25.01.2015 Views

Digital Contraband Finding Child Porn in the ... - Stroz Friedberg

Digital Contraband Finding Child Porn in the ... - Stroz Friedberg

Digital Contraband Finding Child Porn in the ... - Stroz Friedberg

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

agent to access <strong>the</strong> offend<strong>in</strong>g visual depiction; and (3) promptly takes reasonable steps to<br />

destroy each such visual depiction or reports <strong>the</strong> matter to a law enforcement agency and<br />

gives <strong>the</strong> agency access to each such visual depiction. 20 This statutory affirmative defense<br />

is not available if three or more images are found. Usually where <strong>the</strong>re is one such<br />

image, <strong>the</strong>re are dozens or hundreds more. If this is <strong>the</strong> case, <strong>the</strong> affirmative defense<br />

evaporates, and handl<strong>in</strong>g or even destroy<strong>in</strong>g <strong>the</strong> images may expose <strong>the</strong> company to<br />

crim<strong>in</strong>al liability.<br />

In short, discovery of child porn on a specific company computer may be just <strong>the</strong><br />

tip of <strong>the</strong> iceberg and should trigger o<strong>the</strong>r <strong>in</strong>vestigatory queries:<br />

• Did <strong>the</strong> offend<strong>in</strong>g employee send child porn to o<strong>the</strong>r employees, whose<br />

workstations should be exam<strong>in</strong>ed<br />

• Are <strong>the</strong> child porn images only on <strong>the</strong> employee’s workstation computer<br />

or is <strong>the</strong>re evidence on that workstation that <strong>the</strong> images were transferred<br />

from or to external hard drives, CDs or o<strong>the</strong>r removable media or even an<br />

onl<strong>in</strong>e storage area<br />

• Were <strong>the</strong> child porn images found <strong>in</strong> a location subject to system backups<br />

• Were <strong>the</strong> child porn images found <strong>in</strong> a format that suggests fur<strong>the</strong>r stores<br />

of child pornography may exist on company computers <strong>in</strong> encrypted,<br />

hidden, or re-named form<br />

A company may f<strong>in</strong>d itself between <strong>the</strong> proverbial rock and a hard place when, to<br />

m<strong>in</strong>imize <strong>the</strong> risk of possession liability, it undertakes an <strong>in</strong>vestigation of <strong>the</strong> corporate<br />

network to f<strong>in</strong>d any o<strong>the</strong>r caches of child porn and, at <strong>the</strong> same time, due to <strong>the</strong><br />

distribution prohibition, cannot transfer <strong>the</strong> media where <strong>the</strong> illicit images are found to<br />

outside experts for analysis or purg<strong>in</strong>g. Deal<strong>in</strong>g with this conundrum may require<br />

creative solutions such as employ<strong>in</strong>g forensic analysis on-site or craft<strong>in</strong>g concrete<br />

technical protocols that can be sanctioned by law enforcement.<br />

A forensic exam<strong>in</strong>ation of <strong>the</strong> computer on which <strong>the</strong> child porn was found will<br />

help determ<strong>in</strong>e whe<strong>the</strong>r <strong>the</strong> illegal images were sent via e-mail to o<strong>the</strong>r employees us<strong>in</strong>g<br />

workstations <strong>in</strong> <strong>the</strong> office and may reveal whe<strong>the</strong>r <strong>the</strong> illegal images were pr<strong>in</strong>ted or<br />

copied onto removable media, such as thumb-drives, floppy disks or CDs. In situations<br />

where multiple employees may have access to office computers, forensic exam<strong>in</strong>ation<br />

may also help identify <strong>the</strong> user responsible for br<strong>in</strong>g<strong>in</strong>g <strong>the</strong> child porn <strong>in</strong>to <strong>the</strong> company.<br />

In addition, this exam<strong>in</strong>ation may reveal whe<strong>the</strong>r shared file servers or e-mail servers<br />

were used to archive illegal images and may reveal whe<strong>the</strong>r a peer-to-peer (P2P) fileshar<strong>in</strong>g<br />

program has been improperly <strong>in</strong>stalled on <strong>the</strong> network and used to trade child<br />

porn. F<strong>in</strong>ally, a computer forensic exam<strong>in</strong>ation may reveal whe<strong>the</strong>r some illegal images<br />

have been encrypted, hidden with<strong>in</strong> o<strong>the</strong>r image files, or pasted <strong>in</strong>to word process<strong>in</strong>g<br />

documents with .doc or .wpd extensions.<br />

4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!