Skip to content
Forensicon
CALL US NOW 888-427-5667
  • Home
  • AboutExpand
    • Computer Forensics Team
    • Chicago Computer Forensics
    • Forensicon Noted Cases
    • Careers at QDiscovery
    • Testimonials
  • Practice AreasExpand
    • Trade SecretsExpand
      • Trade Secrets Misappropriation
    • Employment LitigationExpand
      • Employment Litigation Defense
      • Wage & Hour Litigation
    • Internal InvestigationsExpand
      • Corporate Identity Theft
      • Corporate Security Breach
      • Illicit Employee Activity
    • Family Law
  • ServicesExpand
    • Computer Forensics ServicesExpand
      • Computer Forensics Expert Witness Testimony
      • Computer Forensic Analysis
      • Database Forensics
      • Enterprise Storage Failure & Data Recovery
    • Cell Phone Forensics
    • ConsultingExpand
      • Cyber Security Data Breach Response
      • Expert Witness Testimony & Reports
      • ESI Preservation & Collection
      • Online Content Preservation
    • e-DiscoveryExpand
      • Data Removal & Certification
      • Online Content Preservation
    • Internet Investigations
    • DVR Recovery Forensics
  • ResourcesExpand
    • Articles
    • Case Summaries
    • Computer Forensics Resources
    • Resource Documents
    • Forensicon Newsletters
    • Resource Links
  • News & EventsExpand
    • Forensicon News
    • Forensics Blotter
  • Contact Us
Forensicon
Home / Resources / Case Summaries / United States v. Mann

United States v. Mann

Forensic Analysis Uncovers Child Pornography

592 F. 3d 779 (7th Cir 2010)

On an appeal from the Northern District of Indiana, the Seventh Circuit held that a police detective did not exceed the scope of a warrant issued to search for computer images of voyeurism when his use of computer forensics tools uncovered images of child pornography.

In May of 2007, the Lafayette Police Department of Tippecanoe County, Indiana, recovered a video camera installed by the defendant in the women’s locker room at his place of employment. The officers obtained a search warrant to search the defendant’s residence for “video tapes, CD’s or other digital media, computers, and the contents of said computers, tapes, or other electronic media, to search for images of women in locker rooms or other private areas.” Upon executing the warrant, the police department seized a desktop computer, a laptop, and an external hard drive from the defendant’s home.

Nearly two months later, a police detective began a forensic analysis of the seized equipment, utilizing Forensic Tool Kit to create a mirror image of each hard drive. Among the tools the detective used was the KFF Alert System, which indicated that four files on one hard drive contained known child pornography. The detective’s forensic analysis recovered several videos recorded inside women’s locker rooms and many images of child pornography.

When the state’s prosecutor entered one count of possession of child pornography, the defendant moved to suppress the evidence, arguing that the detective had exceeded the scope of the search warrant. The District Court denied the defendant’s motion to suppress, reasoning that the detective believed he had authority to examine any digital file on the defendant’s computers and had, therefore, discovered the images of child pornography in “plain view.”

The Seventh Circuit agreed, holding that the search was lawful except as to the four files flagged by the KFF Alert System. The Court reasoned that the images of voyeurism could have been anywhere on the computer and the files could have been manipulated to hide their contents. The detective had not abandoned his search under the warrant but had instead continued to look for images of women in locker rooms or other private areas.

The Court held that those files found by the KFF Alert System, however, should be suppressed because the Alert System specifically told the detective the files contained child pornography and could not be validly examined for voyeurism. The Court suggested that the detective should have stopped his search and sought a warrant to search for additional images of child pornography. Nonetheless, all of the other images were properly discovered during the search for images of voyeurism, leaving plenty of evidence for the state to charge the defendant with possession of child pornography.

Search

Related Service Offerings

Computer Forensic Analysis
Forensic Vault Service
Expert Witness Testimony & Reports
...more services

Articles

What is Forensic Hard Drive Imaging?
What is Metadata?
The Liability of Email as Evidence
Track Former Employee’s Computer Activities
Exploring fseventsd Forensics Techniques
...more articles

Forensicon © 2025. All Rights Reserved.

  • Website Privacy Policy
  • SiteMap
  • Website Disclaimer
Corporate Headquarters:
309 W Washington St., Ste 1300
Chicago, IL 60606
v. (888) 427-5667 f. (312) 427-5668
Contact us
Computer Forensics Experts
ESI Discovery Consultants
Digital Cyber Forensic Analysis
Computer Forensics Company
Michigan PI Agency# 3701205872
  • Home
  • About
    • Computer Forensics Team
    • Chicago Computer Forensics
    • Forensicon Noted Cases
    • Careers at QDiscovery
    • Testimonials
  • Practice Areas
    • Trade Secrets
      • Trade Secrets Misappropriation
    • Employment Litigation
      • Employment Litigation Defense
      • Wage & Hour Litigation
    • Internal Investigations
      • Corporate Identity Theft
      • Corporate Security Breach
      • Illicit Employee Activity
    • Family Law
  • Services
    • Computer Forensics Services
      • Computer Forensics Expert Witness Testimony
      • Computer Forensic Analysis
      • Database Forensics
      • Enterprise Storage Failure & Data Recovery
    • Cell Phone Forensics
    • Consulting
      • Cyber Security Data Breach Response
      • Expert Witness Testimony & Reports
      • ESI Preservation & Collection
      • Online Content Preservation
    • e-Discovery
      • Data Removal & Certification
      • Online Content Preservation
    • Internet Investigations
    • DVR Recovery Forensics
  • Resources
    • Articles
    • Case Summaries
    • Computer Forensics Resources
    • Resource Documents
    • Forensicon Newsletters
    • Resource Links
  • News & Events
    • Forensicon News
    • Forensics Blotter
  • Contact Us