Prominent Forensics & Analytics Expert Anton Litchfield Joins Discovia as Vice President of Forensics


San Francisco, CA (PRWEB) July 22, 2014

Discovia, a leading global provider of eDiscovery services to corporations, law firms and government entities, announced today that it has expanded its senior data forensics team with the hiring of Anton Litchfield as Vice President of Forensics. He is based in Vancouver, Washington and can be contacted at anton(dot)litchfield(at)discovia(dot)com.

“I am extremely excited to join Discovia as the next step in my professional career,” said Litchfield. “Discovia is a well-run company staffed with proven industry experts who utilize cutting-edge technologies and workflows to help clients achieve favorable results. It seems like the perfect fit for me and I look forward to adding my law enforcement and private sector investigative experience to the Discovia team.”

Litchfield will assist law firms, corporate legal departments and federal, state and local governments with corporate governance, internal investigations, data collection, data forensics and analytics, and cybercrime prevention. Prior to joining Discovia, he was Vice President of Forensics & Analytics at Epiq Systems. He held a similar position at Encore Discovery Solutions, which was acquired by Epiq in 2011, and previously was Managing Director of the data forensics consulting practice at Bridge City Legal and Managing Principal of the data forensics practice at New Technologies, Inc. (NTI). He is an EnCase Certified Examiner and holds a professional certificate in computer forensics from Oregon State University.

Since 1996 Litchfield has testified in over 50 jury trials, depositions, and hearings throughout the US and Canada. He has also served as a court appointed Special Master for computer discovery and forensics. Prior to moving to the United States he was a detective in the Ontario Provincial Police’s Child Pornography Unit (“Project P”). His investigations in Project P included child pornography crimes and matters involving the sexual exploitation of children. Mr. Litchfield has conducted joint forces investigations with law enforcement agencies such as the Royal Canadian Mounted Police, the Federal Bureau of Investigation, US Customs, Interpol, the US Postal Inspectors Service, and the Toronto Police Service.

He regularly advises corporations, government entities, and law firms on issues involving electronic evidence preservation and collection. He has conducted computer forensic training classes that have been attended by US federal law enforcement officers, state and local law enforcement officers, military personnel, foreign government officials, and corporate computer security professionals.

“We are very excited about the addition of Anton to our data forensics team,” said Andy Crain, Discovia’s Vice President of Forensics and the unit’s practice leader. “As a former law enforcement officer, he has developed unique expertise in online investigations and data forensics and analytics. He brings to Discovia a sterling reputation as one of the eDiscovery industry’s leading consultants and expert witnesses.”

About Discovia

Discovia is a leading global provider of electronic discovery services to corporations and law firms handling litigation, internal and ITC investigations, and HSR Second Requests. Services include onsite and remote data collections, data minimization, data processing and hosting, expert application of leading technology-assisted review tools, document review management, and document productions. Through its proprietary processes, highly-automated operation and outstanding talent, Discovia delivers a 99.6 percent accuracy rate, data culling rates of over 95 percent for repeat clients, and a net promoter score of over 60 percent. Discovia is the first eDiscovery services firm to deliver a fixed-price managed service, enabling Fortune 500 corporate legal departments and law firms to gain a world-class eDiscovery function without building it internally. More information is available at 415-392-2900 or http://www.discovia.com.

Contacts

Nuala Coogan, Discovia

nuala(at)discovia(dot)com

415-321-8279







Find More Expert Witness Press Releases

Advocacy Group, A Just Cause, Meets With Congressmen On Capitol Hill About IRP6 Case; Shares How IRP Software Will Help Fight Terrorism and Keep America Safe


Denver, Colorado (PRWEB) July 22, 2014

Advocacy group, A Just Cause, announces today that its team has had recent successful meetings with members of Congress in Washington D.C. regarding the IRP6 case. The team shared information with Congress about the law enforcement software that IRP Solutions had developed and found that there is still a need for legislation to support equipping law enforcement agencies with innovative investigations software. A Just Cause believes that the software developed by the IRP6 is critical to the United States fight against terror.

