www.ComputerForensicsDigest.com
31
Trial Issues
• Should There Be a
Trial?
• Motion(s) in limine
• Cross-Examination of
Government Expert
www.FrederickLane.com

www.ComputerForensicsDigest.com
32
Typical Defenses (1)
• Lack of Possession or Receipt
• Mere Browsing
• The Phantom Hash

• Accident or Lack of Intent
• Ignorance or Mistake as to Age
• Not a Real Child / Morphed /
Computer-Generated
www.FrederickLane.com

www.ComputerForensicsDigest.com
33
Typical Defenses (2)
• Multiple Persons with Access
to Device
• Used Equipment with PreExisting CP
• Viral Infection
• Planting of Evidence by Spouse
or Police
• Entrapment
www.FrederickLane.com

www.ComputerForensicsDigest.com
34
Slides and Contact Info
• Download a PDF of slides
from:
SlideShare.net/FSL3
• E-mail or Call Me:
FSLane3@gmail.com
802-318-4604
www.FrederickLane.com

www.ComputerForensicsDigest.com
35
Digital Forensics and
Child Pornography
Frederick S. Lane
DE Assoc. of Criminal Defense Lawyers
Wilmington, DE
6 December 2013
www.FrederickLane.com

www.ComputerForensicsDigest.com
36

Mais conteúdo relacionado

Destaque

ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime008_Anuj
 
PPT on Child labor
PPT on Child labor PPT on Child labor
PPT on Child labor Mv Raam
 
Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)gunpreet kamboj
 
Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornographyOmar Jacalne
 
presentation on child labour
presentation on child labourpresentation on child labour
presentation on child labourshahriar786
 
Child labour
Child labourChild labour
Child labourMSIT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
ppt on child labour
ppt on child labourppt on child labour
ppt on child labourAditya Kumar
 

Destaque (13)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
PPT on Child labor
PPT on Child labor PPT on Child labor
PPT on Child labor
 
Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)
 
Child labour
Child labourChild labour
Child labour
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornography
 
presentation on child labour
presentation on child labourpresentation on child labour
presentation on child labour
 
Child labour
Child labourChild labour
Child labour
 
Child labour-child-labour-project
Child labour-child-labour-projectChild labour-child-labour-project
Child labour-child-labour-project
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
ppt on child labour
ppt on child labourppt on child labour
ppt on child labour
 
Child labour presentation
Child labour presentationChild labour presentation
Child labour presentation
 

Semelhante a 2013-12-06 Digital Forensics and Child Pornography

2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)Frederick Lane
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital EraFrederick Lane
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcementMeg Weber
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
 
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellData Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellUBA-komitet
 
Digital&amp;computforensic
Digital&amp;computforensicDigital&amp;computforensic
Digital&amp;computforensicRahul Badekar
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Public Records, Private Purposes
Public Records, Private PurposesPublic Records, Private Purposes
Public Records, Private PurposesAIIM International
 
CYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdfCYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdfHari319621
 
CJIS Projects NICS 2015 v2 [Autosaved]
CJIS Projects NICS 2015 v2 [Autosaved]CJIS Projects NICS 2015 v2 [Autosaved]
CJIS Projects NICS 2015 v2 [Autosaved]Heriberto Luna
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesMeg Weber
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference Endcode_org
 
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...ForgeRock
 
Uop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz newUop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz neweyavagal
 
Presentation to Iowa Criminal and Juvenile Justice Advisor Council
Presentation to Iowa Criminal and Juvenile Justice Advisor CouncilPresentation to Iowa Criminal and Juvenile Justice Advisor Council
Presentation to Iowa Criminal and Juvenile Justice Advisor CouncilMichelle Feldman
 
Current Privacy and Data Issues (for people who care about open data!)
Current Privacy and Data Issues (for people who care about open data!)Current Privacy and Data Issues (for people who care about open data!)
Current Privacy and Data Issues (for people who care about open data!)EmilyDShaw
 

Semelhante a 2013-12-06 Digital Forensics and Child Pornography (20)

2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcement
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
 
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellData Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
 
Digital&amp;computforensic
Digital&amp;computforensicDigital&amp;computforensic
Digital&amp;computforensic
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Public Records, Private Purposes
Public Records, Private PurposesPublic Records, Private Purposes
Public Records, Private Purposes
 
CYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdfCYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdf
 
CJIS Projects NICS 2015 v2 [Autosaved]
CJIS Projects NICS 2015 v2 [Autosaved]CJIS Projects NICS 2015 v2 [Autosaved]
CJIS Projects NICS 2015 v2 [Autosaved]
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...
 
