Advertisement

Electronic Data Can Help Unlock Criminals’ Secrets

Share
ASSOCIATED PRESS

Not since the glory days of letter-writing, before the advent of the telephone, have people committed so much revealing stuff to written form as they do in the age of computers.

All those e-mail messages and electronic files are a treasure trove of evidence for law enforcement officers, whether they are targeting terrorists, crooked CEOs or local drug dealers.

The challenge for police and prosecutors is learning how to dig up and preserve these electronic gems.

Advertisement

“Any agent can come in and look through papers, but not every agent can do a thorough computer search,” said David Green, deputy chief of the Justice Department’s computer crime section, which helps train federal and state investigators.

Green teaches that a mistake as simple as turning off a computer can wipe away valuable evidence. Knowing such basics, and the ins and outs of privacy law, is essential when electronic evidence may play a role in so many cases.

“It’s like the gift that keeps on giving,” said Tom Greene, a deputy attorney general in California, one of the states suing Microsoft Corp. in an antitrust case built largely on computer messages. “People are so chatty in e-mail.”

E-mail revealed the shredding of documents at Arthur Andersen and exposed Merrill Lynch analysts condemning stocks as a “disaster” or a “dog” while publicly touting them to investors.

Anti-American sentiments in messages Taliban fighter John Walker Lindh and shoe bomb suspect Richard Reid sent to their mothers were gathered as evidence against them.

And when Wall Street Journal reporter Daniel Pearl was kidnapped and killed in Pakistan, investigators used e-mails from his abductors to track them down.

Advertisement

When drug dealers are arrested, police search their electronic organizers and cell phones for associates’ names and telephone numbers. When someone is accused of molesting a child, his computer is searched for child pornography. When a company is sued, it can be forced to turn over thousands of employee messages.

“E-mail has become the place where everybody loves to look,” said Irwin Schwartz, president of the National Assn. of Criminal Defense Lawyers.

One reason is that computer data is difficult to destroy. Just clicking “delete” won’t do it, as Oliver North learned during the 1980s Iran-Contra probe, one of the earliest investigations to rely on backup copies of electronic messages.

Deleted files can linger, hidden on a computer’s hard drive until that space is overwritten with new information.

“The best way to get rid of computer data is to take the hard drive and pound it with a hammer and throw it in a furnace,” said John Patzakis, president of Guidance Software, which makes forensic software that helps police find hidden files.

Even that might not work with e-mail, which investigators also may be able to track down in an employee’s office server, stored by Internet service providers or in the recipient’s computer.

Advertisement

To go hunting through computer data, law officers need a search warrant issued by a judge. Winning legal permission to eavesdrop on e-mail as it’s transmitted is more difficult because that is considered the same as wiretapping a telephone.

Investigators generally need a court order based on probable cause that the wiretap will reveal evidence of a felony.

Advertisement