SlideShare a Scribd company logo
1 of 18
Global Training
Research, Strategy & Execution
1
Preparing to Testify About Mobile
Evidence in Court
2
Brendan Morgan
Senior Trainer
Cellebrite
Brendan.Morgan@Cellebrite.com
Agenda
3
1. Goals and Objectives
2. Preparing for Court
3. Forensic Tools
4. Forensic Methodologies
5. Special Considerations
6. Working with Attorneys
7. Questions
Goals and Objectives
4
• Discuss the role of the Mobile Device Examiner as
witness in legal proceedings
• Learn how to successfully prepare to testify in legal
proceedings
• Testifying to your examination—the extraction,
analysis and interpretation
• Challenges around mobile evidence authenticity and
admissibility
Preparing for Court
5
The Mobile Device Examiner as a witness…
What You Need Before You Testify:
• An understanding of your role as the witness
• To develop and/or update your resume or Curriculum
Vitae or “CV”
• Prepare copies of all reports, notes, emails, and
supplement documents that related to your examination
Preparing for Court
6
Understanding What Type of Witness You Are…
A Fact Witness is:
• An individual with knowledge about what happened in a specific
case who offers testimony about what happened and/or what the
facts are
An Expert Witness is:
• An individual who is a specialist in a subject, often technical, who
may present their expert opinion without having been a witness to
any occurrence relating to the legal proceeding at hand
Preparing for Court
7
Examiners should be prepared to:
• Provide copies of the Chain of Custody
• Provide the copies of the Legal Search Authority for the
items that were analyzed
• Provide testimony as to how their forensic tools function
and their methodology
• Provide a detailed report of findings that’s defendable
Forensic Tools
8
Lack of understanding of to how to properly use
forensic tools and how they function, Examiners risk:
• Damaging or altering original evidence
• Failure to thoroughly examine evidence
• Misinterpreting data
• Preparing inaccurate reports of findings
Forensic Tools
9
Which could result in…
• The destruction of original evidence
• Evidence being ruled as inadmissible by the court
• The loss of the creditability of the examiner by the courts
• Potential civil liability
Forensic Methodologies
10
It is essential for the Mobile Device Examiner to have
a sound set of analysis protocols. These protocols or
methodologies ensure:
• The examiner’s forensic tools have been validated
• Evidence files are true and accurate copies of the
original items seized
• The examiner stays within the scope of the legal search
authority
• That the examiner conducted time-involved searches of
evidence files
Forensic Methodologies
11
These protocols or methodologies ensure
(continued):
• That the examiner has verified or validated their
findings through: hand scrolling techniques, third party
tools, and/or database verification and analysis
• That the examiner has had their findings peer
reviewed by fellow colleagues
• That the examiner has prepared an accurate report
Special Considerations
12
As Mobile Examiners we must be prepared to
testify not only to our report, but also to:
• Forensic hardware/software vendors’ proprietary
methods
--Extraction techniques
--Decoding
• Technical issues
Special Considerations
13
So how do we as Mobile Device Examiners
navigate these considerations?
• We have core understanding of how our forensic
tools function and interact with evidence through
means of:
--Attending Vendor Specific Training
--Professional Association Memberships
--Networking with Peers
• Product Support from the Vendor
Working with Attorneys
14
One last critical objective:
• Essential to develop positive relationships with the
Attorneys adjudicating the case
• Understand their perspective
• Gather information on their needs: i.e. timeline,
prosecution strategy, anticipated cross examination
questions, trial prep schedule and objectives
• Offer creative solutions to help build the case
Working with Attorneys
15
Add value to the legal team by:
• Explaining your report of findings in layman’s terms
• Demonstrating the process of recreating and
validating our findings
• Providing assistance with the creation of exhibits
• Addressing possible defense expert theories
• Providing ample time for trial preparation
Working with Attorneys
16
Follow these guidelines to help ensure that:
• Forensic reports or attorney exhibits are authenticated -
and therefore - admissible
• The attorney is well prepared to defend and argue the
evidence that has been identified
• The examiner is thoroughly prepared to testify as to their
report
Final Thoughts
17
• Have a true understanding of how your forensic tool
functions
• Validate your findings
• Document everything
• Peer review is imperative
• Speak in layman terms
• Do everything possible to assist your prosecutor
Questions?
18

More Related Content

What's hot

What's hot (20)

Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
 
Chapter 5 input
Chapter 5 inputChapter 5 input
Chapter 5 input
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
Configuring input and output devices
Configuring input and output devicesConfiguring input and output devices
Configuring input and output devices
 
