SlideShare a Scribd company logo
The Cybercrime Trial Abigail Abraham Assistant State Attorney Cook County, Illinois Ivan Orton Sr. Deputy Prosecuting Attorney King County, Washington
What’s Different about a Cybercrime Trial Complexity Digital Evidence Issues
As With Any Trial, Keys Are: Understanding Your Case Preparing Your Case Presenting Your Case
Understanding Your Case You MUST  Educate Yourself But Only About What You Must Understand Endless Task Training and Experience
Understanding Your Case Use Your Resources Other Prosecutors Office Computer Personnel Investigator/Forensic Expert Witnesses (ISP, Victim, etc.)  Digital DA and other online sources
Understanding Your Case The Crime Charged Should you  Amend? The Legal T heory The Evidence Anticipating Defenses
Understanding Your Case What do you have to Prove/Disprove Do you have to disprove all alternative explanations Can you disprove all alternative explanations Nature of computer “incidents”
Understanding Your Case S hare your understanding with your trial team (investigator, forensic person, crucial witnesses) to get their input
Preparing Your Case Remember Judge/Jury/Defense Understanding Varies Widely You Must Be a Teacher Law is Settling Down but . . . Technology is double edged
Preparing Your Case Education Expert Witness/Scientific Method Problem Areas Jury Instructions
Preparing Your Case - Education Educate Your Audie nce at Every Stage Voir Dire Opening Every Witness Closing Objections
Preparing Your Case - Education Keep it Simple  - don’t overexplain Case in Chief v. Cross Ex and Rebuttal Let Defense make it complex Use Analogies but . . .
Preparing Your Case - Education We're using age old methods of reasoning trying to evaluate an unfamiliar situation by finding analogy to a familiar one. But applied to the web the analogies get so complex that the familiar turns into the unfamiliar.  To make the situation accurate you have to make it so weird that it doesn't help us figure things out.  David Weinberger , Commentator on All Things Considered
Preparing Your Case - Expert Witness Do You Need an Expert (Opinion Witness)
Preparing Your Case - Expert Witness Your Witness Testifies: Made F orensic Image Examined the Drives What Found on Drives What this Means
Preparing Your Case - Expert Witness Which of these Required Expert Witness Testimony  Which Required Admission of Scientific Evidence
Preparing Your Case - Expert Witness Expert Witness  - witness qualified as an expert may give an opinion Results of a  Scientific Method  - In Federal system and many states, Judge must be convinced results of scientific method will be useful  In some states method must be generally accepted by peer community
Preparing Your Case - Expert Witness Your Witness Testifies: Made F orensic Image Examined the Drives What Found on Drives What this Means
Preparing Your Case - Expert Witness Don’t Confuse Expert Testimony with Expert  WITNESS  Testimony Witness can be shown to be highly qualified as a way of increasing  her/his credibility So long as not seeking to give opinion, don’t have to qualify as expert witness
Preparing Your Case - Scientific Method Evidence Based on Scientific Method Doesn’t Always Have to be Qualified Jury is shown  p icture  t aken by 7-11  c amera to  c ompare to  d efendant No need to qualify photography as a scientific method Will need to authenticate/lay foundation Only if expert is giving an opinion based on scientific method evidence must evidence be qualified
Preparing Your Case - Expert/Scientific Method Effect of “Best Practices” Manuals In  Russian Hacker case FBI agent quizzed by defense attorney on not following DOJ Computer Search and Seizure Manual
Preparing Your Case - Expert Witness Preparing Your Expert No Real Difference in Cyber Case From Any Other Case Involving Expert Don’t Overstate Keep Things Simple Don’t Argue with Defense Attorney “ Isn’t it true that . . . ?| “ Yes, and I can explain my answer if you’d like.”
