Back to Results

EFTA00157492.pdf

Source: DOJ_DS9  •  Size: 155.8 KB  •  OCR Confidence: 85.0%
PDF Source (No Download)

Extracted Text (OCR)

November 12, 2021 • Prepared for trial testimony • • • • • • Forensic examination— captures data (imaging— bit-for-bit copy), puts it through software to categorize information; huge amounts of data on computer; software helps organize to assist with review • Information stored on a hard drive in a computer; hard drive stores non-volatile data (anything saved on the drive will be on drive if you unplug it); digital device to store data • Typically knows nothing about a case when analyzes digital evidence • was shown GX 54 (has initials, case number, unique identifier on it, date) • Every piece of evidence that Uexamines gets unique bar code numbers and gets another sticker with case number, date initials, and reference to unique number on other sticker • Received GX 54 in a box with photocopy of different drive on front; led to believe was copy of drive on the front of it; had to determine how best to capture information on drive, had to see if image files or a clone • was shown GX 55: first marked it; after marking it, connect hard drive to a writeblocker and connect that to computer to view data on drive without altering it; looked to figure out if image files or clone • Clone: bit for bit copy of one piece of media to another (e.&, from one hard drive to another) • As digital forensics progressed, moved away from clones and towards images; image is a bit for bit copy, but saved onto another hard drive as image files; advantage is that containerizes it, more difficult to change data on an image file than a clone • After determined drive was a clone, imaged it; made a bit for bit copy of the clone; copies to storage area network for processing • To make an image, have several tools available; FTK made by Access Data; also have FBI created product; also have physical devices that are duplicators (TX1 made by Tableau) to create image files • Hard drive is electromechanical device, has platters spinning around, several motors and pieces of hardware; it will fail at some point, just a matter of when; so with all hard drives make original copy and work off of the copy • Know that what is in the copy is an exact copy of the device because run a hash (mathematical algorithm), uniquely identifies data on drive; run against copy; comes out the same 3503-110 Page 1 of 3 SUBJECT TO PROTECTIVE ORDER PARAGRAPHS 7, 8, 9, 10, 15, and 17 EFIA_00002309 EFTA00157492 • After made image, • placed data in Access Data Lab and processed for review • From review of images of GX 54 and GX 55, • knows they are Dell computers • was shown GX 405 and 419 and confirmed recognized and accurate o Every windows computer has architecture inside it called registry, which stores settings, ton of stuff; comprised of five different files o Software hive: tells you what version of Windows was running, who registered owner and organization was, data installed (date computer clock set to when operating system was installed on it); product name o Registered org: when start up computer, asks who computer is; one identifier is organization and next asks who owner is; user inputtable data • • reviewed the properties for GX 417, 418, 420,421,422 (GX 417B, 418B, 420B, 421B, 422B) and confirmed accuracy by running software (Access Data's Lab, AD Lab); confirmed GX 417 on GX 55 (NYCO24349); GX 418, 420, 421, 422 on GX 54 (NYCO24350); all word documents • El confirmed GX 412 and GX 415 on GX 54; emails • • remembers seeing GX 417 because it was at the root of the C drive, not normal spot for documents to be; would expect documents to be under user's profile in documents folder (that is Microsoft Word default) • 2 reasons to be in C drive: either to hide it or to give another user easy access to it so don't have to go digging around; believes there were three documents in total at root of C drive • 2 sets of metadata for Word documents: file system or embedded file within the word document; B exhibits are the latter (embedded file within word document) • To access metadata in Word document, click on properties and will display information • When Word doc is created, metadata is generated to reflect creation date of file; gets metadata from operating system; that is from system clock, which a user can change • Author is pulled from the registry for the user signed in at the time the document is created • If someone else created a Word document other than the user signed into the operating system, wouldn't be able to tell • Last printed — when print document, it will update that field • When document is last printed before creation date: means typed up document, printed it, and then "save as"; when hit "save as" it resets the created date; the "last printed" field wouldn't change • If userhad created document, printed it, and went to close document, and saved in response to prompting, document will have the creation date of when first started typing the document • Total editing time: keeps running clock of when have document open to edit • GX 418, 420, 421, and 422 were saved under Maxwell's user profile 3503-110 Page 2 of 3 SUBJECT TO PROTECTIVE ORDER PARAGRAPHS 7, 8, 9, 10, 15, and 17 EFIA_00002310 EFTA00157493 3503-110 Page 3 of 3 SUBJECT TO PROTECTIVE ORDER PARAGRAPHS 7, 8, 9, 10, 15, and 17 EFTA_00002311 EFTA00157494

Document Preview

PDF source document
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.

Extracted Information

Dates

Document Details

Filename EFTA00157492.pdf
File Size 155.8 KB
OCR Confidence 85.0%
Has Readable Text Yes
Text Length 5,395 characters
Indexed 2026-02-11T10:59:24.061084
Ask the Files