Live data collection_from_windows_system
Live data collection_from_windows_systemLive data collection_from_windows_system
Live data collection_from_windows_system
 
OS-01.ppt
OS-01.pptOS-01.ppt
OS-01.ppt
 
Data recovery slide show
Data recovery slide showData recovery slide show
Data recovery slide show
 
Computer components
Computer componentsComputer components
Computer components
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Windows forensic artifacts
Windows forensic artifactsWindows forensic artifacts
Windows forensic artifacts
 
Concetti di base (per iniziare)
Concetti di base (per iniziare)Concetti di base (per iniziare)
Concetti di base (per iniziare)
 
Cleaning of computer
Cleaning of computerCleaning of computer
Cleaning of computer
 
Presentation(Input,output,stoarage)
Presentation(Input,output,stoarage)Presentation(Input,output,stoarage)
Presentation(Input,output,stoarage)
 
Non-Lethal Weapons Reference Book 2011
Non-Lethal Weapons Reference Book 2011Non-Lethal Weapons Reference Book 2011
Non-Lethal Weapons Reference Book 2011
 
Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Ram and its Components
Ram and its ComponentsRam and its Components
Ram and its Components
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Computer safety
Computer safetyComputer safety
Computer safety
 

Viewers also liked

Interview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime WorldInterview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime WorldCellebrite
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsCellebrite
 
Trends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsTrends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsCellebrite
 
With UFED Physical Analyzer, investigative team helps prove a case for capita...
With UFED Physical Analyzer, investigative team helps prove a case for capita...With UFED Physical Analyzer, investigative team helps prove a case for capita...
With UFED Physical Analyzer, investigative team helps prove a case for capita...Cellebrite
 
Verification and Validation of Findings
Verification and Validation of FindingsVerification and Validation of Findings
Verification and Validation of FindingsCellebrite
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite
 
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...Cellebrite
 
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingPreparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingCellebrite
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECEajitece
 

Viewers also liked (9)

Interview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime WorldInterview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime World
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic Previews
 
Trends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsTrends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and Artifacts
 
With UFED Physical Analyzer, investigative team helps prove a case for capita...
With UFED Physical Analyzer, investigative team helps prove a case for capita...With UFED Physical Analyzer, investigative team helps prove a case for capita...
With UFED Physical Analyzer, investigative team helps prove a case for capita...
 
Verification and Validation of Findings
Verification and Validation of FindingsVerification and Validation of Findings
Verification and Validation of Findings
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015
 
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
 
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingPreparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 

Similar to Preparing to Testify About Mobile Device Evidence

Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...Caveon Test Security
 
2023-24 CA Judge Attorney Handbook.pdf
2023-24 CA Judge Attorney Handbook.pdf2023-24 CA Judge Attorney Handbook.pdf
2023-24 CA Judge Attorney Handbook.pdfShivanshBansal25
 
Writing Effective Investigation Reports
Writing Effective Investigation ReportsWriting Effective Investigation Reports
Writing Effective Investigation ReportsCase IQ
 
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...Financial Poise
 
Ethical Issues in eDiscovery - Lessons from Qualcomm
Ethical Issues in eDiscovery - Lessons from QualcommEthical Issues in eDiscovery - Lessons from Qualcomm
Ethical Issues in eDiscovery - Lessons from QualcommKlemchuk LLP
 
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...Financial Poise
 
Cross-Examinagin Expert Witnesses in Business Litigation
Cross-Examinagin Expert Witnesses in Business LitigationCross-Examinagin Expert Witnesses in Business Litigation
Cross-Examinagin Expert Witnesses in Business LitigationEvelyn Perez Youssoufian
 
How to Conduct a Bullet Proof Harassment Investigation
How to Conduct a Bullet Proof Harassment InvestigationHow to Conduct a Bullet Proof Harassment Investigation
How to Conduct a Bullet Proof Harassment InvestigationNow Dentons
 
D4S1 Investigation Strategy.pptx
D4S1 Investigation Strategy.pptxD4S1 Investigation Strategy.pptx
D4S1 Investigation Strategy.pptx30rustiegmailcom
 
ACCA-IIA Singapore Seminar 2015 Part 5 Investigation
ACCA-IIA Singapore Seminar 2015 Part 5 InvestigationACCA-IIA Singapore Seminar 2015 Part 5 Investigation
ACCA-IIA Singapore Seminar 2015 Part 5 InvestigationBillyCheuk
 
Investigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts ApproachInvestigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts ApproachRandall Tam
 
Investigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts ApproachInvestigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts ApproachCase IQ
 
I Know What You Did Last Summer: Workplace Investigations
I Know What You Did Last Summer: Workplace InvestigationsI Know What You Did Last Summer: Workplace Investigations
I Know What You Did Last Summer: Workplace InvestigationsFinancial Poise
 
Effective Fraud Investigations: 10 Keys to a Successful Outcome
Effective Fraud Investigations: 10 Keys to a Successful OutcomeEffective Fraud Investigations: 10 Keys to a Successful Outcome
Effective Fraud Investigations: 10 Keys to a Successful OutcomeCase IQ
 
'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012SkylerWeisenburger
 
Conducting an Effective Internal Investigation
Conducting an Effective Internal InvestigationConducting an Effective Internal Investigation
Conducting an Effective Internal InvestigationParsons Behle & Latimer
 
Ethical & Practical Issues in Managing Internal Investigations
Ethical & Practical Issues in Managing Internal InvestigationsEthical & Practical Issues in Managing Internal Investigations
Ethical & Practical Issues in Managing Internal InvestigationsGowling WLG
 
Suzanne Pozsonyi MedicReS World Congress 2013
Suzanne Pozsonyi MedicReS World Congress 2013Suzanne Pozsonyi MedicReS World Congress 2013
Suzanne Pozsonyi MedicReS World Congress 2013MedicReS
 

Similar to Preparing to Testify About Mobile Device Evidence (20)

Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
 
2023-24 CA Judge Attorney Handbook.pdf
2023-24 CA Judge Attorney Handbook.pdf2023-24 CA Judge Attorney Handbook.pdf
2023-24 CA Judge Attorney Handbook.pdf
 
Writing Effective Investigation Reports
Writing Effective Investigation ReportsWriting Effective Investigation Reports
Writing Effective Investigation Reports
 
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...
 
Lect 2 computer forensics
Lect 2 computer forensicsLect 2 computer forensics
Lect 2 computer forensics
 
Ethical Issues in eDiscovery - Lessons from Qualcomm
Ethical Issues in eDiscovery - Lessons from QualcommEthical Issues in eDiscovery - Lessons from Qualcomm
Ethical Issues in eDiscovery - Lessons from Qualcomm
 
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
 
Cross-Examinagin Expert Witnesses in Business Litigation
Cross-Examinagin Expert Witnesses in Business LitigationCross-Examinagin Expert Witnesses in Business Litigation
Cross-Examinagin Expert Witnesses in Business Litigation
 
How to Conduct a Bullet Proof Harassment Investigation
How to Conduct a Bullet Proof Harassment InvestigationHow to Conduct a Bullet Proof Harassment Investigation
How to Conduct a Bullet Proof Harassment Investigation
 
Forensic audit
Forensic auditForensic audit
Forensic audit
 
D4S1 Investigation Strategy.pptx
D4S1 Investigation Strategy.pptxD4S1 Investigation Strategy.pptx
D4S1 Investigation Strategy.pptx
 
ACCA-IIA Singapore Seminar 2015 Part 5 Investigation
ACCA-IIA Singapore Seminar 2015 Part 5 InvestigationACCA-IIA Singapore Seminar 2015 Part 5 Investigation
ACCA-IIA Singapore Seminar 2015 Part 5 Investigation
 
Investigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts ApproachInvestigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts Approach
 
Investigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts ApproachInvestigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts Approach
 
I Know What You Did Last Summer: Workplace Investigations
I Know What You Did Last Summer: Workplace InvestigationsI Know What You Did Last Summer: Workplace Investigations
I Know What You Did Last Summer: Workplace Investigations
 
Effective Fraud Investigations: 10 Keys to a Successful Outcome
Effective Fraud Investigations: 10 Keys to a Successful OutcomeEffective Fraud Investigations: 10 Keys to a Successful Outcome
Effective Fraud Investigations: 10 Keys to a Successful Outcome
 
'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012
 
Conducting an Effective Internal Investigation
Conducting an Effective Internal InvestigationConducting an Effective Internal Investigation
Conducting an Effective Internal Investigation
 
Ethical & Practical Issues in Managing Internal Investigations
Ethical & Practical Issues in Managing Internal InvestigationsEthical & Practical Issues in Managing Internal Investigations
Ethical & Practical Issues in Managing Internal Investigations
 