Uop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz newUop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz new
 
Presentation to Iowa Criminal and Juvenile Justice Advisor Council
Presentation to Iowa Criminal and Juvenile Justice Advisor CouncilPresentation to Iowa Criminal and Juvenile Justice Advisor Council
Presentation to Iowa Criminal and Juvenile Justice Advisor Council
 
Cyber law
Cyber lawCyber law
Cyber law
 
AIIM 2015 - Data Privacy
AIIM 2015 - Data PrivacyAIIM 2015 - Data Privacy
AIIM 2015 - Data Privacy
 
Current Privacy and Data Issues (for people who care about open data!)
Current Privacy and Data Issues (for people who care about open data!)Current Privacy and Data Issues (for people who care about open data!)
Current Privacy and Data Issues (for people who care about open data!)
 

Mais de Frederick Lane

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical EducatorFrederick Lane
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for EducatorsFrederick Lane
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of CybersecurityFrederick Lane
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech DirectorsFrederick Lane
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital MobFrederick Lane
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational ToolFrederick Lane
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social MediaFrederick Lane
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for EducatorsFrederick Lane
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and ProfessionalFrederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEEFrederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?Frederick Lane
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR ProfessionalsFrederick Lane
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEEFrederick Lane
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEEFrederick Lane
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...Frederick Lane
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & CybersecurityFrederick Lane
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get CaughtFrederick Lane
 

Mais de Frederick Lane (20)

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught
 

Último

ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 

Último (20)

prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 

2013-12-06 Digital Forensics and Child Pornography

  • 1. Digital Forensics and Child Pornography Frederick S. Lane DE Assoc. of Criminal Defense Lawyers Wilmington, DE 6 December 2013 www.FrederickLane.com www.ComputerForensicsDigest.com 1
  • 2. Seminar Overview • Introduction and Overview • Digital Technology and CP • Digital Investigations • Defending Child Pornography Cases www.FrederickLane.com www.ComputerForensicsDigest.com 2
  • 3. Introduction and Overview • Background and Expertise • What Is Child Pornography? • Digital Technology and the Spread of Child Pornography www.FrederickLane.com www.ComputerForensicsDigest.com 3
  • 4. Background and Expertise • Attorney and Author of 7 Books • Computer Forensics Expert -- 15 years • Over 100 criminal cases • Lecturer on ComputerRelated Topics – 20+ years • Computer user (midframes, desktops, laptops) – 35+ years www.FrederickLane.com www.ComputerForensicsDigest.com 4
  • 5. What Is Child Pornography? • • • • Federal Laws State Laws International Law Determining Age of Person Depicted www.FrederickLane.com www.ComputerForensicsDigest.com 5
  • 6. Federal CP Laws • 18 U.S.C. c. 110 – Sexual Exploitation and Other Abuse of Children • 18 U.S.C. § 2251 – Production • 18 U.S.C. § 2252 – Possession, Distribution, and Receipt • 18 U.S.C. § 2256 -- Definitions www.FrederickLane.com www.ComputerForensicsDigest.com 6
  • 7. “Child Pornography” 18 U.S.C. § 2256(8): “any visual depiction, including any photograph, film, video, picture, or computer or computer-generated image or picture, whether made or produced by electronic, mechanical, or other means, of sexually explicit conduct, where— (A) the production of such visual depiction involves the use of a minor engaging in sexually explicit conduct; [or] (B) such visual depiction is a digital image, computer image, or computer-generated image that is, or is indistinguishable from, that of a minor engaging in sexually explicit conduct; or (C) such visual depiction has been created, adapted, or modified to appear that an identifiable minor is engaging in sexually explicit conduct.” www.FrederickLane.com www.ComputerForensicsDigest.com 7
  • 8. Other Relevant Definitions • “Minor” [18 U.S.C. § 2256(1)]: <18 • 18 U.S.C. § 2257: Record-keeping requirements • “Sexually Explicit Conduct” [18 U.S.C. § 2256(2)(A)]: • (i) sexual intercourse, including genital-genital, oral-genital, anal-genital, or oral-anal, whether between persons of the same or opposite sex; • (ii) bestiality; • (iii) masturbation; • (iv) sadistic or masochistic abuse; or • (v) lascivious exhibition of the genitals or pubic area of any person. • Slightly Different Definitions for Computer Images [18 U.S.C. § 2256(2)(B)] www.FrederickLane.com www.ComputerForensicsDigest.com 8
  • 9. NCMEC • “National Center for Missing and Exploited Children” • Created by Congress in 1984 • Child Recognition and Identification System – database of hash values of CP images • Child Victim Identification Program www.FrederickLane.com www.ComputerForensicsDigest.com 9
  • 10. State CP Laws • All 50 states have their own CP laws • Age of minority varies: 16 (30 states); 17 (9 states); and 18 (12 states) • Prosecution can be federal or state, or both. • Can include “harmful to minors” standard (states only) www.FrederickLane.com www.ComputerForensicsDigest.com 10
  • 11. Delaware CP Laws • DEL CODE § 1103 – Definitions Relating to Children • DEL CODE § 1108 – Sexual Exploitation of a Child • DEL CODE § 1109 – Dealing in Child Pornography • DEL CODE § 1110 – Subsequent Convictions … • DEL CODE § 1111 – Possession of Child Pornography www.FrederickLane.com www.ComputerForensicsDigest.com 11
  • 12. DEL CODE 1103 • “Child”: Anyone under age of 18 or any individual intended to appear <14. • “Prohibited Sexual Acts”: • (1) Sexual intercourse; • (2) Anal intercourse; • (3) Masturbation; • (4) Bestiality; • (5) Sadism; • (6) Masochism; • (7) Fellatio; • (8) Cunnilingus; • (9) Nudity, if such nudity is to be depicted for the purpose of the sexual stimulation or the sexual gratification of any individual who may view such depiction; • (10) Sexual contact; • (11) Lascivious exhibition of the genitals or pubic area of any child; • (12) Any other act which is intended to be a depiction or simulation of any act described in this subsection. www.FrederickLane.com www.ComputerForensicsDigest.com 12
  • 13. International CP Laws • Over last 7 years, 100 countries have adopted new CP laws • 53 countries still have no CP law at all • International Center for Missing and Exploited Children • 2012 Child Pornography Model Laws: http://bit.ly/19eWJPz www.FrederickLane.com www.ComputerForensicsDigest.com 13
  • 14. Determining Age Is expert testimony need? Tanner Stage: Outmoded? Role of environmental factors Bait and switch Defendant’s subjective belief is irrelevant • Prosecutors prefer clear cases • • • • • www.FrederickLane.com www.ComputerForensicsDigest.com 14