Preparing Your Case - Problem Areas Tying Defendant to Keyboard Defendant’s Knowledge/Motive Time and Date Stamps Forensic Report
Preparing Your Case - Problem Areas Tying Defendant to Keyboard Confession/Admission Circumstantial (only resident at computer location) Substantive knowledge unique to defendant Content analysis
June 30, 1999 - 8 Minutes Later From: [email_address] To: [email_address] Subject: Hideho... Date:  Wednesday, June 30, 1999 2:23 PM Hideho....dear Marni....how're you today....did you sleep well...I bet you didn't...unfortunately...one of my spies told me you'll have a opening training camp next Monday in Toronto...so I'll have more women to either fuck or destory ...Michelle Stilwell, huh....I love quadraplagia girls...amputees like Chantal Benoit is also a perfect choice....so you may survive...now I realize compare to the same level, Shira Golden is more attractive to me than you do...I switched my airplane ticket...I'll fly directly to Toronto instead of Vancouver...See ya next Monday...Hideho..have a nice day and keep a good shape... PARALYZED WOMEN KILLER FROM HONG KONG 7-1-99 destory
Preparing Your Case - Problem Areas Defendant’s Knowledge/Intent Defendant claims ignorance of child porn found on his computer.  How can you overcome claim of ignorance?
Preparing Your Case - Problem Areas Number of Pictures Directory Structure File Names News Group Subscriptions History Files
Preparing Your Case - Problem Areas Time and Date Stamps
Preparing Your Case - Problem Areas Windows Files have 3 Dates/Times: Create Date When the file was created at the current location When the file was moved/copied to current location Last Written/Modified Date When the file was last changed (includes created) Does not change when file is moved/copied Is reset when a file is downloaded Last Accessed Date When file was last accessed
Preparing Your Case - Problem Areas Date/Time Stamps - Limitations Depends on accuracy of internal clock What time zone Can be manipulated
Preparing Your Case - Problem Areas Date/Time Stamps - Ways to Check Internal file accuracy (date stamp consistent with date inside file) E-mail header date/time compared to date/time assigned by system Compare known date/time to system date/time (Do you know independently when file was downloaded)
Preparing Your Case - Problem Areas Date/Time Stamps - Ways to Check If computer is attached to network, does server set clock on login Patterns of file creation dates/times If any created after computer was seized you MUST explain Experiment Using suspect’s computer NOT original hard drive
Preparing Your Case - Problem Areas Forensic Report Abigail Example
Preparing Your Case - Jury Instructions Do Pattern Jury Instructions Exist? If not, can you draw on analogous areas (burglary law for computer trespass) Special Terms need Definitions?
Presenting Your Case Voir Dire Explaining Complicated or Technological Issues Presentation Tools Digital Evidence Admissibility Issues
Presenting Your Case-Voir Dire Know your audience—what is their knowledge of computers?  Educate the jury, but  keep it simple Are jury questionnaires permitted by the Judge?  Focus on jurors feeling of whether computer crime is really “crime.” Consider questions weeding out those that think the victim may be at fault or should “ignore it.”
“ Do you own a computer?” “ Is your home computer a Macintosh or IBM compatible” “ How familiar are you with computers” “ Does your job entail working with computers?” “ Do you access the Internet?” “For what purpose?” “ Have you ever used e-mail? Chatrooms? Instant messenger?” Presenting Your Case-Voir Dire
“ If a person enters a chatroom, are they ‘assuming the risk?’” “ Do you think that pursuing a person in a chatroom is a part of ‘Web/Net culture?’” “ If someone is being harassed by e-mail, should they just not turn the computer on or ignore it?” “ Does anyone believe that pursuing someone or harassing someone on the internet is not a matter that should be criminal in nature” Presenting Your Case-Voir Dire
A little younger, but not too young. A little more educated, but not too academic. A little technical knowledge, but not enough to second guess your witnesses. Beyond that jurors for the different types of tech cases should follow the profile for the same type of case if their was no tech element. Presenting Your Case-Voir Dire What Jury Do You Want
Presenting Your Case-Voir Dire   Not All Cybercases Are the Same Trade secret theft Child porn/exploitation Hacking Fraud Component theft Piracy Cyberstalking
Voir Dire – Child Exploits/Porn It’s OK to have strong feeling about the sexual exploitation of children, but does anybody feel the subject matter alone would make it impossible for them to be fair? Have you, a relative, or a close friend ever been sexually victimized? (instruct them they need not answer in open court) Will anyone find it impossible to view graphic sexual images of young children? Does anyone disagree with the laws prohibiting sexual activity between adults and children?