Suzanne Pozsonyi MedicReS World Congress 2013
Suzanne Pozsonyi MedicReS World Congress 2013Suzanne Pozsonyi MedicReS World Congress 2013
Suzanne Pozsonyi MedicReS World Congress 2013
 

Recently uploaded

Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersJillianAsdala
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxRRR Chambers
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringSteering Law
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理Airst S
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptJosephCanama
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxRRR Chambers
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理Airst S
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理Airst S
 

Recently uploaded (20)

Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. Steering
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 

Preparing to Testify About Mobile Device Evidence

  • 1. Global Training Research, Strategy & Execution 1 Preparing to Testify About Mobile Evidence in Court
  • 3. Agenda 3 1. Goals and Objectives 2. Preparing for Court 3. Forensic Tools 4. Forensic Methodologies 5. Special Considerations 6. Working with Attorneys 7. Questions
  • 4. Goals and Objectives 4 • Discuss the role of the Mobile Device Examiner as witness in legal proceedings • Learn how to successfully prepare to testify in legal proceedings • Testifying to your examination—the extraction, analysis and interpretation • Challenges around mobile evidence authenticity and admissibility
  • 5. Preparing for Court 5 The Mobile Device Examiner as a witness… What You Need Before You Testify: • An understanding of your role as the witness • To develop and/or update your resume or Curriculum Vitae or “CV” • Prepare copies of all reports, notes, emails, and supplement documents that related to your examination
  • 6. Preparing for Court 6 Understanding What Type of Witness You Are… A Fact Witness is: • An individual with knowledge about what happened in a specific case who offers testimony about what happened and/or what the facts are An Expert Witness is: • An individual who is a specialist in a subject, often technical, who may present their expert opinion without having been a witness to any occurrence relating to the legal proceeding at hand
  • 7. Preparing for Court 7 Examiners should be prepared to: • Provide copies of the Chain of Custody • Provide the copies of the Legal Search Authority for the items that were analyzed • Provide testimony as to how their forensic tools function and their methodology • Provide a detailed report of findings that’s defendable
  • 8. Forensic Tools 8 Lack of understanding of to how to properly use forensic tools and how they function, Examiners risk: • Damaging or altering original evidence • Failure to thoroughly examine evidence • Misinterpreting data • Preparing inaccurate reports of findings
  • 9. Forensic Tools 9 Which could result in… • The destruction of original evidence • Evidence being ruled as inadmissible by the court • The loss of the creditability of the examiner by the courts • Potential civil liability
  • 10. Forensic Methodologies 10 It is essential for the Mobile Device Examiner to have a sound set of analysis protocols. These protocols or methodologies ensure: • The examiner’s forensic tools have been validated • Evidence files are true and accurate copies of the original items seized • The examiner stays within the scope of the legal search authority • That the examiner conducted time-involved searches of evidence files
  • 11. Forensic Methodologies 11 These protocols or methodologies ensure (continued): • That the examiner has verified or validated their findings through: hand scrolling techniques, third party tools, and/or database verification and analysis • That the examiner has had their findings peer reviewed by fellow colleagues • That the examiner has prepared an accurate report
  • 12. Special Considerations 12 As Mobile Examiners we must be prepared to testify not only to our report, but also to: • Forensic hardware/software vendors’ proprietary methods --Extraction techniques --Decoding • Technical issues
  • 13. Special Considerations 13 So how do we as Mobile Device Examiners navigate these considerations? • We have core understanding of how our forensic tools function and interact with evidence through means of: --Attending Vendor Specific Training --Professional Association Memberships --Networking with Peers • Product Support from the Vendor
  • 14. Working with Attorneys 14 One last critical objective: • Essential to develop positive relationships with the Attorneys adjudicating the case • Understand their perspective • Gather information on their needs: i.e. timeline, prosecution strategy, anticipated cross examination questions, trial prep schedule and objectives • Offer creative solutions to help build the case
  • 15. Working with Attorneys 15 Add value to the legal team by: • Explaining your report of findings in layman’s terms • Demonstrating the process of recreating and validating our findings • Providing assistance with the creation of exhibits • Addressing possible defense expert theories • Providing ample time for trial preparation
  • 16. Working with Attorneys 16 Follow these guidelines to help ensure that: • Forensic reports or attorney exhibits are authenticated - and therefore - admissible • The attorney is well prepared to defend and argue the evidence that has been identified • The examiner is thoroughly prepared to testify as to their report
  • 17. Final Thoughts 17 • Have a true understanding of how your forensic tool functions • Validate your findings • Document everything • Peer review is imperative • Speak in layman terms • Do everything possible to assist your prosecutor