  • 15. Digital Technology and CP A Brief Background Digital Production of CP Digital Distribution of CP Digital Consumption (Receipt and Possession) • Societal Changes • • • • www.FrederickLane.com www.ComputerForensicsDigest.com 15
  • 16. A Brief Background • 1978: Protection of Children Against Sexual Exploitation Act • 1982: New York v. Ferber – Upholding state law banning child pornography • 1984: Child Protection Act (prohibiting noncommercial distribution) • 1992: Jacobson v. United States – Postal Service entrapment • 2000: Poehlman v. United States – FBI entrapped defendant after lengthy email correspondence www.FrederickLane.com www.ComputerForensicsDigest.com 16
  • 17. Digital Production of CP • Scanners • Digital Cameras (still and video) • Cameraphones (dumb and smart) • Web cams www.FrederickLane.com www.ComputerForensicsDigest.com 17
  • 18. Digital Distribution of CP • One-to-One • Sneakernet • E-mail / Personal File-Sharing • Instant Messaging / Chat Rooms • One-to-Many • • • • Newsgroups and Forums Peer-to-Peer Networks Torrent Networks / File-Hosting Underground Web Sites www.FrederickLane.com www.ComputerForensicsDigest.com 18
  • 19. Digital Consumption of CP • Producer of CP may be in possession without having “received” it • Defendant may be in “receipt” of CP without “knowingly” possessing it • The challenges of determining “intentionally” and “knowingly” in the context of Internet activity www.FrederickLane.com www.ComputerForensicsDigest.com 19
  • 20. Societal Changes • Computers and the Internet • The Democratization of Porn Production • “Porn Chic” • The “Selfie” www.FrederickLane.com www.ComputerForensicsDigest.com 20
  • 21. Digital Investigations • Discovery of Possible Child Pornography • The Role of IP Addresses • Intro to Computer Forensics www.FrederickLane.com www.ComputerForensicsDigest.com 21
  • 22. Discovery of Possible CP • • • • • Angry Spouse or Girlfriend Geek Squads Chat Rooms Hash Flags P2P and Torrent Investigations • Server or Payment Logs www.FrederickLane.com www.ComputerForensicsDigest.com 22
  • 23. Overview of IP Addresses • Assigned to Every InternetConnected Device • Two Flavors: • IPv4: 196.172.0.1 • IPv6: 2001:0db8:85a3:0042:1000:8a2 e:0370:7334 • Leading to “Internet of Things” www.FrederickLane.com www.ComputerForensicsDigest.com 23
  • 24. IP → Physical Address • Ranges of IP Addresses Assigned to ISPs by Internet Assigned Numbers Authority • Online Tools to Look Up ISP • Dynamic vs. Static • Subscriber Records Show Date, Time, IP Address, Limited Activity www.FrederickLane.com www.ComputerForensicsDigest.com 24
  • 25. Limitations of IP Addresses • Links Online Activity to Device, Not Necessarily a Specific User • Data May Not Be Available from ISP • Possibility of War-Dialing www.FrederickLane.com www.ComputerForensicsDigest.com 25
  • 26. Intro to Computer Forensics • • • • Increasingly Specialized Forensics Procedures Forensics Software A Typical Forensics Report www.FrederickLane.com www.ComputerForensicsDigest.com 26
  • 27. Increasingly Specialized • Computer Forensics • Windows • Mac OS • Linux • Network Forensics • Mobile Forensics • Dozens of Mobile OSs • Hundreds of Models • Cloud Forensics • Many Questions, No Clear Answers www.FrederickLane.com www.ComputerForensicsDigest.com 27
  • 28. Forensics Procedures • • • • • • Field Previews Mirror Images Hash Values Staggering Amounts of Data Chains of Custody 2006: The Adam Walsh Act www.FrederickLane.com www.ComputerForensicsDigest.com 28
  • 29. A Typical Forensics Report • There should be at least two reports: • • • • • • Acquisition • Evaluation of Evidence Bowdlerized Detailed procedures Hash value checks Bookmarks of possible contraband Evidence of user ID www.FrederickLane.com www.ComputerForensicsDigest.com 29
  • 30. Defending CP Cases • Pre-Trial Issues • Trial Issues • Typical Defenses in CP Cases [Some More Viable than Others] www.FrederickLane.com www.ComputerForensicsDigest.com 30
  • 31. Pre-Trial Issues • Retaining a Defense Expert • Deposition of Government Experts • Motion(s) to Produce • Motion(s) to Suppress or in limine www.FrederickLane.com www.ComputerForensicsDigest.com 31
  • 32. Trial Issues • Should There Be a Trial? • Motion(s) in limine • Cross-Examination of Government Expert www.FrederickLane.com www.ComputerForensicsDigest.com 32
  • 33. Typical Defenses (1) • Lack of Possession or Receipt • Mere Browsing • The Phantom Hash • Accident or Lack of Intent • Ignorance or Mistake as to Age • Not a Real Child / Morphed / Computer-Generated www.FrederickLane.com www.ComputerForensicsDigest.com 33
  • 34. Typical Defenses (2) • Multiple Persons with Access to Device • Used Equipment with PreExisting CP • Viral Infection • Planting of Evidence by Spouse or Police • Entrapment www.FrederickLane.com www.ComputerForensicsDigest.com 34
  • 35. Slides and Contact Info • Download a PDF of slides from: SlideShare.net/FSL3 • E-mail or Call Me: FSLane3@gmail.com 802-318-4604 www.FrederickLane.com www.ComputerForensicsDigest.com 35
  • 36. Digital Forensics and Child Pornography Frederick S. Lane DE Assoc. of Criminal Defense Lawyers Wilmington, DE 6 December 2013 www.FrederickLane.com www.ComputerForensicsDigest.com 36