What questions should you ask the woman to assist you with your investigations?
1. Do you have a good relationship with your husband? Are you in talking terms as of this moment?
2. Is the laptop in your possession right now? If not, where is it?
3. What is the location of your husband as of this moment? Does he know where you are right now?
4. Before you saw what you saw last night, do you, as his partner, have any reason to suspect that he has been viewing the same kind of content for a while?
What do you need legally to seize that laptop?
For one to be successfully prosecuted of the crime of child pornography, he or she must have knowingly received, distributed or possessed child pornography. So there must be intent on his or her part. In case a person, such as the complainant’s husband, just happened to have stumbled upon the content the wife allegedly caught him watching, he cannot be prosecuted and convicted for the crime of child pornography. However, in case a person is caught with hundreds or thousands of child pornography videos or images on his computer, the intent becomes pretty obvious and the prosecution of the case becomes straightforward (Bector, 2009; Milivojevic, Pickering & Segrave, 2017). For this reason, investigators usually seize computers and computer components owned by suspects to find clues and evidence as to whether they were intentionally and knowingly participating in, distributing, or consuming child pornography.
Some of the computers and computer components that are usually seized by investigators include laptops, CPUs, external data storage devices, hard disks, event logs, buddy lists, chat logs, internet browsing history, financial information, databases, emails and related attachments, image files, video files, documents, software, and hardware (Moore, 2014). So in the case of the complainant’s husband, his laptop ought to be seized to find out if there is evidence of intent on it.
Besides his laptop, connected and networked devices should also be seized or looked into to also gather evidence for prosecution. Connected/ networked devices include routers, switches, hubs, printers, and so on. The evidence that can be gathered from such devices include data, buddy lists, chat logs, event logs, log files, internet browsing history, financial information, databases, emails, attachments, image files, video files, and software. Other evidence that may also be collected from such devices includes the NIC (network interface card) address, the MAC (media access card) address, broadcast settings, IP (Internet Protocol) address, and the LAN (Local area network) address. These pieces of information are considered identifying information and can be utilized as evidence (Moore, 2014).
To acquire all or most of the above pieces of evidence, there...
References
Bector, S. (2009). Your laptop, please: The search and seizure of electronic devices at the United States border. Berkeley Tech. LJ, 24, 695.
Moore, R. (2014). Cybercrime: Investigating high-technology computer crime. Routledge.
U.S. Department of Justice Office of Justice Programs, (n.d). Forensic Examination of Digital Evidence: A Guide for Law Enforcement. National Institute of Justice.
U.S. Department of Homeland Security, (n.d). Best Practices for seizing electronic evidence. United States Secrete service.
Computer Crime and Intellectual Property Section Criminal Division, (2009). Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. Office of Legal Education Executive Office for United States Attorneys.
Milivojevic, S., Pickering, S., & Segrave, M. (2017). Sex Trafficking and Modern Slavery: The Absence of Evidence. Routledge.
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now