The IRP6 case concerns an African-American company (IRP Solutions Corporation) in Colorado that developed criminal investigations software for federal, state and local law enforcement. The IRP6 were convicted in 2011 and have been incarcerated at the Federal Prison Camp in Florence, Colorado for two years while A Just Cause questions the unusual length of time for getting an appellate decision. The IRP6 and supporters continue to maintain their innocence and are seeking intervention from Congress (D. Ct. No. 1:09-CR-00266-CMA).

The advocacy organization believes that the federal government’s efforts to track terrorist organizations and collaborate with other agencies in the war on terror could be resolved with Case Investigative Lifecycle (CILC) software developed by the now-jailed CEO and former executives of IRP Solutions Corporation. “A Just Cause is pushing for the release of the IRP6 so they can get back to what they were doing… helping to make this country safe,” argues Sam Thurman, A Just Cause.

“We have found that the software developed by IRP Solutions meets or exceeds many of the requirements called out by the 9/11 Commission, as well as what is suggested as best practices by the National Institute of Justice,” says Sam Thurman, A Just Cause. “While the 9-11 Commission Report was released some time back, the issues still exist. The CILC software made such a splash in the market that it was featured in the Law Enforcement Technology Magazine (http://www.officer.com/search?q=irp+solutions), Police Magazine (http://www.policemag.com/channel/technology/articles/2004/02/software-spotlight.aspx and http://www.policemag.com/channel/technology/photogallery/2010/01/law-enforcement-software.aspx), and it was referenced in the 8th Edition of ‘Criminal Investigation,’ a textbook written by Wayne Bennett and Karen Hess (Criminal Investigation, Bennett and Hess, 2007, Thomson Wadsworth),” adds Thurman.

Efforts to track terrorist activities was brought to the forefront with the 9/11 Commission Report. The 9/11 Commission Report states, “The FBI did not have the capability to link the collective knowledge of agents in the field to national priorities.” The report further stated, “The FAA’s capabilities to take aggressive, anticipatory security measures were especially weak.” (National Commission on Terrorist Attacks Upon the United States, August 2004, http://www.9-11commission.gov/report/).

The 9/11 Commission analysis stated, “The FBI did not have an adequate mechanism for validating source reporting, nor did it have a system for adequately tracking and sharing source reporting, either internally or externally” (National Commission on Terrorist Attacks Upon the United States, August 2004, http://www.9-11commission.gov/report/).

Based on forensic evidence presented during the IRP6 trial, we believe that IRP’s CILC software is designed will fulfill the government’s requirements,” says Thurman (Califorensics Analysis, Case 1:09-cr-00266-CMA Document 298-2, 10/8/10 USDC Colorado).

“I am 100% confident that CILC can immediately help the FBI resolve the case management challenges identified by Jack Israel. CILC was designed to be able to do what no other investigative software in the world could – morph itself to work within the process of any law enforcement agency,” says Gary Walker, IRP6 (CEO, IRP Solutions Corporation).

Court records (Ct. No. 1:09-CR-00266-CMA) show that during the trial of the IRP executives, software forensics expert Don Vilfer of Califorensics analyzed the CILC software. According to the analysis conducted by Califorensics, “The software (CILC) contained many notable features, making it a functional product for the intended consumer (Califorensics Analysis, Case 1:09-cr-00266-CMA Document 298-2, 10/8/10 USDC Colorado).” Court records also show that the report stated, “No one software application would meet the needs of all agencies, but the functionality that we observed in our review of the CILC software would undoubtedly be of interest to many law enforcement agencies (Califorensics Analysis, Case 1:09-cr-00266-CMA Document 298-2, 10/8/10 USDC Colorado).”

“Court records show that evidence of the validity of the CILC software, as well as other key testimony were not allowed during trial,” says Thurman. “There is solid proof that the executives of IRP Solutions were engaged with the Department of Homeland Security to the extent of providing a quote to deliver one module of their software to the government… a quote that exceeded $ 100 million (for the Consolidated Enforcement Environment Initiative). I must add that the federal government has already spent over $ 1 Billion on what the government has called failed efforts at this type of software (Virtual Case File and Sentinel, http://www.justice.gov/oig/reports/FBI/a0740/intro.htm),” concludes Thurman.

