Skip to main content
Skip to content
Case File
efta-efta00157492DOJ Data Set 9Other

November 12, 2021

November 12, 2021 • Prepared for trial testimony • • • • • • Forensic examination— captures data (imaging— bit-for-bit copy), puts it through software to categorize information; huge amounts of data on computer; software helps organize to assist with review • Information stored on a hard drive in a computer; hard drive stores non-volatile data (anything saved on the drive will be on drive if you unplug it); digital device to store data • Typically knows nothing about a case when analyzes digital evidence • was shown GX 54 (has initials, case number, unique identifier on it, date) • Every piece of evidence that Uexamines gets unique bar code numbers and gets another sticker with case number, date initials, and reference to unique number on other sticker • Received GX 54 in a box with photocopy of different drive on front; led to believe was copy of drive on the front of it; had to determine how best to capture information on drive, had to see if image files or

Date
Unknown
Source
DOJ Data Set 9
Reference
EFTA 00157492
Pages
3
Persons
0
Integrity

Summary

November 12, 2021 • Prepared for trial testimony • • • • • • Forensic examination— captures data (imaging— bit-for-bit copy), puts it through software to categorize information; huge amounts of data on computer; software helps organize to assist with review • Information stored on a hard drive in a computer; hard drive stores non-volatile data (anything saved on the drive will be on drive if you unplug it); digital device to store data • Typically knows nothing about a case when analyzes digital evidence • was shown GX 54 (has initials, case number, unique identifier on it, date) • Every piece of evidence that Uexamines gets unique bar code numbers and gets another sticker with case number, date initials, and reference to unique number on other sticker • Received GX 54 in a box with photocopy of different drive on front; led to believe was copy of drive on the front of it; had to determine how best to capture information on drive, had to see if image files or

Tags

eftadataset-9vol00009

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
November 12, 2021 Prepared for trial testimony Forensic examination— captures data (imaging— bit-for-bit copy), puts it through software to categorize information; huge amounts of data on computer; software helps organize to assist with review Information stored on a hard drive in a computer; hard drive stores non-volatile data (anything saved on the drive will be on drive if you unplug it); digital device to store data Typically knows nothing about a case when analyzes digital evidence was shown GX 54 (has initials, case number, unique identifier on it, date) Every piece of evidence that Uexamines gets unique bar code numbers and gets another sticker with case number, date initials, and reference to unique number on other sticker Received GX 54 in a box with photocopy of different drive on front; led to believe was copy of drive on the front of it; had to determine how best to capture information on drive, had to see if image files or a clone was shown GX 55: first marked it; after marking it, connect hard drive to a writeblocker and connect that to computer to view data on drive without altering it; looked to figure out if image files or clone Clone: bit for bit copy of one piece of media to another (e.&, from one hard drive to another) As digital forensics progressed, moved away from clones and towards images; image is a bit for bit copy, but saved onto another hard drive as image files; advantage is that containerizes it, more difficult to change data on an image file than a clone After determined drive was a clone, imaged it; made a bit for bit copy of the clone; copies to storage area network for processing To make an image, have several tools available; FTK made by Access Data; also have FBI created product; also have physical devices that are duplicators (TX1 made by Tableau) to create image files Hard drive is electromechanical device, has platters spinning around, several motors and pieces of hardware; it will fail at some point, just a matter of when; so with all hard drives make original copy and work off of the copy Know that what is in the copy is an exact copy of the device because run a hash (mathematical algorithm), uniquely identifies data on drive; run against copy; comes out the same 3503-110 Page 1 of 3 SUBJECT TO PROTECTIVE ORDER PARAGRAPHS 7, 8, 9, 10, 15, and 17 EFIA_00002309 EFTA00157492 After made image, • placed data in Access Data Lab and processed for review From review of images of GX 54 and GX 55, • knows they are Dell computers was shown GX 405 and 419 and confirmed recognized and accurate o Every windows computer has architecture inside it called registry, which stores settings, ton of stuff; comprised of five different files o Software hive: tells you what version of Windows was running, who registered owner and organization was, data installed (date computer clock set to when operating system was installed on it); product name o Registered org: when start up computer, asks who computer is; one identifier is organization and next asks who owner is; user inputtable data reviewed the properties for GX 417, 418, 420,421,422 (GX 417B, 418B, 420B, 421B, 422B) and confirmed accuracy by running software (Access Data's Lab, AD Lab); confirmed GX 417 on GX 55 (NYCO24349); GX 418, 420, 421, 422 on GX 54 (NYCO24350); all word documents • El confirmed GX 412 and GX 415 on GX 54; emails remembers seeing GX 417 because it was at the root of the C drive, not normal spot for documents to be; would expect documents to be under user's profile in documents folder (that is Microsoft Word default) 2 reasons to be in C drive: either to hide it or to give another user easy access to it so don't have to go digging around; believes there were three documents in total at root of C drive 2 sets of metadata for Word documents: file system or embedded file within the word document; B exhibits are the latter (embedded file within word document) To access metadata in Word document, click on properties and will display information When Word doc is created, metadata is generated to reflect creation date of file; gets metadata from operating system; that is from system clock, which a user can change Author is pulled from the registry for the user signed in at the time the document is created If someone else created a Word document other than the user signed into the operating system, wouldn't be able to tell Last printed — when print document, it will update that field When document is last printed before creation date: means typed up document, printed it, and then "save as"; when hit "save as" it resets the created date; the "last printed" field wouldn't change If userhad created document, printed it, and went to close document, and saved in response to prompting, document will have the creation date of when first started typing the document Total editing time: keeps running clock of when have document open to edit GX 418, 420, 421, and 422 were saved under Maxwell's user profile 3503-110 Page 2 of 3 SUBJECT TO PROTECTIVE ORDER PARAGRAPHS 7, 8, 9, 10, 15, and 17 EFIA_00002310 EFTA00157493 3503-110 Page 3 of 3 SUBJECT TO PROTECTIVE ORDER PARAGRAPHS 7, 8, 9, 10, 15, and 17 EFTA_00002311 EFTA00157494

Technical Artifacts (1)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Wire Refreference

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.