Voir Dire – Fraud/Identity Theft  Victimization – Self/Friend/Family Media Attention – Read/Heard/Seen Precautions They Take (May expect your victim to do nothing less) Assumption of the Risk When might you hold the victim to blame for being ripped off? Does a victim’s carelessness or naiveté ever justify stealing from them?
Voir Dire – Hacking/Intrusion Does anyone have an image in their mind when I use the term “Hacker.” Has anyone experienced the damage that can be caused by a computer virus. (describe it) Does anyone here keep personal information on their computer? Is their anyone here uncomfortable with the idea of someone having uncontrolled access to your personal information ? Should a victim be required to take steps to prevent an intentional intrusion?
Voir Dire - Piracy Does anyone think there’s a difference between making one copy of a movie/cd/tape for a friend and making a hundred to sell at the flea market? Where’s the line between fair use and theft? Does anyone have strong feelings about the movie/music/software industries business, pricing, or distribution practices? Has anyone seen media for sale they thought might be counterfeit? Describe the situation? What alerted you?
Voir Dire – Trade Secrets Does anyone feel a company can’t be a victim? Has anyone ever had the experience of having someone else steal their idea or take credit for their work? Can anyone give an example of an idea that was worth lots of money? Can anyone give an example of something that’s only valuable if it’s secret?
Presenting Your Case - Complicated/Technical Issues 1. Have a very simple analogy 2. Have a uncomplicated correct definition 3. Find/develop a picture/drawing of what your technology “looks like”. 4. Have a credible expert explain technology using all above #1, #2, #3. 5. Have your expert use that picture/drawing.
6.  Link  your technology to something jurors do on their computers.  7.  Link  your definition, as it is explained, to what the defendant DID. 8. Repeatedly, again and again USE YOUR PICTURE of the technology. 9. No overkill; the more time you spend, you may confuse or open doors 10. Try your analogy, definition and pictures out on experts and lay people. Presenting Your Case - Complicated/Technical Issues
Charts, Diagrams, Pictures Presenting Your Case - Presentation Tools
Animation Presenting Your Case - Presentation Tools
Animation Used to Show How Things Work  Power Point Example Presenting Your Case - Presentation Tools
Hard Drive File Allocation Table Storage Area CLUSTER 1 Unallocated FILE STORAGE CLUSTER 2 Unallocated CLUSTER 3 Unallocated CLUSTER 1 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - CLUSTER 2 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2
Hard Drive File Allocation Table Storage Area FILE   DELETE CLUSTER 3 Unallocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - CLUSTER 2 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2 CLUSTER 1 Allocated
Hard Drive File Allocation Table Storage Area FILE   DELETE CLUSTER 3 Unallocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - CLUSTER 2 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2 CLUSTER 1 Allocated CLUSTER 1 Unallocated CLUSTER 2 Unallocated ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2 ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2
INFO Hard Drive \Download DC01.jpg 10,555 Bytes 5/5/99 1:22 p.m. Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. \Recycle INFO (\Download\Image.jpg) DELETE RECYCLE BIN DELETE ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m.