“This week I visited a Congressman in Washington, D.C. who conceded that federal agents still do not have the tools needed to track and fight terrorism,” says Lamont Banks, A Just Cause. “God forbid a terror attack on the scale of 9/11 strikes this nation again. Let’s imagine if the IRP6 were not incarcerated and their software was in full use throughout the country, could something like the Boston Marathon bombing have been avoided,” questions Banks. “That is a very real scenario that people need to consider while six patriots sit in prison for over two years waiting on an appeal,” adds Banks. “We are asking American citizens to take a hard look at this case and demand that the IRP6 be released. These men believe in this country, and I believe that they have developed something that is truly vital in our war on terror,” says Banks.    

A Just Cause has released information showing that court records (Ct. No. 1:09-CR-00266-CMA) confirm expert witnesses for the IRP6 were not allowed to testify during trial. Andrew Albarelle, Principal Executive Officer of Remy Corporation, a Denver-based staffing company, took the stand to testify on behalf of the defendants, but Judge Arguello dismissed Mr. Albarelle before he could testify. (Discover: Albarelle Letter, Ct. No. 1:09-CR-00266-CMA). “The anomalies in this case are egregious without question”, says Thurman. “When you consider the expert witness situation, Judge Arguello violating the men’s Fifth Amendment, and then the gross injustice of denying them over 200 pages of transcript that we believe will prove their innocence…there is no question in our minds that the IRP6 should not be in prison. There is also no question in our mind that there is enough evidence to warrant an investigation in this case,” adds Thurman.

“In addition to the unusually long lag in the appellate process, A Just Cause questions the inconsistent feedback from the various court employees,” states Ethel Lopez, A Just Cause. “The Judicial Assistant to Appellate Judge Hartz stated that they are done with the case, but the former Deputy Clerk of the Court Doug Cressler stated previously that it has not been decided, and yet another time it was stated that the case is with the ‘writing judge’. These inconsistencies raise a red flag,” argues Lopez.

The IRP6 (Kendrick Barnes, Gary L. Walker, Demetrius K. Harper, Clinton A. Stewart, David A. Zirpolo and David A. Banks) have been incarcerated for over two years (US District Court for the District of Colorado, Judge Christine M. Arguello, D. Ct. No. 1:09-CR-00266-CMA; Case Nos: NO. 11-1487, Case Nos. 11-1488, 11-1489, 11-1490, 11-1491 and 11-1492).

Appellate Court panel includes the Honorable Senior Judge Bobby R. Baldock, Honorable Judge Harris L. Hartz, and Honorable Judge Jerome A. Holmes

For more information about the story of the IRP6 or for copies of the legal filings go to http://www.freetheirp6.org.

Related press releases: http://www.a-justcause.com/#!press-releases/c21pq







Find More Expert Witness Press Releases

Expert Witness Corner: The Importance of Computer Forensics in Criminal Law

In many instances old, or conventional crime is perpetrated using new approaches that are reliant on technology. Postal fraud, for instance, has evolved to employ electronic communication channels, giving rise to waves of emails seeking to defraud recipients with promises of money and fictitious prizes (commonly known as ‘419 scams’ as many of such notes tend to originate from the African continent and 419 is their penal code for wire fraud).

Studies into the cost of cyber-crime, commissioned independently by the Department of Trade and Industry (DTI) reveal alarming trends in the abuse and misuse of technology. The average cost per security incident has risen to over £160,000 and nearly one in four businesses in the UK have suffered a serious hacker attack or virus outbreak. The impact of an information security breach can be so devastating to business operations that one in ten never actually recover and the shutters close permanently. To counter this growing threat, security and law enforcement agencies have adopted fresh approaches for dealing with high technology crime.

Forensic Computing is a relatively young science when compared to contact forensics such as fingerprint recognition which have roots that can be traced back to Edmond Locard, who in the early 1900s famously postulated the theory of evidence being left as ‘mutual exchanges of contact’. Whilst various descriptions exist in relation to this practice, the international survey undertaken by Hannen has been taken as the de-facto definition: ‘Processes or procedures involving monitoring, collection, analysis… as part of ‘a priori’ or ‘postmortem’ investigations of computer misuse’. It is important to appreciate that this definition takes a wider view than the conventional reactive description, where forensics was regarded purely as an incident response function. Hannen considers digital forensics as also taking a pro-active role in security, where it can be combined with intelligence and operational planning.

