Cracking The Computer Forensics Mystery: Volume 17 No.7
Cracking The Computer Forensics Mystery: Volume 17 No.7
Only a few short years ago, the term computer forensics was
10
Volume 17 No.7
B. Email Investigations
Perhaps more than any other technological innovation, email
has become an integral part of daily activity and electronic
discovery. As such, computer forensic engineers are regularly
called upon to investigate and analyze email communication.
United States v. Bach, a child pornography case, illustrates
precisely how computer forensics can be used where email is at
issue.9 Pursuant to a search warrant, Yahoo! computer experts
retrieved all of the information contained in the defendants
email account. Because police were not present when the
defendants email account was searched, the lower court ruled
that the seizure of the emails by Yahoo! was unlawful. The
appellate court reversed the lower court decision, finding that
Yahoo!s search of the defendants email account without a police
officer present was reasonable under the Fourth Amendment
and did not violate the defendants privacy rights.
C. Deleted Data
Unless steps are taken to hide or remove deleted data more
permanently, computer forensic engineers can recover and
examine deleted information. And lest counsel think that the
deleted information is not subject to discovery, significant case
law suggests the opposite.10 The case law, both at the State and
Federal level, is full of civil and criminal decisions where the
individual quite clearly failed to understand that the delete
key on the keyboard is not the equivalent of a paper shredder.
For example, in United States v. Tucker, Utah District Court Judge
Campbell found Jeffrey Tucker guilty of knowingly possessing
child pornography.11 Computer forensic evidence gathered from
deleted Internet cache files that still resided on Tuckers hard
Utah Bar J O U R N A L
11
drive, even after being deleted, were an integral part of the case
against him. The cache files were stored on his hard drive when
he visited various websites containing child pornography. Even
though the files had been deleted, they were still recoverable by a
computer forensics expert. Cases like Tucker illustrate how critical
computer forensics can be in finding seemingly deleted data.12
D. Internet Activity
Computer forensics can also play a vital role in criminal investigations. State v. Guthrie, a case dealing with a criminal prosecution
for murder, is a good example.13 In Guthrie, a preachers wife
was found dead in the bathtub, a victim of an apparent suicide.
Suspicious of the apparent suicide, investigators began looking
into the case. Shortly thereafter, a suicide note appeared. Investigators enlisted the aid of a computer forensics expert, who
discovered that Guthries computers at home and at church had
been used to conduct numerous Internet searches on subjects
related to bathroom deaths. Additionally, the forensic analysis
revealed that the computer-printed suicide note, offered to
exculpate the defendant, was created several months after the
victims death. Needless to say, Mr. Guthrie now finds himself
preaching to a congregation of a different stripe.
E. Spoliation of E-Evidence
Courts will not hesitate to admonish or sanction parties for bad
faith maneuvering, rule violations, and negligent or intentional
spoliation. Sanctions for such conduct have included adverse
inferences or presumptions, preclusion of evidence, monetary
sanctions, and dismissal or default. Procter & Gamble Co. v.
Haugen demonstrates that Utah courts are not hesitant to
impose sanctions for electronic discovery violations.14 Procter &
Gamble was an unfair competition case in which the defendant
moved for sanctions, alleging that the plaintiff violated its duty to
preserve relevant email communications of five key employees.
Finding that the plaintiff breached its duty to preserve, the court
sanctioned the plaintiff $2,000 $10,000 for each of the five
employees. The court also granted the defendants motion to
dismiss the case without prejudice, since the plaintiff failed to
preserve relevant electronic data that it knew was critical to the
case. The court determined that the plaintiffs violation of four
separate discovery orders made defending the case basically
impossible since the crucial electronic evidence was apparently
no longer available.
An Illinois federal district court also imposed sanctions for
deleting electronic evidence in a recent patent infringement
case, Kucala Enters. Ltd. v. Auto Wax Co.15 Based on digital
clues left on the hard drive, computer forensic experts were
able to determine that the plaintiff used Evidence Eliminator,
12
Volume 17 No.7
B. Hiring a Cybersleuth
Computer forensic investigators must have advanced computer
knowledge, with specialized data recovery and computer investigation analysis skills. Ideally, such experts should have some
formalized training such as law enforcement training courses
offered by large departments and agencies and certification
courses offered by recognized private sector companies. Not
every computer forensics specialist has deep systems knowledge,
and most information technology specialists know little about
computer forensics procedures. The needs of a client can be
broad, and often a team of individuals with different skill sets may
be required to effectively handle a case heading for, or involving,
litigation.
Reliable techniques and protocols may include:
Recreating a specific chain of events or user activity, including
Internet activity, email communication, file deletion, etc.;
Searching for key words and dates and determining what
resulting data is relevant;
Searching for copies of previous document drafts;
Searching for potentially privileged information;
Searching for the existence of certain programs such as file
wiping programs; or
Authenticating data files and the date and time stamps of
those files.
Utah Bar J O U R N A L
13
14
Volume 17 No.7