StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Digital Forensics Investigation of Child Pornography - Research Paper Example

Cite this document
Summary
From the paper "Digital Forensics Investigation of Child Pornography" it is clear that the digital forensics investigation that was used in Lynn’s case was adequate because it determined that the case should be heard in California, the place where the crime was committed…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Digital Forensics Investigation of Child Pornography
Read Text Preview

Extract of sample "Digital Forensics Investigation of Child Pornography"

Digital Forensics Digital Forensics Digital forensics has an indispensable contribution to the investigation and prosecution of cybercrime. There are cybercrime laws that govern the prosecution of the crime. Different elements justify the adequacy of digital forensics investigation. An outline of a case involving digital forensics investigation of child pornography The United States v Lynn of 2008 is a legal case that had a significant digital forensics component. The case followed the search and arrest of Ryan Christopher Lynn who lived in California for the charges of receipt and possession of child pornography videos. Federal agents seized Lynn’s Toshiba Laptop computer and conducted digital forensics investigation on it. This investigation discovered one hundred and eighty four video files and fifty-three still images of child pornography in Lynn’s computer hard drive (Watson & Jones, 2013). The investigation also found that the videos and images had been obtained from the internet using Limewire, a program that allows peer-to-peer file sharing. On the first count, the defendant was convicted of receiving child pornography, a crime that violates § 2252(a)(2). He was also convicted of possessing child pornography material violating § 2252(a)(4)(B). Lynn was sentenced to 210 months imprisonment for the count of receiving child pornography material and 120 months imprisonment for the count of possessing the material. The court ordered a term of life supervision after Lynn’s release from prison (Casey & Altheide, 2010). Cybercrime laws applicable to United States v Lynn Lynn’s case implored the application of 18 U.S.C §§ 2251 through 2260. These sections warrant criminal and civil forfeiture of devices used to depict child pornography, the profits obtained from these crime and properties used in committing them. Record keeping of materials used to depict sexually explicit conduct was provided for in section 2257. Lynn was also liable for failure to report child abuse that is entrenched in a misdemeanor crime in section 2258. The 18 U.S.C §2525 that addresses the circumstances involving the use of interstate facilities to disseminate information about a minor was applicable to Lynn’s case. Another law that applied to this case is Title 19 section 1305 that criminalizes the importation of obscene materials. This law permits courts to order the seizure and forfeiture of such materials (Altheide & Carvey, 2011). Since Lynn retrieved the materials from the internet which is interstate, he was convicted of violation of the 18 U.S.C § 2252. This section criminalizes interstate distribution of materials depicting a child engaging in sexually explicit conduct. The Child Pornography Prevention Act of 1996 applied in this case because it grants that the said child can be either real or virtually created. Lynn was prosecuted under the federal law that is implicated anytime child pornography crimes involve interstate or international commerce. This is because there was proof that the pornography material that Lynn had on his laptop may have been produced in Georgia, and it had therefore travelled through states to get to California. Additionally, federal law on prohibition of interstate and international commerce of child pornography applied to Lynn’s case because there was evidence that a copy of the material from Lynn’s laptop had been spotted in London, England (Sammons, 2011). The role of digital forensics in Lynn’s case Digital forensics helped ascertain that the material that was on Lynn’s laptop was child pornography. Digital forensics officers obtained Lynn’s hard drive after confiscation by the federal agents who executed the search warrant issued against Lynn. The hard disk was then cleaned and copied using software such as ProDiscover or Encase. This is called forensic imaging and it secures the original copy that is found in the hard drive from corruption because some files corrupt when copied. Digital forensics was also instrumental in recovering information that may have been deleted from Lynn’s computer. This investigation helped retrieve all hidden data regarding the sexually explicit material in the computer. Encrypted material were accessed by the use of specialized digital forensics software. The parts of the computer that are normally inaccessible were accessed using computer forensics programs and the information that was relevant to the case under investigation retrieved (Lillard, 2010). It was the role of digital forensics to investigate and document Lynn’s internet activity. The cookies and Uniform Resource Locator (URLs) of the sites that Lynn had visited were recorded. The dates and times when these sites were visited were among the artifacts collected. Investigators utilized graphic viewing utilities to display thumbnails of audiovisual and graphic files on Lynn’s hard disk drive to help isolate child pornography material. They also located contraband material related to the child pornography in the directory structure. Limewire peer-to-peer file sharing application helped digital forensics establish that distribution of child pornography had occurred on Lynn’s computer. Digital forensics analyzed the collected information and prepared a report that informed the prosecution of the case. While this report was valuable to the court proceeding, digital forensics investigators availed themselves for expert witness in court (Watson & Jones, 2013). Assessing the adequacy of the digital forensic investigation One of the things that justify the adequacy of the digital forensic investigation that was deployed to Lynn’s case was its compliance with legislative procedures. This investigation passes the test for compliance with legislative procedures because the federal officers who seized Lynn’s computer and arrested him had a warrant. It would, however, been inadequate to either search items not stipulated in the warrant, or use techniques not validated by law. The digital investigation of Lynn’s case could be assessed for the way it informed the appropriate venue of the case. Internet activity involving child pornography can be tried in the courts of the place of its origin or the courts of the place of its receipt. The digital forensics investigation that was used in Lynn’s case was adequate because it determined that the case should be heard in California, the place where the crime was committed (Casey & Altheide, 2010). The adequacy of the investigation was questioned when the appellate court reversed the district court’s sentence on Lynn’s double count. The appellate court granted Lynn’s contention that the district court had violated the Fifth Amendment’s prohibition for double jeopardy. This showed that the investigation’s proof that Lynn received the child pornography material on January 10, 2008 and possessed it on May 23, 2008 was insufficient for a double count (Altheide & Carvey, 2011). In conclusion, digital forensics had a key role in United States v Lynn of 2008. The 18 U.S.C. § 2252 is an example of a cybercrime law that was applicable in the case. Digital forensics helped with the roles of collecting, examining, analyzing and reporting evidence from Lynn’s computer relating to the case. Compliance with legislative procedures and informing the choice of the venue of the hearing are some of things that attest to the adequacy of the digital forensics investigation used in Lynn’s case. References Altheide, C. & Carvey, H. (2011). Digital Forensics with Open Source Tools. Burlington, MA: Elsevier Science. Casey, E. & Altheide, C. (2010). Handbook of digital forensics and investigation. Burlington, MA: Academic Press. Lillard, T. (2010). Digital forensics for network, internet, and cloud computing: a forensic evidence guide for moving targets and data. Burlington, MA: Syngress. Sammons, J. (2011). The basics of digital forensics: the primer for getting started in digital forensics. Burlington, MA: Elsevier Science. Watson, D. & Jones, A. (2013). Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements. Waltham, MA: Elsevier Science. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Legal Topic Digital Forensics Paper Research Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved de https://studentshare.org/information-technology/1650193-legal-topic-digital-forensics-paper
(Legal Topic Digital Forensics Paper Research Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/information-technology/1650193-legal-topic-digital-forensics-paper.
“Legal Topic Digital Forensics Paper Research Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1650193-legal-topic-digital-forensics-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Digital Forensics Investigation of Child Pornography