As a serious field of research, forensic computing studies only started to take real form in the early 1990s when, faced with ever increasing numbers of computers being seized at crime scenes and the potential for crucial evidence to be stored on a PC, various government agencies came together to host the International Conference on Computer Evidence (ICCE). Here many of the challenges facing law enforcement communities were aired and agreements forged to cooperate towards finding effective solutions.

Two years later, in 1995, the International Organisation for Computer Evidence (IOCE) was formed, and a further two years later the member states that comprise the G8 subscribed to the mission of IOCE, pledging support for the organisation. This was the catalyst required to stimulate research and development, and since then great advances have been made in all spheres of digital evidence management. When working on a matter where the case will rise or fall on the strength of digital evidence, for example where an allegation of possession of indecent images has been made, it is important to commission an independent forensic examination of all evidence and digital materials. This places the evidence into the wider context of the offence and enables barristers to make directions to the court based on a fuller appreciation of matter.

Assuming material has been seized by the authorities, the state will usually conduct their own forensic assessments (typically undertaken by the regional police hi-tech crime unit), the results of which will be provided to legal representations. The mechanics of this process involve the ‘imaging’ of the ‘target media’ – the process of making a forensically sound duplication of digital materials of interest (e.g. the computer hard drive). During this duplication process a ‘write-blocking’ device will be employed to ensure the target media is not affected or corrupted in any capacity whilst its content is read and mirrored. The actual forensic analysis is then made upon the duplicated material, with the original placed into secure storage and maintained in the state in which it was seized. The forensic analyst will then peruse the imaged copy to identify materials of potential evidence value, extracting copies as necessary to form the basis of the expert report.

Looking at this from a defence perspective, a number of questions should be posed in relation to the digital evidence (based on the Daubert threshold test that evaluates the competency of evidence in the United States):

• whether the theories and techniques employed by the scientific expert have been tested;

• whether they have been subjected to peer review and publication; • whether the techniques employed by the expert have a known error rate;

• whether they are subject to standards governing their application; and

• whether the theories and techniques employed by the expert enjoy widespread acceptance.

Putting abuses of technology on a statutory footing, Britain has a suite of legislation that can be invoked, from the Computer Misuse Act 1990 to the Regulation of Investigatory Powers Act 2000.

Today digital forensics is an accepted science, and evidence duly secured in relation to best practices (in the UK these guidelines are outlined by the Association of Chief Police Officers) can be served in a court of law. Digital forensics are providing breakthroughs in all manner of high profile cases around the world, helping security and law enforcement agencies to catch offenders and secure convictions.

In the US, for example, the notorious BTK serial killer that had a reign of terror lasting over twenty five years in the Wichita areas, was ultimately tracked down after he sent a disk to a local radio station gloating at the police’s inability to catch him. Unique digital footprints embedded within the files were extracted by forensic specialists, and like a lone fingerprint, investigators now had a powerful lead – all they needed was to match the file to the computer that had created it (much like having a fingerprint but not a suspect’s hand to match it with). Wichita Police then conducted a house to house search, taking file samples from every computer encountered. Back in the laboratory, the file footprints were compared to the sample disk posted by the BTK killer, eventually finding a match. This tied the floppy disk to Dennis Radar’s PC, a virtual smoking gun as far the prosecution were concerned. This digital evidence became a pivotal element of the State’s case and ultimately helped secure a conviction.

In the UK the 2002 murders of Holly Wells and Jessica Chapman in Soham, Cambridgeshire, also saw digital forensics play a crucial, but largely unknown, role in the investigation. Technical analysts examined one of the girl’s mobile phone to identify where it was located when it had been turned off. Information on the nearest network communication tower tends to be stored in a phone’s memory and when the signal coverage of that tower is plotted, it is possible to identify the rough area (typically a few square kilometres) in which the phone was located when it was switched off. Having extracted this information from the handset, authorities had a rough idea of where to base their search; which ultimately led to the recovery of the two girl’s bodies.

