SlideShare a Scribd company logo
1 of 18
Global Training
Research, Strategy & Execution
1
Preparing to Testify About Mobile
Evidence in Court
2
Brendan Morgan
Senior Trainer
Cellebrite
Brendan.Morgan@Cellebrite.com
Agenda
3
1. Goals and Objectives
2. Preparing for Court
3. Forensic Tools
4. Forensic Methodologies
5. Special Considerations
6. Working with Attorneys
7. Questions
Goals and Objectives
4
• Discuss the role of the Mobile Device Examiner as
witness in legal proceedings
• Learn how to successfully prepare to testify in legal
proceedings
• Testifying to your examination—the extraction,
analysis and interpretation
• Challenges around mobile evidence authenticity and
admissibility
Preparing for Court
5
The Mobile Device Examiner as a witness…
What You Need Before You Testify:
• An understanding of your role as the witness
• To develop and/or update your resume or Curriculum
Vitae or “CV”
• Prepare copies of all reports, notes, emails, and
supplement documents that related to your examination
Preparing for Court
6
Understanding What Type of Witness You Are…
A Fact Witness is:
• An individual with knowledge about what happened in a specific
case who offers testimony about what happened and/or what the
facts are
An Expert Witness is:
• An individual who is a specialist in a subject, often technical, who
may present their expert opinion without having been a witness to
any occurrence relating to the legal proceeding at hand
Preparing for Court
7
Examiners should be prepared to:
• Provide copies of the Chain of Custody
• Provide the copies of the Legal Search Authority for the
items that were analyzed
• Provide testimony as to how their forensic tools function
and their methodology
• Provide a detailed report of findings that’s defendable
Forensic Tools
8
Lack of understanding of to how to properly use
forensic tools and how they function, Examiners risk:
• Damaging or altering original evidence
• Failure to thoroughly examine evidence
• Misinterpreting data
• Preparing inaccurate reports of findings
Forensic Tools
9
Which could result in…
• The destruction of original evidence
• Evidence being ruled as inadmissible by the court
• The loss of the creditability of the examiner by the courts
• Potential civil liability
Forensic Methodologies
10
It is essential for the Mobile Device Examiner to have
a sound set of analysis protocols. These protocols or
methodologies ensure:
• The examiner’s forensic tools have been validated
• Evidence files are true and accurate copies of the
original items seized
• The examiner stays within the scope of the legal search
authority
• That the examiner conducted time-involved searches of
evidence files
Forensic Methodologies
11
These protocols or methodologies ensure
(continued):
• That the examiner has verified or validated their
findings through: hand scrolling techniques, third party
tools, and/or database verification and analysis
• That the examiner has had their findings peer
reviewed by fellow colleagues
• That the examiner has prepared an accurate report
Special Considerations
12
As Mobile Examiners we must be prepared to
testify not only to our report, but also to:
• Forensic hardware/software vendors’ proprietary
methods
--Extraction techniques
--Decoding
• Technical issues
Special Considerations
13
So how do we as Mobile Device Examiners
navigate these considerations?
• We have core understanding of how our forensic
tools function and interact with evidence through
means of:
--Attending Vendor Specific Training
--Professional Association Memberships
--Networking with Peers
• Product Support from the Vendor
Working with Attorneys
14
One last critical objective:
• Essential to develop positive relationships with the
Attorneys adjudicating the case
• Understand their perspective
• Gather information on their needs: i.e. timeline,
prosecution strategy, anticipated cross examination
questions, trial prep schedule and objectives
• Offer creative solutions to help build the case
Working with Attorneys
15
Add value to the legal team by:
• Explaining your report of findings in layman’s terms
• Demonstrating the process of recreating and
validating our findings
• Providing assistance with the creation of exhibits
• Addressing possible defense expert theories
• Providing ample time for trial preparation
Working with Attorneys
16
Follow these guidelines to help ensure that:
• Forensic reports or attorney exhibits are authenticated -
and therefore - admissible
• The attorney is well prepared to defend and argue the
evidence that has been identified
• The examiner is thoroughly prepared to testify as to their
report
Final Thoughts
17
• Have a true understanding of how your forensic tool
functions
• Validate your findings
• Document everything
• Peer review is imperative
• Speak in layman terms
• Do everything possible to assist your prosecutor
Questions?
18