Forensic Case Portfolio

The photo represents the area where the police officers believe a suspect took part in the viewing of child pornography.... The suspect was behind bars after the police received two complaints from the suspect neighborhood that the suspect, Lee Oswald Havey, took part in the distribution of child pornography.... The investigators arrived at the home of the suspect the police showed them the room they suspected Havey to have used to watching and distributing child pornography....
13 Pages (3250 words) Case Study

Computer forensics laboratory

Known files are ignored, while notable files, such as hacking tools and child pornography, are scrutinized.... If the goal of the investigation is to obtain pornographic images as evidence against the suspect, then the appropriate file signature, such as JPEG, for images must be identified.... Computer forensics is a discipline that integrates aspects of law and computer in the process of data collection and assessment from “computer systems, networks, wireless communications, and storage devices” in a manner that does not violate procedural laws on admissibility (US-CERT 2008)....
3 Pages (750 words) Essay

Digital Forensics/Electronic Evidence

The three types of crimes covered under digital forensic include; child pornography which is the most diverse type of digital crime.... The three types of crimes covered under digital forensic include; child pornography which is the most diverse type of digital crime.... child pornography destroys the minds of children and at times, it bullies them.... digital forensics/ electronic evidence Digital forensic involves the concept of retrieving information from computer media....
1 Pages (250 words) Essay

Case Portfolio Analysis

Obtaining the call logs will reveal the information he was communicating and the recipients of the same and whether in his communications he talked of child pornography at all.... The essay "Case Portfolio Analysis" focuses on the critical analysis of the major issues on the case portfolio....
6 Pages (1500 words) Essay

Computer Forensics

The following are examples of what type of digital crime: child pornography, Embezzlement, Fraud, Software Piracy?... True or False: Anime pictures of children appearing nude is considered child pornography in the U.... (10 point question) Read the following scenario and respond to the questions below:As a digital forensics examiner, you have been called to the scene of a Kidnapping.... Your job at the scene as a digital forensics examiner is to recommend to the investigating officer a course of action as to what digital evidence may or may not be needed to investigate this crime....
2 Pages (500 words) Coursework

Digital Forensics

IsureDidit, who is suspected of child pornography, can prove to be a tricky affair for an investigating officer due to the technical expertise required and the intricate nature of the internet.... The browser history, comprising of URLs of child pornography was also recorded.... The investigating officer prepared an affidavit that described the basis for the crime of child pornography and a search warrant limiting the search to the suspect's workspace was issued by a competent court....
7 Pages (1750 words) Case Study

Cyber Crime and Forensic Investigation

One of the best-known cases of encryption creating problems for investigators was the investigation into online child pornography.... The paper "Cyber Crime and Forensic investigation" is a great example of a report on the law.... The paper "Cyber Crime and Forensic investigation" is a great example of a report on the law.... lectronic crime is very difficult to investigate and prosecute, mainly due to the fact that investigators have to build their cases based on artifacts left on computer systems (Pajek and Pimenidis, 2009) Nowadays, computer criminals are aware of computer forensics methods and techniques and try to use countermeasure techniques to efficiently impede the investigation processes....
9 Pages (2250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us