Hard Drive \Download DC01.jpg 10,555 Bytes 5/5/99 1:22 p.m. INFO (\Download\Image.jpg) \Recycle RECOVER RECYCLE BIN RECOVER ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m. Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. ? C01.jpg 10,555 Bytes 5/5/99 1:22 p.m. INFO
Animation Used to Show How Things Work  MPEG Example Presenting Your Case - Presentation Tools
Imaginate example Presenting Your Case - Presentation Tools
Live vs. Recorded Demonstrations Murphy’s Law Data may not look the way you want Program may not work the way you want Murphy’s Law Websites can change Live can be turned against you Presenting Your Case - Presentation Tools
Many Issues we Used to Worry About are Settled See US DOJ Guidelines for More Detailed Discussion Presenting Your Case -  Digital Evidence Admissibility
Business Records - Fed R. Evid. 803(6) Computer Generated (admissible) Computer Stored (may be hearsay) Authenticity - Fed. R. Evid 901(a) Mere possibility of tampering doesn’t affect authenticity Proving the Author Circumstantial Evidence See Earlier Discussion - Problem Areas - Putting Defendant at Keyboard Presenting Your Case -  Digital Evidence Admissibility: In General
Hearsay If computer records reflect only computer generated data, no hearsay If computer records contain the assertions of a person, hearsay Best Evidence - Fed. R. Evid. 1002 See Fed. R. Evid. 1991(3) Summaries - Fed. R. Evid. 1006 Presenting Your Case -  Digital Evidence Admissibility: In General
Abigail Abraham, Assistant State Attorney Cook County, Illinois  [email_address] (713) 869-2728 Ivan Orton, Sr. Deputy Prosecuting Attorney King County, Washington [email_address] (206) 296-9082 Sweet Home Alabama (or wherever)

More Related Content

DOC
Career research
PPTX
Disconnecting the wiredwifidjuror (2)
PDF
BAIT1103 Chapter 8
PPT
July132000
PDF
PDF
DG Newsletter 02 February 2017
PDF
Café Numérique Kinshasa - Saison 05 Ep02 : Wapi Med
Career research
Disconnecting the wiredwifidjuror (2)
BAIT1103 Chapter 8
July132000
DG Newsletter 02 February 2017
Café Numérique Kinshasa - Saison 05 Ep02 : Wapi Med

Viewers also liked (13)

PPTX
「わかりにくいダイバーシティ・インクルージョン」も大切
PPTX
Arthritis.gout
PDF
Windows 7 forensics -overview-r3
PDF
1 5 inverse functions
PPTX
Windows Forensics
PDF
Proporcionalidad y repartos proporcionales
PPTX
Open Source Forensics
PPT
Setup Your Personal Malware Lab
PPTX
Phonology
PDF
Business transformation and business value drivers
PDF
Lecture2 network attack
PPTX
Mision, mision , valores. unab
PPTX
Hacking and Hacktivism
「わかりにくいダイバーシティ・インクルージョン」も大切
Arthritis.gout
Windows 7 forensics -overview-r3
1 5 inverse functions
Windows Forensics
Proporcionalidad y repartos proporcionales
Open Source Forensics
Setup Your Personal Malware Lab
Phonology
Business transformation and business value drivers
Lecture2 network attack
Mision, mision , valores. unab
Hacking and Hacktivism
Ad

Similar to CyberCrime (15)

PPTX
Cyber
PPT
Forensic Engineering 09
PDF
Thesis Statement For American Dream Essay
PPSX
Digital Trial Impact, LLC Travis V.Smalls Marketing
PDF
A2L_Storytelling_for_Litigators_3rd_Ed
DOCX
Assignment Reflection You looked quite critically at the US Co.docx
DOCX
Auto Injury Litigation From Start to Finish
DOCX
Auto Injury Litigation From Start to Finish
PDF
Final Forensics Project
PDF
Pirate-Writing-Paper-01-BW - TimS Printables
PPTX
Digital Forensics Workshop
DOCX
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docx
PDF
Write In The Rain With This Waterproof Paper - Brit Co
PDF
Using research to inform service design
PDF
Forensic Expert Cross Examination
Cyber
Forensic Engineering 09
Thesis Statement For American Dream Essay
Digital Trial Impact, LLC Travis V.Smalls Marketing
A2L_Storytelling_for_Litigators_3rd_Ed
Assignment Reflection You looked quite critically at the US Co.docx
Auto Injury Litigation From Start to Finish
Auto Injury Litigation From Start to Finish
Final Forensics Project
Pirate-Writing-Paper-01-BW - TimS Printables
Digital Forensics Workshop
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docx
Write In The Rain With This Waterproof Paper - Brit Co
Using research to inform service design
Forensic Expert Cross Examination
Ad

More from CTIN (20)

PPTX
Mounting virtual hard drives
PDF
Encase V7 Presented by Guidance Software august 2011