More Related Content

What's hot

Got SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For YouGot SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For YouAnton Chuvakin
 
Criminal Justice 4: Organizing and Writing a Report
Criminal Justice 4: Organizing and Writing a ReportCriminal Justice 4: Organizing and Writing a Report
Criminal Justice 4: Organizing and Writing a ReportJean Reynolds
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidenceOnline
 
Ear recognition system
Ear recognition systemEar recognition system
Ear recognition systemPiyush Mittal
 
voice recognition
voice recognition voice recognition
voice recognition Hemant Jain
 
実装科学の枠組みを活用しよう!_1-1.CFIR_RE-AIM_TDF_解説
実装科学の枠組みを活用しよう!_1-1.CFIR_RE-AIM_TDF_解説実装科学の枠組みを活用しよう!_1-1.CFIR_RE-AIM_TDF_解説
実装科学の枠組みを活用しよう!_1-1.CFIR_RE-AIM_TDF_解説arklambda
 
Criminal Justice 2: A Closer Look at Report Writing
Criminal Justice 2: A Closer Look at Report WritingCriminal Justice 2: A Closer Look at Report Writing
Criminal Justice 2: A Closer Look at Report WritingJean Reynolds
 
Investigação de Crimes Digitais - Carreira em Computação Forense
Investigação de Crimes Digitais - Carreira em Computação ForenseInvestigação de Crimes Digitais - Carreira em Computação Forense
Investigação de Crimes Digitais - Carreira em Computação ForenseVaine Luiz Barreira, MBA
 
Criminal Justice 3: Prepare to Write a Report
Criminal Justice 3: Prepare to Write a ReportCriminal Justice 3: Prepare to Write a Report
Criminal Justice 3: Prepare to Write a ReportJean Reynolds
 
Investigating Hackers' Tools
Investigating Hackers' ToolsInvestigating Hackers' Tools
Investigating Hackers' ToolsIsrael Umana
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - NotesKranthi
 
Image processing in forensic science
Image processing in forensic scienceImage processing in forensic science
Image processing in forensic sciencevenati munishareddy
 

What's hot (20)

Got SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For YouGot SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For You
 
Criminal Justice 4: Organizing and Writing a Report
Criminal Justice 4: Organizing and Writing a ReportCriminal Justice 4: Organizing and Writing a Report
Criminal Justice 4: Organizing and Writing a Report
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
Crimes Digitais e a Computacao Forense
Crimes Digitais e a Computacao ForenseCrimes Digitais e a Computacao Forense
Crimes Digitais e a Computacao Forense
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
Ear recognition system
Ear recognition systemEar recognition system
Ear recognition system
 
voice recognition
voice recognition voice recognition
voice recognition
 
実装科学の枠組みを活用しよう!_1-1.CFIR_RE-AIM_TDF_解説
実装科学の枠組みを活用しよう!_1-1.CFIR_RE-AIM_TDF_解説実装科学の枠組みを活用しよう!_1-1.CFIR_RE-AIM_TDF_解説
実装科学の枠組みを活用しよう!_1-1.CFIR_RE-AIM_TDF_解説
 
Criminal Justice 2: A Closer Look at Report Writing
Criminal Justice 2: A Closer Look at Report WritingCriminal Justice 2: A Closer Look at Report Writing
Criminal Justice 2: A Closer Look at Report Writing
 
Data recovery
Data recoveryData recovery
Data recovery
 
Investigação de Crimes Digitais - Carreira em Computação Forense
Investigação de Crimes Digitais - Carreira em Computação ForenseInvestigação de Crimes Digitais - Carreira em Computação Forense
Investigação de Crimes Digitais - Carreira em Computação Forense
 
Criminal Justice 3: Prepare to Write a Report
Criminal Justice 3: Prepare to Write a ReportCriminal Justice 3: Prepare to Write a Report
Criminal Justice 3: Prepare to Write a Report
 
Investigating Hackers' Tools
Investigating Hackers' ToolsInvestigating Hackers' Tools
Investigating Hackers' Tools
 