Speaking in an interview several years after his pioneering research on the Manhattan Project where atomic reaction theory was developed, scientific visionary Oppenheimer explained that ‘the scientist is free to ask any question, to doubt any assertion, to seek for any evidence’. This thinking holds especially true when applied to the discipline of forensic computing in a legal context. Here experts may be instructed by either the prosecution or the defence, however, in either instance, they have a higher duty to the court. They are instructed as experts, but experts for the truth. It is important therefore to ensure that the experts instructed are duly qualified, experienced and independent.

Commenting on the nature of digital evidence, John Brown, Partner at Hogan Brown Solicitors, explained how the fragile nature of digital evidence can pose serious challenges to the investigator: ‘digital material is extremely volatile – perhaps more delicate than its physical counterparts. It can be copied, amended, and transferred without almost any trace – only experienced and qualified specialists should be employed to work in a digital forensic environment if the subsequent findings are to withstand the scrutiny of a court of law’. When working on a matter where the case will rise or fall on the strength of the digital evidence, perhaps where an allegation of possession of indecent images has been made, it is important to commission an independent forensic examination of all evidence and digital materials. It is also important that lawyers, when they try to find an expert witness choose someone with the necessary skills who is not only able to prepare an objective, unbiased report but also deliver oral testimony if required.

Forensic computing and the securing of digital evidence is a powerful tool in today’s fight against increasingly technically-savvy criminals. It is a discipline that continues to evolve and should remain high on the radar for both legal practitioners and law enforcement authorities.

Ross Patel is a forensic computer consultant with Afentis Forensics. You can view the company profile and find an expert witness at X-Pro UK, the innovative expert witness directory.

Find More Expert Witness Articles

Expert Witness Corner: Forensic Analysis of Mobile Telephones – A Brief Guide

Mobile Telephone Handsets – The Essentials:

Modern communication devices of this form comprise of three distinct components: a finger-nail sized chip known as the ‘Subscriber Identity Module’ (SIM) that is responsible for service with the telecom network provider, the handset, which provides the user interface and memory capacity to store information, and removable memory modules that facilitate simple exchange of information and markedly improve the data storage capacity of the phone.

Many specialists argue that the mobile phone has become the new fingerprint – a case in point being Ian Huntley’s conviction for the Soham murders  in the U.K which was based partly on crucial mobile phone evidence.

Digital Evidence:

Mobile phones employ what is known as ‘flash memory’ to store data and settings. Unlike the ‘Random Access Memory’ (RAM), which is found within computers, flash memory can continue to store information even in the absence of a power source.

As mobile communication devices continue to evolve, with features like word processing and photo imaging applications becoming commonplace, the memory storage areas have become increasingly important silos of digital evidence.

The following materials can be recovered from the handset and can greatly assist in case preparations:

• Logged Incoming & Last Dialled numbers
• Text & Multimedia messages
• System Settings (including date/time/volume)
• Stored audio/visual materials
• Saved computer and data files
• Calendar and Alarm notifications
• Internet settings and websites accessed.

Common Questions:

Q: Where does evidence reside – on the handset or on the SIM?

A: Materials of evidentiary value are stored on both the SIM4 and within the handset memory. Therefore it is recommended that comprehensive evaluations of both are undertaken. The SIM will tend to contain valuable user-specific information such as network identity, whilst the handset will contain large amounts of information relating to calls made/received, texts sent/received, images/video clips created etc.

Q: Can obscene images/material be stored on a handset?

A:The prevalence of high resolution cameras on most mobile telephones has led to an increase in the number of offences being committed in relation to creation, or attempted creation, of obscene images. Assuming a standard handset with 32MB of memory, close to 500 still images could be taken and stored.

Q: Data deleted six months ago – can it be recovered?

A: Dependent upon a number of factors, such as whether the information has since been over-written, it is possible to retrieve even the oldest materials committed to the phone – including material that were never saved by the user. In most cases a surprising amount of information can be retrieved, often going back several years.

Q: Does locking the handset keep information private?

A: Personal Identification Numbers (PINs) and pass codes can be used to restrict access to the handset, but forensic assessments typically bypass such controls by interrogating the memory module directly5. At this time encrypted file-systems and data storage areas are not available in standard retail handsets.