PDF
Windows 7 forensics event logs-dtl-r3
PPTX
Msra 2011 windows7 forensics-troyla
PPTX
Windows 7 forensics thumbnail-dtl-r4
PPTX
Windows 7 forensics jump lists-rv3-public
PPTX
Time Stamp Analysis of Windows Systems
PPT
Vista Forensics
PPT
Mac Forensics
PPT
Nra
PPT
Live Forensics
PPT
Translating Geek To Attorneys It Security
PPT
Edrm
PPT
Computer Searchs, Electronic Communication, Computer Trespass
PPT
Search Warrants
PPT
Part6 Private Sector Concerns
PDF
Sadfe2007
PPT
Raidprep
PPT
Networking Overview
PPT
M Compevid
Mounting virtual hard drives
Encase V7 Presented by Guidance Software august 2011
Windows 7 forensics event logs-dtl-r3
Msra 2011 windows7 forensics-troyla
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics jump lists-rv3-public
Time Stamp Analysis of Windows Systems
Vista Forensics
Mac Forensics
Nra
Live Forensics
Translating Geek To Attorneys It Security
Edrm
Computer Searchs, Electronic Communication, Computer Trespass
Search Warrants
Part6 Private Sector Concerns
Sadfe2007
Raidprep
Networking Overview
M Compevid

Recently uploaded (20)

PDF
STKI Israel Market Study 2025 version august
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Hybrid model detection and classification of lung cancer
PDF
project resource management chapter-09.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
The various Industrial Revolutions .pptx
PPTX
Modernising the Digital Integration Hub
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPT
What is a Computer? Input Devices /output devices
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
1. Introduction to Computer Programming.pptx
STKI Israel Market Study 2025 version august
Getting started with AI Agents and Multi-Agent Systems
Hybrid model detection and classification of lung cancer
project resource management chapter-09.pdf
TLE Review Electricity (Electricity).pptx
OMC Textile Division Presentation 2021.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
The various Industrial Revolutions .pptx
Modernising the Digital Integration Hub
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Assigned Numbers - 2025 - Bluetooth® Document
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
A novel scalable deep ensemble learning framework for big data classification...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
What is a Computer? Input Devices /output devices
Univ-Connecticut-ChatGPT-Presentaion.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Developing a website for English-speaking practice to English as a foreign la...
1. Introduction to Computer Programming.pptx

CyberCrime

  • 1. The Cybercrime Trial Abigail Abraham Assistant State Attorney Cook County, Illinois Ivan Orton Sr. Deputy Prosecuting Attorney King County, Washington
  • 2. What’s Different about a Cybercrime Trial Complexity Digital Evidence Issues
  • 3. As With Any Trial, Keys Are: Understanding Your Case Preparing Your Case Presenting Your Case
  • 4. Understanding Your Case You MUST Educate Yourself But Only About What You Must Understand Endless Task Training and Experience
  • 5. Understanding Your Case Use Your Resources Other Prosecutors Office Computer Personnel Investigator/Forensic Expert Witnesses (ISP, Victim, etc.) Digital DA and other online sources
  • 6. Understanding Your Case The Crime Charged Should you Amend? The Legal T heory The Evidence Anticipating Defenses
  • 7. Understanding Your Case What do you have to Prove/Disprove Do you have to disprove all alternative explanations Can you disprove all alternative explanations Nature of computer “incidents”
  • 8. Understanding Your Case S hare your understanding with your trial team (investigator, forensic person, crucial witnesses) to get their input
  • 9. Preparing Your Case Remember Judge/Jury/Defense Understanding Varies Widely You Must Be a Teacher Law is Settling Down but . . . Technology is double edged
  • 10. Preparing Your Case Education Expert Witness/Scientific Method Problem Areas Jury Instructions
  • 11. Preparing Your Case - Education Educate Your Audie nce at Every Stage Voir Dire Opening Every Witness Closing Objections
  • 12. Preparing Your Case - Education Keep it Simple - don’t overexplain Case in Chief v. Cross Ex and Rebuttal Let Defense make it complex Use Analogies but . . .
