Skip to content
Search
  • HOME
  • about
  • Services
  • Blog
  • HOME
  • about
  • Services
  • Blog
CONTACT US

The Trojan Horse Defense

I was recently asked to testify as an expert in a criminal trial. During the trial, the federal prosecutor read the following portion of the BitTorrent & Digital Contraband research paper [1] that I wrote for SANS Institute:

"The Trojan Horse Defense is a specific application of the more general "some other dude did it" defense but has the advantage of providing a single alternate explanation that is less abstract than an unknown perpetrator. Although lawyers refer to it as the "Trojan Horse Defense," in common use, it applies to a defense based on any malware including a virus, a worm or even browser hijacking. It also plays on a common fear about getting hacked that may resonate with members of the jury."

I stand by these remarks as they were directed at an audience comprised primarily of forensic professionals working for law enforcement. Our justice system is adversarial by design. The role of the prosecution is to prove their case beyond a reasonable doubt. The role of the defense attorney is to highlight areas where the prosecution has failed to prove their case beyond a reasonable doubt. The role of a digital forensics expert is to talk about the technical merits of the case in a truthful manner, regardless of which side has retained him or her.

As a technical expert on cyber security and digital forensics, I believe eliminating a defense based on malware should be a standard procedure for every investigation involving a computer crime. In fact, certain forensic tools, such as Axiom by Magnet Forensics [2] and Cellebrite Physical Analyzer [3] have this capability built in. If the prosecution fails to eliminate malware, it is reasonable to expect that defense arguments would explore this oversight.


[1] https://www.sans.org/reading-room/whitepapers/legal/bittorrent-digital-contraband-36887
[2] https://www.magnetforensics.com/resources/axiom-at-work-malware-investigations/
[3] https://cellebrite.com/en/glossary/malware-scanner-mobile-device-forensics/

MORE POSTS

Digital Evidence and Data Recovery

Digital Evidence Search Rules: Are Current Standards Constitutionally Broken?

Read More »
May 5, 2025
Digital Evidence and Data Recovery

Real-World Impact: Digital Forensics Case Studies and Conclusion

Read More »
April 14, 2025
Digital Forensics Court Expert
Legal Strategy

Leveraging Your Digital Forensics Expert in Court: Maximizing Their Role During Trial

Read More »
March 24, 2025
Load More ...
Digital Evidence and Data Recovery

Digital Evidence Search Rules: Are Current Standards Constitutionally Broken?

Read More »
May 5, 2025
Digital Evidence and Data Recovery

Real-World Impact: Digital Forensics Case Studies and Conclusion

Read More »
April 14, 2025
Load More ...
Digital Evidence and Data Recovery

Digital Evidence Search Rules: Are Current Standards Constitutionally Broken?

Read More »
May 5, 2025
Digital Evidence and Data Recovery

Real-World Impact: Digital Forensics Case Studies and Conclusion

Read More »
April 14, 2025
Load More ...

our services

Background Checks and Open-Source Intelligence Gathering

Mobile Forensics

Cloud Forensics

Computer Forensics

Lucid Truth Technologies is a registered trademark of Kenneth G. Hartman Consulting, LLC
©2025. Lucid Truth Technologies.
Privacy Policy
Scroll to Top

Subscribe