Q: What else can the handset tell us?

A: Aside from digital evidence the presence of DNA traces on the keypad, earpiece and mouthpiece can tie a user to device. Similarly, ‘Call Data Records’ (CDRs)6 can be retrieved from the network provider, providing near post-code location information as to where and when the device was used.

Q: How do you identify the International Mobile Equipment Identity?

A: The IMEI is a 15 digit Code used to identify the phone to the network. Whilst this code can be retrieved during a forensic examination, a quick way to force the handset to display onscreen the code is to enter *#06# on the keypad7. Caution: this approach to identifying the IMEI may affect valuable evidence in storage.

Q: OK, I’ve got the basics, but where can I find the right expert to help my case?

A: There are a number of expert witness directories available, particularly online, where you can find an expert witness with the relevant experience to help you. If you can find someone recommended by a fellow professional who has used the expert before, so much the better.

Did you know?

New mobile telephones have as much as 32 megabytes of internal memory – enough to comfortably store a document with over 2,000 pages of text!

Telephone handsets will typically store user defined words that are not in a normal dictionary. Names of individuals and places are therefore often stored in this archive – a potentially valuable source of intelligence for investigators.

Ross Patel is a forensic computer consultant with Afentis Forensics. You can view the company profile and find an expert witness at X-Pro UK, the innovative expert witness directory.

Expert Witness Corner: The Value & Limitation of Mediation In Child Contact Cases

“Every fight is on some level a fight between differing ‘angles of vision’ illuminating the same truth” 

Mahatma Gandhi

Overview:

In recent times there have been a large number of experts who have advocated the increased use of mediation or ADR (alternate dispute resolution). In fact it has been suggested by Lord Woolf that litigation be considered an option of last resort in Civil Courts. One is prone to agree with this view whether or not mediation of ADR is ultimately successful in resolving, or making just decisions, between disputing factions. While I personally agree with this view, in the case of family problems, mediation can frequently result in failure rather than success.

Unfortunately, ADR, although it should be attempted, frequently fails in achieving a desired end result, especially with family problems such as contact disputes following implacable hostility barring the way to success.  This is most likely to be the case when an absent parent, (mostly fathers), have difficulty in obtaining good contact with their children due to the hostile custodial parent (usually the mother).

A distinction is sometimes made between mediation and arbitration. The result of arbitration is binding in that all parties involved agree to abide by conclusions reached. Psychologists acting as expert witnesses frequently prefer this approach to mediation. This is because no such demands are made with those who participate in mediation such as following the conclusions reached by the mediator or arbitrator. It is in this area that the author has had considerable experience with the Family Courts who have reached certain considerations which are not shared by everyone.

This is that mediation without the “sword of Damocles” hanging over those in dispute is valueless. It must be understood that mediation can only be effective if those in dispute sincerely seek to find a solution and are not intransigent in holding on to their views without considering other points of view. Co-operation and understanding also needs to be sincere, especially in family disputes, that is, contact issues. By this I mean that there needs to be considerable pressure on those in dispute to reach a decision, or be helped to accept a decision, which is then made by the mediator (or perhaps even better by the arbitrator) to be put forward to the Judiciary. The important factor is that some kind of decision needs to be reached. This can be best achieved by the expert witness, having studied those in dispute, putting forward a point of view and providing reasonable arguments for the point of view advocated to the Court.

Steps during the family mediation consist of each party making statements giving their position and why they hold this position. The mediator/arbitrator indicates his independence by noting and acknowledging the individual positions, and by interviewing the individuals in dispute separately, and working toward finding some area(s) of agreement. The areas of disagreement should also be noted and suggestions made as to how these can be changed toward being more  positive . Eventually, after such explorations the parties will be seen together dealing firstly with the areas of agreement. Areas of disagreement, should lead to negotiating the possibility of compromises being reached. Unfortunately this is not always possible in families who harbour implacable hostilities based on emotions such as feelings of anger, rejection, jealousy, selfishness etc. This fact must eventually be reported to the court who must then make the ultimate decisions, hopefully based on what the mediator has found through his efforts.
 