  • 13. Preparing Your Case - Education We're using age old methods of reasoning trying to evaluate an unfamiliar situation by finding analogy to a familiar one. But applied to the web the analogies get so complex that the familiar turns into the unfamiliar. To make the situation accurate you have to make it so weird that it doesn't help us figure things out. David Weinberger , Commentator on All Things Considered
  • 14. Preparing Your Case - Expert Witness Do You Need an Expert (Opinion Witness)
  • 15. Preparing Your Case - Expert Witness Your Witness Testifies: Made F orensic Image Examined the Drives What Found on Drives What this Means
  • 16. Preparing Your Case - Expert Witness Which of these Required Expert Witness Testimony Which Required Admission of Scientific Evidence
  • 17. Preparing Your Case - Expert Witness Expert Witness - witness qualified as an expert may give an opinion Results of a Scientific Method - In Federal system and many states, Judge must be convinced results of scientific method will be useful In some states method must be generally accepted by peer community
  • 18. Preparing Your Case - Expert Witness Your Witness Testifies: Made F orensic Image Examined the Drives What Found on Drives What this Means
  • 19. Preparing Your Case - Expert Witness Don’t Confuse Expert Testimony with Expert WITNESS Testimony Witness can be shown to be highly qualified as a way of increasing her/his credibility So long as not seeking to give opinion, don’t have to qualify as expert witness
  • 20. Preparing Your Case - Scientific Method Evidence Based on Scientific Method Doesn’t Always Have to be Qualified Jury is shown p icture t aken by 7-11 c amera to c ompare to d efendant No need to qualify photography as a scientific method Will need to authenticate/lay foundation Only if expert is giving an opinion based on scientific method evidence must evidence be qualified
  • 21. Preparing Your Case - Expert/Scientific Method Effect of “Best Practices” Manuals In Russian Hacker case FBI agent quizzed by defense attorney on not following DOJ Computer Search and Seizure Manual
  • 22. Preparing Your Case - Expert Witness Preparing Your Expert No Real Difference in Cyber Case From Any Other Case Involving Expert Don’t Overstate Keep Things Simple Don’t Argue with Defense Attorney “ Isn’t it true that . . . ?| “ Yes, and I can explain my answer if you’d like.”
  • 23. Preparing Your Case - Problem Areas Tying Defendant to Keyboard Defendant’s Knowledge/Motive Time and Date Stamps Forensic Report
  • 24. Preparing Your Case - Problem Areas Tying Defendant to Keyboard Confession/Admission Circumstantial (only resident at computer location) Substantive knowledge unique to defendant Content analysis
  • 25. June 30, 1999 - 8 Minutes Later From: [email_address] To: [email_address] Subject: Hideho... Date: Wednesday, June 30, 1999 2:23 PM Hideho....dear Marni....how're you today....did you sleep well...I bet you didn't...unfortunately...one of my spies told me you'll have a opening training camp next Monday in Toronto...so I'll have more women to either fuck or destory ...Michelle Stilwell, huh....I love quadraplagia girls...amputees like Chantal Benoit is also a perfect choice....so you may survive...now I realize compare to the same level, Shira Golden is more attractive to me than you do...I switched my airplane ticket...I'll fly directly to Toronto instead of Vancouver...See ya next Monday...Hideho..have a nice day and keep a good shape... PARALYZED WOMEN KILLER FROM HONG KONG 7-1-99 destory
  • 26. Preparing Your Case - Problem Areas Defendant’s Knowledge/Intent Defendant claims ignorance of child porn found on his computer. How can you overcome claim of ignorance?