POROSCOPY AND EDGEOSCOPY
POROSCOPY AND EDGEOSCOPYPOROSCOPY AND EDGEOSCOPY
POROSCOPY AND EDGEOSCOPY
 
Multimedia (Social Forensics)
Multimedia (Social Forensics)Multimedia (Social Forensics)
Multimedia (Social Forensics)
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 
Criminal Profiling.pptx
Criminal Profiling.pptxCriminal Profiling.pptx
Criminal Profiling.pptx
 
Forensic/Investigation report writing techniques
Forensic/Investigation report writing techniquesForensic/Investigation report writing techniques
Forensic/Investigation report writing techniques
 
Image processing in forensic science
Image processing in forensic scienceImage processing in forensic science
Image processing in forensic science
 

Viewers also liked

Interview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime WorldInterview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime WorldCellebrite
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsCellebrite
 
Trends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsTrends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsCellebrite
 
With UFED Physical Analyzer, investigative team helps prove a case for capita...
With UFED Physical Analyzer, investigative team helps prove a case for capita...With UFED Physical Analyzer, investigative team helps prove a case for capita...
With UFED Physical Analyzer, investigative team helps prove a case for capita...Cellebrite
 
Verification and Validation of Findings
Verification and Validation of FindingsVerification and Validation of Findings
Verification and Validation of FindingsCellebrite
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite
 
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...Cellebrite
 
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingPreparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingCellebrite
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECEajitece
 

Viewers also liked (9)

Interview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime WorldInterview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime World
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic Previews
 
Trends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsTrends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and Artifacts
 
With UFED Physical Analyzer, investigative team helps prove a case for capita...
With UFED Physical Analyzer, investigative team helps prove a case for capita...With UFED Physical Analyzer, investigative team helps prove a case for capita...
With UFED Physical Analyzer, investigative team helps prove a case for capita...
 
Verification and Validation of Findings
Verification and Validation of FindingsVerification and Validation of Findings
Verification and Validation of Findings
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015
 
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
 
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingPreparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 

Similar to Preparing to Testify About Mobile Device Evidence

Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...Caveon Test Security
 
2023-24 CA Judge Attorney Handbook.pdf
2023-24 CA Judge Attorney Handbook.pdf2023-24 CA Judge Attorney Handbook.pdf
2023-24 CA Judge Attorney Handbook.pdfShivanshBansal25
 
Writing Effective Investigation Reports
Writing Effective Investigation ReportsWriting Effective Investigation Reports
Writing Effective Investigation ReportsCase IQ
 
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...Financial Poise
 
Ethical Issues in eDiscovery - Lessons from Qualcomm
Ethical Issues in eDiscovery - Lessons from QualcommEthical Issues in eDiscovery - Lessons from Qualcomm
Ethical Issues in eDiscovery - Lessons from QualcommKlemchuk LLP
 
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...Financial Poise
 
Cross-Examinagin Expert Witnesses in Business Litigation
Cross-Examinagin Expert Witnesses in Business LitigationCross-Examinagin Expert Witnesses in Business Litigation
Cross-Examinagin Expert Witnesses in Business LitigationEvelyn Perez Youssoufian
 
How to Conduct a Bullet Proof Harassment Investigation
How to Conduct a Bullet Proof Harassment InvestigationHow to Conduct a Bullet Proof Harassment Investigation
How to Conduct a Bullet Proof Harassment InvestigationNow Dentons
 
D4S1 Investigation Strategy.pptx
D4S1 Investigation Strategy.pptxD4S1 Investigation Strategy.pptx
D4S1 Investigation Strategy.pptx30rustiegmailcom
 
ACCA-IIA Singapore Seminar 2015 Part 5 Investigation
ACCA-IIA Singapore Seminar 2015 Part 5 InvestigationACCA-IIA Singapore Seminar 2015 Part 5 Investigation
ACCA-IIA Singapore Seminar 2015 Part 5 InvestigationBillyCheuk
 
Investigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts ApproachInvestigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts ApproachRandall Tam
 
Investigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts ApproachInvestigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts ApproachCase IQ
 
I Know What You Did Last Summer: Workplace Investigations
I Know What You Did Last Summer: Workplace InvestigationsI Know What You Did Last Summer: Workplace Investigations
I Know What You Did Last Summer: Workplace InvestigationsFinancial Poise
 