Hence, “mediation” becomes somewhat of a substitute for justice via litigation because the requirement for mediation is to in some way is to fetter the individuals concerned once they have access to justice. It must be accepted that mediation is not a panacea but should often be tried first before turning to litigation, or to be part of the litigation process. This however, should be complimentary to justice. It cannot ever be a substitute for justice. This  is because one must admit however reluctantly, that with family disputes mediation most often fails. This is because family disputes are caused by powerful, entrenched emotions, especially in contact disputes.
 
The implacable hostilities between the parties result in efforts to manipulate children and expert witnesses to oppose contact with an absent parent as illustrated by the example which follows. This leads to a “power struggle” with a multitude of trickery being displayed where the children become a ‘weapon’ used by a custodial parent, usually against the non resident parent.
 
The carrying out of the process of mediation to combat such implacable hostility requires that the mediator communicates to the Court the underhanded and often insincere practices used by the alienator against the alienated parent. Sofly, softly mediation approaches should be used at the beginning of the process. These approaches however, must give way to more firm tactics.

Hence, the frequently underhanded tactics of the hostile alienator must be revealed to the Judiciary who have the final decision to make. These decisions must curb the alienator by providing a true account of the situation, which an often non residential parent has to face. The Judiciary must consider the following:

1.  The long term effects of preventing a loving parent from having good contact with his/her children.
 (a)  Its impact on the absent parent.
 (b)  Its impact on the children caught in the middle.

2.  The long term effects the successful manipulative parent may learn, i.e. has he/she learned that injustice has won the day and implacable hostility has been successful?

The expert witness mediator/arbitrator, being intimately involved with the case, should be able to make suggestions to the court on how to achieve true justice and hope that the Judiciary will both listen and act accordingly. Alas this is not always the case.

The mediator/arbitrator in his/her report to the Judiciary must put forward to the Court the views of the disputants and state where they have found areas of agreement if any, and where they cannot agree and why this is so. The mediator/arbitrator also needs to point out to the Court if any of the disputants have been seen to agree with the possible solutions eventually proposed by the mediator/arbitrator. Let us illustrate this by an actual case, sufficiently disguised for the sake of anonymity.

Case illustration:

Mr and Mrs X have been in dispute over 7 years. At present Mr X has for some time experienced difficulties in having any contact with his two daughters aged 8 and 10. There was implacable hostility between the mother and father, mainly on the mother’s side. She had been given custody after an acrimonious divorce.

The two girls had been imbued over the years with the view that their father could be a danger to them as allegedly he had been to the mother. They had witnessed the father and mother in the past showing extreme hostility towards one another. This even involved physical violence on occasion by both parents towards one another.

All the father wanted was regular contact with both his daughters. He was not opposed to the mother having custody of the children providing she would make it easy for him to see his children by encouraging the two girls to have good contact with him. This the mother professed she had done and claimed that the two girls did not wish to see the father. This was despite the fact that they both had had a good and warm relationship with their father before the parents parted.

The Court ordered that the expert witness (a Psychologist) carry out assessments of the
warring factions. The expert witness found that the mother, while professing she encouraged the two girls to have contact with their father was actually alienating them against the father. The mother claimed that she could do no more with the girls to get them to meet their father. The report by the expert witness to the Court revealed the true nature of events. Five mediation sessions were recommended by the expert witness to the Court to try to resolve the situation and this was accepted. Following the required mediation sessions, the expert witness reported that the father co-operated fully by supporting the mother and her role as the custodial parent. Mother however, was intransigent, admitting to the expert witness about her reservations in forcing her daughters to have direct unsupervised contact with their father. The mother was not co-operative with the expert witness during mediation and made all kinds of problems including the fact that the expert witness had behave improperly towards her during mediation. This only illustrated her devious nature to those involved in the case.

The Court ordered that the girls be able to see and be with their father and the mother very reluctantly agreed. The mother made a number of demands such as that the girls should phone her regularly “to see how things were going and to make certain that they were safe”. Mother also insisted that the girls not eat the food that the father prepared for them.