  • 27. Preparing Your Case - Problem Areas Number of Pictures Directory Structure File Names News Group Subscriptions History Files
  • 28. Preparing Your Case - Problem Areas Time and Date Stamps
  • 29. Preparing Your Case - Problem Areas Windows Files have 3 Dates/Times: Create Date When the file was created at the current location When the file was moved/copied to current location Last Written/Modified Date When the file was last changed (includes created) Does not change when file is moved/copied Is reset when a file is downloaded Last Accessed Date When file was last accessed
  • 30. Preparing Your Case - Problem Areas Date/Time Stamps - Limitations Depends on accuracy of internal clock What time zone Can be manipulated
  • 31. Preparing Your Case - Problem Areas Date/Time Stamps - Ways to Check Internal file accuracy (date stamp consistent with date inside file) E-mail header date/time compared to date/time assigned by system Compare known date/time to system date/time (Do you know independently when file was downloaded)
  • 32. Preparing Your Case - Problem Areas Date/Time Stamps - Ways to Check If computer is attached to network, does server set clock on login Patterns of file creation dates/times If any created after computer was seized you MUST explain Experiment Using suspect’s computer NOT original hard drive
  • 33. Preparing Your Case - Problem Areas Forensic Report Abigail Example
  • 34. Preparing Your Case - Jury Instructions Do Pattern Jury Instructions Exist? If not, can you draw on analogous areas (burglary law for computer trespass) Special Terms need Definitions?
  • 35. Presenting Your Case Voir Dire Explaining Complicated or Technological Issues Presentation Tools Digital Evidence Admissibility Issues
  • 36. Presenting Your Case-Voir Dire Know your audience—what is their knowledge of computers? Educate the jury, but keep it simple Are jury questionnaires permitted by the Judge? Focus on jurors feeling of whether computer crime is really “crime.” Consider questions weeding out those that think the victim may be at fault or should “ignore it.”
  • 37. “ Do you own a computer?” “ Is your home computer a Macintosh or IBM compatible” “ How familiar are you with computers” “ Does your job entail working with computers?” “ Do you access the Internet?” “For what purpose?” “ Have you ever used e-mail? Chatrooms? Instant messenger?” Presenting Your Case-Voir Dire
  • 38. “ If a person enters a chatroom, are they ‘assuming the risk?’” “ Do you think that pursuing a person in a chatroom is a part of ‘Web/Net culture?’” “ If someone is being harassed by e-mail, should they just not turn the computer on or ignore it?” “ Does anyone believe that pursuing someone or harassing someone on the internet is not a matter that should be criminal in nature” Presenting Your Case-Voir Dire
  • 39. A little younger, but not too young. A little more educated, but not too academic. A little technical knowledge, but not enough to second guess your witnesses. Beyond that jurors for the different types of tech cases should follow the profile for the same type of case if their was no tech element. Presenting Your Case-Voir Dire What Jury Do You Want
  • 40. Presenting Your Case-Voir Dire Not All Cybercases Are the Same Trade secret theft Child porn/exploitation Hacking Fraud Component theft Piracy Cyberstalking
  • 41. Voir Dire – Child Exploits/Porn It’s OK to have strong feeling about the sexual exploitation of children, but does anybody feel the subject matter alone would make it impossible for them to be fair? Have you, a relative, or a close friend ever been sexually victimized? (instruct them they need not answer in open court) Will anyone find it impossible to view graphic sexual images of young children? Does anyone disagree with the laws prohibiting sexual activity between adults and children?
  • 42. Voir Dire – Fraud/Identity Theft Victimization – Self/Friend/Family Media Attention – Read/Heard/Seen Precautions They Take (May expect your victim to do nothing less) Assumption of the Risk When might you hold the victim to blame for being ripped off? Does a victim’s carelessness or naiveté ever justify stealing from them?
  • 43. Voir Dire – Hacking/Intrusion Does anyone have an image in their mind when I use the term “Hacker.” Has anyone experienced the damage that can be caused by a computer virus. (describe it) Does anyone here keep personal information on their computer? Is their anyone here uncomfortable with the idea of someone having uncontrolled access to your personal information ? Should a victim be required to take steps to prevent an intentional intrusion?
  • 44. Voir Dire - Piracy Does anyone think there’s a difference between making one copy of a movie/cd/tape for a friend and making a hundred to sell at the flea market? Where’s the line between fair use and theft? Does anyone have strong feelings about the movie/music/software industries business, pricing, or distribution practices? Has anyone seen media for sale they thought might be counterfeit? Describe the situation? What alerted you?
