Digital Contraband Finding Child Porn in the ... - Stroz Friedberg
Digital Contraband Finding Child Porn in the ... - Stroz Friedberg
Digital Contraband Finding Child Porn in the ... - Stroz Friedberg
- No tags were found...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
agent to access <strong>the</strong> offend<strong>in</strong>g visual depiction; and (3) promptly takes reasonable steps to<br />
destroy each such visual depiction or reports <strong>the</strong> matter to a law enforcement agency and<br />
gives <strong>the</strong> agency access to each such visual depiction. 20 This statutory affirmative defense<br />
is not available if three or more images are found. Usually where <strong>the</strong>re is one such<br />
image, <strong>the</strong>re are dozens or hundreds more. If this is <strong>the</strong> case, <strong>the</strong> affirmative defense<br />
evaporates, and handl<strong>in</strong>g or even destroy<strong>in</strong>g <strong>the</strong> images may expose <strong>the</strong> company to<br />
crim<strong>in</strong>al liability.<br />
In short, discovery of child porn on a specific company computer may be just <strong>the</strong><br />
tip of <strong>the</strong> iceberg and should trigger o<strong>the</strong>r <strong>in</strong>vestigatory queries:<br />
• Did <strong>the</strong> offend<strong>in</strong>g employee send child porn to o<strong>the</strong>r employees, whose<br />
workstations should be exam<strong>in</strong>ed<br />
• Are <strong>the</strong> child porn images only on <strong>the</strong> employee’s workstation computer<br />
or is <strong>the</strong>re evidence on that workstation that <strong>the</strong> images were transferred<br />
from or to external hard drives, CDs or o<strong>the</strong>r removable media or even an<br />
onl<strong>in</strong>e storage area<br />
• Were <strong>the</strong> child porn images found <strong>in</strong> a location subject to system backups<br />
• Were <strong>the</strong> child porn images found <strong>in</strong> a format that suggests fur<strong>the</strong>r stores<br />
of child pornography may exist on company computers <strong>in</strong> encrypted,<br />
hidden, or re-named form<br />
A company may f<strong>in</strong>d itself between <strong>the</strong> proverbial rock and a hard place when, to<br />
m<strong>in</strong>imize <strong>the</strong> risk of possession liability, it undertakes an <strong>in</strong>vestigation of <strong>the</strong> corporate<br />
network to f<strong>in</strong>d any o<strong>the</strong>r caches of child porn and, at <strong>the</strong> same time, due to <strong>the</strong><br />
distribution prohibition, cannot transfer <strong>the</strong> media where <strong>the</strong> illicit images are found to<br />
outside experts for analysis or purg<strong>in</strong>g. Deal<strong>in</strong>g with this conundrum may require<br />
creative solutions such as employ<strong>in</strong>g forensic analysis on-site or craft<strong>in</strong>g concrete<br />
technical protocols that can be sanctioned by law enforcement.<br />
A forensic exam<strong>in</strong>ation of <strong>the</strong> computer on which <strong>the</strong> child porn was found will<br />
help determ<strong>in</strong>e whe<strong>the</strong>r <strong>the</strong> illegal images were sent via e-mail to o<strong>the</strong>r employees us<strong>in</strong>g<br />
workstations <strong>in</strong> <strong>the</strong> office and may reveal whe<strong>the</strong>r <strong>the</strong> illegal images were pr<strong>in</strong>ted or<br />
copied onto removable media, such as thumb-drives, floppy disks or CDs. In situations<br />
where multiple employees may have access to office computers, forensic exam<strong>in</strong>ation<br />
may also help identify <strong>the</strong> user responsible for br<strong>in</strong>g<strong>in</strong>g <strong>the</strong> child porn <strong>in</strong>to <strong>the</strong> company.<br />
In addition, this exam<strong>in</strong>ation may reveal whe<strong>the</strong>r shared file servers or e-mail servers<br />
were used to archive illegal images and may reveal whe<strong>the</strong>r a peer-to-peer (P2P) fileshar<strong>in</strong>g<br />
program has been improperly <strong>in</strong>stalled on <strong>the</strong> network and used to trade child<br />
porn. F<strong>in</strong>ally, a computer forensic exam<strong>in</strong>ation may reveal whe<strong>the</strong>r some illegal images<br />
have been encrypted, hidden with<strong>in</strong> o<strong>the</strong>r image files, or pasted <strong>in</strong>to word process<strong>in</strong>g<br />
documents with .doc or .wpd extensions.<br />
4