Obtaining information about alleged codefendants; checklist

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search

Obtaining information about alleged codefendants; checklist

Frequently a computer crime is a collaborative effort. Therefore, counsel should obtain whatever information his or her client possesses about any other individuals who are alleged to have been involved in the alleged computer crime. Either investigators involved in the case or the client himself or herself may suggest additional suspects. It is not unusual for one client to attempt to put the blame on others, of course, and therefore statements made by the client should be carefully checked where they attempt to shift the blame. The following checklist contains areas of discussion which should be pursued to obtain information concerning any alleged codefendant or suspect:

  • Name and any aliases
  • Age
  • Home addresses
  • Marital status
  • Number of children
  • Intelligence level, to best of client's knowledge
  • Military service and record, if any
  • Psychiatric history, if any
  • Criminal record, if any
  • Present employer and work address
  • Occupation and duties
  • Membership in any social organizations
  • Membership in labor or other organizations
  • Membership in computer organizations or other professional organizations
  • Relations among alleged codefendants or suspects
  • Theory of defense for any alleged codefendant or suspect
  • Alibi of alleged codefendant or suspect, if any
  • Conflicts between or among stories of alleged codefendants or suspects, including client, if any
  • Alleged codefendant's or suspect's relationships to victim, if any
  • Any incriminating statements made by any codefendant or suspect