Effective Fraud Investigations: 10 Keys to a Successful Outcome
Effective Fraud Investigations: 10 Keys to a Successful OutcomeEffective Fraud Investigations: 10 Keys to a Successful Outcome
Effective Fraud Investigations: 10 Keys to a Successful OutcomeCase IQ
 
'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012SkylerWeisenburger
 
Conducting an Effective Internal Investigation
Conducting an Effective Internal InvestigationConducting an Effective Internal Investigation
Conducting an Effective Internal InvestigationParsons Behle & Latimer
 
Ethical & Practical Issues in Managing Internal Investigations
Ethical & Practical Issues in Managing Internal InvestigationsEthical & Practical Issues in Managing Internal Investigations
Ethical & Practical Issues in Managing Internal InvestigationsGowling WLG
 
Suzanne Pozsonyi MedicReS World Congress 2013
Suzanne Pozsonyi MedicReS World Congress 2013Suzanne Pozsonyi MedicReS World Congress 2013
Suzanne Pozsonyi MedicReS World Congress 2013MedicReS
 

Similar to Preparing to Testify About Mobile Device Evidence (20)

Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
 
2023-24 CA Judge Attorney Handbook.pdf
2023-24 CA Judge Attorney Handbook.pdf2023-24 CA Judge Attorney Handbook.pdf
2023-24 CA Judge Attorney Handbook.pdf
 
Writing Effective Investigation Reports
Writing Effective Investigation ReportsWriting Effective Investigation Reports
Writing Effective Investigation Reports
 
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...
 
Lect 2 computer forensics
Lect 2 computer forensicsLect 2 computer forensics
Lect 2 computer forensics
 
Ethical Issues in eDiscovery - Lessons from Qualcomm
Ethical Issues in eDiscovery - Lessons from QualcommEthical Issues in eDiscovery - Lessons from Qualcomm
Ethical Issues in eDiscovery - Lessons from Qualcomm
 
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
 
Cross-Examinagin Expert Witnesses in Business Litigation
Cross-Examinagin Expert Witnesses in Business LitigationCross-Examinagin Expert Witnesses in Business Litigation
Cross-Examinagin Expert Witnesses in Business Litigation
 
How to Conduct a Bullet Proof Harassment Investigation
How to Conduct a Bullet Proof Harassment InvestigationHow to Conduct a Bullet Proof Harassment Investigation
How to Conduct a Bullet Proof Harassment Investigation
 
Forensic audit
Forensic auditForensic audit
Forensic audit
 
D4S1 Investigation Strategy.pptx
D4S1 Investigation Strategy.pptxD4S1 Investigation Strategy.pptx
D4S1 Investigation Strategy.pptx
 
ACCA-IIA Singapore Seminar 2015 Part 5 Investigation
ACCA-IIA Singapore Seminar 2015 Part 5 InvestigationACCA-IIA Singapore Seminar 2015 Part 5 Investigation
ACCA-IIA Singapore Seminar 2015 Part 5 Investigation
 
Investigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts ApproachInvestigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts Approach
 
Investigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts ApproachInvestigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts Approach
 
I Know What You Did Last Summer: Workplace Investigations
I Know What You Did Last Summer: Workplace InvestigationsI Know What You Did Last Summer: Workplace Investigations
I Know What You Did Last Summer: Workplace Investigations
 
Effective Fraud Investigations: 10 Keys to a Successful Outcome
Effective Fraud Investigations: 10 Keys to a Successful OutcomeEffective Fraud Investigations: 10 Keys to a Successful Outcome
Effective Fraud Investigations: 10 Keys to a Successful Outcome
 
'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012
 
Conducting an Effective Internal Investigation
Conducting an Effective Internal InvestigationConducting an Effective Internal Investigation
Conducting an Effective Internal Investigation
 
Ethical & Practical Issues in Managing Internal Investigations
Ethical & Practical Issues in Managing Internal InvestigationsEthical & Practical Issues in Managing Internal Investigations
Ethical & Practical Issues in Managing Internal Investigations
 
Suzanne Pozsonyi MedicReS World Congress 2013
Suzanne Pozsonyi MedicReS World Congress 2013Suzanne Pozsonyi MedicReS World Congress 2013
Suzanne Pozsonyi MedicReS World Congress 2013
 

Recently uploaded

Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notesPRATIKNAYAK31
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General ProcedureBridgeWest.eu
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书Fir L
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 