  • 45. Voir Dire – Trade Secrets Does anyone feel a company can’t be a victim? Has anyone ever had the experience of having someone else steal their idea or take credit for their work? Can anyone give an example of an idea that was worth lots of money? Can anyone give an example of something that’s only valuable if it’s secret?
  • 46. Presenting Your Case - Complicated/Technical Issues 1. Have a very simple analogy 2. Have a uncomplicated correct definition 3. Find/develop a picture/drawing of what your technology “looks like”. 4. Have a credible expert explain technology using all above #1, #2, #3. 5. Have your expert use that picture/drawing.
  • 47. 6. Link your technology to something jurors do on their computers. 7. Link your definition, as it is explained, to what the defendant DID. 8. Repeatedly, again and again USE YOUR PICTURE of the technology. 9. No overkill; the more time you spend, you may confuse or open doors 10. Try your analogy, definition and pictures out on experts and lay people. Presenting Your Case - Complicated/Technical Issues
  • 48. Charts, Diagrams, Pictures Presenting Your Case - Presentation Tools
  • 49. Animation Presenting Your Case - Presentation Tools
  • 50. Animation Used to Show How Things Work Power Point Example Presenting Your Case - Presentation Tools
  • 51. Hard Drive File Allocation Table Storage Area CLUSTER 1 Unallocated FILE STORAGE CLUSTER 2 Unallocated CLUSTER 3 Unallocated CLUSTER 1 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - CLUSTER 2 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2
  • 52. Hard Drive File Allocation Table Storage Area FILE DELETE CLUSTER 3 Unallocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - CLUSTER 2 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2 CLUSTER 1 Allocated
  • 53. Hard Drive File Allocation Table Storage Area FILE DELETE CLUSTER 3 Unallocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - CLUSTER 2 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2 CLUSTER 1 Allocated CLUSTER 1 Unallocated CLUSTER 2 Unallocated ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2 ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2
  • 54. INFO Hard Drive \Download DC01.jpg 10,555 Bytes 5/5/99 1:22 p.m. Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. \Recycle INFO (\Download\Image.jpg) DELETE RECYCLE BIN DELETE ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m.
  • 55. Hard Drive \Download DC01.jpg 10,555 Bytes 5/5/99 1:22 p.m. INFO (\Download\Image.jpg) \Recycle RECOVER RECYCLE BIN RECOVER ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m. Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. ? C01.jpg 10,555 Bytes 5/5/99 1:22 p.m. INFO
  • 56. Animation Used to Show How Things Work MPEG Example Presenting Your Case - Presentation Tools
  • 57. Imaginate example Presenting Your Case - Presentation Tools
  • 58. Live vs. Recorded Demonstrations Murphy’s Law Data may not look the way you want Program may not work the way you want Murphy’s Law Websites can change Live can be turned against you Presenting Your Case - Presentation Tools
  • 59. Many Issues we Used to Worry About are Settled See US DOJ Guidelines for More Detailed Discussion Presenting Your Case - Digital Evidence Admissibility
  • 60. Business Records - Fed R. Evid. 803(6) Computer Generated (admissible) Computer Stored (may be hearsay) Authenticity - Fed. R. Evid 901(a) Mere possibility of tampering doesn’t affect authenticity Proving the Author Circumstantial Evidence See Earlier Discussion - Problem Areas - Putting Defendant at Keyboard Presenting Your Case - Digital Evidence Admissibility: In General
  • 61. Hearsay If computer records reflect only computer generated data, no hearsay If computer records contain the assertions of a person, hearsay Best Evidence - Fed. R. Evid. 1002 See Fed. R. Evid. 1991(3) Summaries - Fed. R. Evid. 1006 Presenting Your Case - Digital Evidence Admissibility: In General
  • 62. Abigail Abraham, Assistant State Attorney Cook County, Illinois [email_address] (713) 869-2728 Ivan Orton, Sr. Deputy Prosecuting Attorney King County, Washington [email_address] (206) 296-9082 Sweet Home Alabama (or wherever)