Modern Tools for the Modern Investigation

Digital Forensic Investigators for Criminal Law

When criminal charges are involved, the facts quickly become relevant. How these facts have been obtained also becomes an important question for both the defendant and the prosecutor. With mobile devices such as smartphones, tablets and more becoming part of our daily lives, it is critical that an investigator has the ability to process and analyze these “smart IP-enabled” devices.

McCann’s digital investigations (computer and mobile device forensics) combined with our extensive experience in fraud, crime scenes and law enforcement, are a smart choice for your investigation. McCann has extensive case history in working both for defense and prosecution, helping to gather evidence in support or referral to local, state and federal law enforcement.

Glossary of Criminal Law Terms

There are numerous terms that relevant to digital forensics investigations that people browsing our site might not necessarily be familiar with.  Therefore, we have compiled a glossary of important terms that you might encounter as you browse the site.  If there are any terms not included in this list or if there are any terms you don't fully understand, please feel free to contact us at McCann and we will be happy to help.

Example Criminal Law Cases

The cases listed below represent a small sample of the hundreds of cases investigated by McCann over the past 28 years.  Material facts have been changed to protect the privacy of our clients. Some of the cases discussed combine various issues and materials found in relevant case studies that have been reviewed by McCann Investigators. No attempt should be made to draw any factual conclusions based on the cases discussed.  Please contact McCann Investigations for real world cases in which references can be furnished.

Claims of Child Abuse and Possession of Child Pornography by a Priest

In this case, McCann digital forensic investigators were retained by defense attorneys in a charge that their client was a child abuser and engaged in child pornography. The claim, which began with the review of content found on a public access computer at the church’s offices, appeared to indicate that the accused may have been using the computer to review illegal materials. The computer, which was available to anyone, was located outside of the defendant’s office.  When the priest was accused, he voluntary turned over his home computer, iPad, iPhone and access to his cloud storage account. He voluntary provided access to all emails accounts associated to him. After a review of the digital contents of his home and other personal digital property, McCann Investigators were unable to identify any pornographic content of any type, illegal or legal. 

Claims of Sexual Molestation by a Care Giver

In this case, McCann digital investigators were asked to review communications between an adult child care worker and a juvenile child in his care. The child care worker had just been arrested on a charge of public exposure, and the family wanted to see if he had developed an inappropriate relationship with their 14 year old son. The family provided the McCann Investigator with the Android phone of the 14 year old son, which was the primary method of communication with the child care worker. Text communication between the parties indicated that a sexual relationship had developed that included the sharing of personal photographs of a sexual nature. The evidence was turned over to local law enforcement. 

Statuary Rape: Sexual Communication between an Adult and a Juvenile

In this case, McCann digital investigators were asked to review text communications between an adult male, age 22 and an adolescent female, age 15. The case had not yet been referred to law enforcement, but the family of the female wanted to see “what the truth was” since the female denied that they had developed a sexual relationship. The communication between the two, apparently, had occurred mostly via text messaging and via instant messaging on Facebook.  The smart phone of the female was imaged and deleted text messages recovered.  Text messages between the female and the phone believed to belong to the 22 year old male showed evidence of sexual communication, including a photo of the female involved in a sexual act with a possible third male. 

Theft of Credit Card Data in a Private Business

In this case, McCann digital investigators were asked to review possible downloading of thousands of clients’ personal information, including credit card numbers, expiration dates and security codes. The client, who saved this data for automatic monthly processing, believed that someone in the accounting department downloaded over ten thousand credit cards. They needed to understand quickly if these breaches had occurred so that they could contact their clients for identity theft protection. It was determined that the credit card information, along with other detailed personal information such as social security, etc., had been downloaded by an assistant controller. Notice was provided to the impacted clients and referral was made to local law enforcement. It was later learned that she had sold the information. 

Real Estate Development: Non-Disclosure of EPA Stop Work Notices

In this case, McCann Investigators were retained by a client who was facing federal criminal charges related to a technical violation of the federal law regarding the protection of wetlands. Our client, the accused “destroyer of a duck habit,” claimed that they had obtained the proper permits to engage in land work at the site and were unaware of the notice to stop work that had been provided to his customer, the land owner. McCann investigators were able to show that our client received no such email from the land owner. During forensic discovery of the land owner’s email records, it was determined that they had received notice and decided not to share it with our client.  The evidence was used to resolve our client’s issues with the EPA.

Related Posts from Our Blog

  • Unsophisticated Embezzlement

    Embezzlement stories that you hear in the news often involve highly complex fraud involving a team of high-level employees using sophisticated means to steal millions from a company. But more often, embezzlement can occur that can be as unsophisticated as diverting a small amount of funds to a personal bank account over a long period of time. While these types of embezzlement don't have the sensationalism that makes a news story, they certainly can do just as much damage to a company.

  • DIY Background Checks

    Doing background checks on potential dates and room mates is as easy as doing a Google search or using an online background check service. This is good for "checking someone out" on a very high level. Given that most people forget to set their privacy settings on their social media and are prone to over share, simply checking out someone's social media presence reveals a lot about a person. An in-depth background investigation is much more involved, but reveals much more than a DIY background.

  • When it's NOT Conscious Uncoupling

    In recent days, the term "conscious uncoupling" has entered American pop-culture as a term used to describe the super amicable split between two people. This conscious uncoupling is meant to help reduce the stress and strife that is often brought on by divorce. In many cases, the thought process behind the divorce is far from the conscious uncoupling elements of accountability and self-awareness and becomes an all out war between two soon-to-be former spouses.

The McCann Suite of Investigation Tools:

McCann Investigations are accredited members of...