Recently uploaded (20)

Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notes
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General Procedure
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in Midlothian
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 

Preparing to Testify About Mobile Device Evidence

  • 1. Global Training Research, Strategy & Execution 1 Preparing to Testify About Mobile Evidence in Court
  • 3. Agenda 3 1. Goals and Objectives 2. Preparing for Court 3. Forensic Tools 4. Forensic Methodologies 5. Special Considerations 6. Working with Attorneys 7. Questions
  • 4. Goals and Objectives 4 • Discuss the role of the Mobile Device Examiner as witness in legal proceedings • Learn how to successfully prepare to testify in legal proceedings • Testifying to your examination—the extraction, analysis and interpretation • Challenges around mobile evidence authenticity and admissibility
  • 5. Preparing for Court 5 The Mobile Device Examiner as a witness… What You Need Before You Testify: • An understanding of your role as the witness • To develop and/or update your resume or Curriculum Vitae or “CV” • Prepare copies of all reports, notes, emails, and supplement documents that related to your examination
  • 6. Preparing for Court 6 Understanding What Type of Witness You Are… A Fact Witness is: • An individual with knowledge about what happened in a specific case who offers testimony about what happened and/or what the facts are An Expert Witness is: • An individual who is a specialist in a subject, often technical, who may present their expert opinion without having been a witness to any occurrence relating to the legal proceeding at hand
  • 7. Preparing for Court 7 Examiners should be prepared to: • Provide copies of the Chain of Custody • Provide the copies of the Legal Search Authority for the items that were analyzed • Provide testimony as to how their forensic tools function and their methodology • Provide a detailed report of findings that’s defendable
  • 8. Forensic Tools 8 Lack of understanding of to how to properly use forensic tools and how they function, Examiners risk: • Damaging or altering original evidence • Failure to thoroughly examine evidence • Misinterpreting data • Preparing inaccurate reports of findings
  • 9. Forensic Tools 9 Which could result in… • The destruction of original evidence • Evidence being ruled as inadmissible by the court • The loss of the creditability of the examiner by the courts • Potential civil liability
  • 10. Forensic Methodologies 10 It is essential for the Mobile Device Examiner to have a sound set of analysis protocols. These protocols or methodologies ensure: • The examiner’s forensic tools have been validated • Evidence files are true and accurate copies of the original items seized • The examiner stays within the scope of the legal search authority • That the examiner conducted time-involved searches of evidence files
  • 11. Forensic Methodologies 11 These protocols or methodologies ensure (continued): • That the examiner has verified or validated their findings through: hand scrolling techniques, third party tools, and/or database verification and analysis • That the examiner has had their findings peer reviewed by fellow colleagues • That the examiner has prepared an accurate report
  • 12. Special Considerations 12 As Mobile Examiners we must be prepared to testify not only to our report, but also to: • Forensic hardware/software vendors’ proprietary methods --Extraction techniques --Decoding • Technical issues
  • 13. Special Considerations 13 So how do we as Mobile Device Examiners navigate these considerations? • We have core understanding of how our forensic tools function and interact with evidence through means of: --Attending Vendor Specific Training --Professional Association Memberships --Networking with Peers • Product Support from the Vendor
  • 14. Working with Attorneys 14 One last critical objective: • Essential to develop positive relationships with the Attorneys adjudicating the case • Understand their perspective • Gather information on their needs: i.e. timeline, prosecution strategy, anticipated cross examination questions, trial prep schedule and objectives • Offer creative solutions to help build the case
  • 15. Working with Attorneys 15 Add value to the legal team by: • Explaining your report of findings in layman’s terms • Demonstrating the process of recreating and validating our findings • Providing assistance with the creation of exhibits • Addressing possible defense expert theories • Providing ample time for trial preparation
  • 16. Working with Attorneys 16 Follow these guidelines to help ensure that: • Forensic reports or attorney exhibits are authenticated - and therefore - admissible • The attorney is well prepared to defend and argue the evidence that has been identified • The examiner is thoroughly prepared to testify as to their report
  • 17. Final Thoughts 17 • Have a true understanding of how your forensic tool functions • Validate your findings • Document everything • Peer review is imperative • Speak in layman terms • Do everything possible to assist your prosecutor