Father bought his two daughters clothes and toys and took them on outings to museums and other places of interest. The children were interrogated closely by the mother on each occasion they returned to her from seeing the father. They reported that they enjoyed being with the father and wanted to continue seeing him. This did not give the mother a great deal of joy and she plotted to destroy the contact that the children had established with the father. Problems manipulated by the mother followed during the handover of the children to the father. When one of the girls returned home to the mother with a bruise on the arm due to a ‘rough and tumble play’ at the father’s home, in which other children were involved, the mother contacted the police immediately. She also contacted her Solicitor and Social Services. The mother actually knew the truth of the source of the injuries but ignored this as she saw the opportunity to manipulate matters against the father and reported that he personally was a danger to his daughters.

All contact ceased and Police and Social Service investigations took place. The mother lied about what the children had told her about how the bruise had occurred. The father produced witnesses who had seen the boisterous games that were played and which the two girls were seen to enjoy. Despite the girls explaining matters, the Court as a result of a report from Social Services held that the father should cease having contact with his two daughters due to this incident. This was despite the fact that the expert witness after having completed his assessment and mediation sessions, considered that the best course of action, due to the mother’s manipulative and dishonest nature, was for the father to have custody of the two girls rather than the mother as the mother was working totally against any kind of way of rehabilitating the father with his daughters.

The expert witness felt that the decision by the Judiciary was totally unjust when the Judiciary decided that father should for the time being have no contact with his children. The father had done nothing wrong to warrant such a decision. The Judge was undoubtedly influenced strongly by the Social Worker who considered it in the best interest of the children to be in the care of their mother without their father being involved. He also felt that the animosity between the parents affected the children adversely. The Social Services also felt that there may have been an element of doubt as to whether the children were actually safe in being with their father on the basis of the minor injury one of the children suffered when playing at the father’s house.

It was clear to the expert witness that the Judge failed to have the courage to transfer custody of the children to the father, with whom the children began to resume a good relationship. Manipulation, deceit and injustice, as well as implacable hostility had won the day.

The case highlights the difficulties facing lawyers too. It’s one thing to find an expert witness with the necessary expertise to help your client but another thing entirely to get the just result, and this applies even in court-appointed cases.

This is but one example of injustice committed in the Family Courts. The current expert witness believes that the presence of a well-balanced Jury could do much to provide better justice than is currently the case in the Family Courts.

Dr Ludwig Lowenstein is an experienced clinical, educational and forensic consultant psychologist based in the South East of England. You can view his profile and find an expert witness at X-Pro UK, the innovative expert witness directory.

More Expert Witness Articles

Quotes-Gives the inspiration to live

Quotes are a kind of saying or portion of writing that strikes directly to the people so as true they citation it in any speech or writing. Quotes are either well known in their own right or utterances by someone famous. Quotes can be maxim, striking fragments of poetry, comical or inspiring prose and comments, coinages of new phrases or ideas, remarks at historical events, put downs of others, famous last words or anything else which is worth repeating on its own, maybe with some observation on when, where, and on who.

Wiz Khalifa is an up and coming mix tape rapper and hip hop performer. He is also well known by his quotes, mix tape, songs and lyrics. Wiz Khalifa lyrics are some of the realest on Internet, he actually knows how to flow. Wiz Khalifa Quotes are world famous quotes. Nowadays he quotes and reps on Taylor gang. Drake is also a famous rapper and writes quote. Drake have essence, his beats are captivating and his hooks are on point.

Nicole “Snooki” Polizzi is an American reality television celebrity. Snooki Quotes arefocused on women dating horrible or arrogant men. Nowadays Snooki appeared on the MTV reality show and became a part of reality TV series. She is also a novelist.

Lil Wayne is a popular American rapper. He on track his career from a very young age. He is very popular for his quotes, raps, and songs. Some of Lil Wayne’s songs have become major hits and more or less everyone, irrespective of their age, can be seen muttering them and enjoying them. Lil Wayne Quotes have touched the hearts of millions across the world. Some people, besides the songs, also looks for something more like Lil Wayne quotes.

Lauren Conrad is a famous American television personality. She is known for her starring role on MTV reality series. She is also a fashion designer and author. Lauren Conrad Quotes are very popular. Her quotes and books mainly focus on life of a young woman.

Wiz Khalifa Quotes are world famous quotes. Snooki Quotes are focused on women dating horrible or arrogant men. For more information visit us at: http://www.searchquotes.com/