TELEPHONE:
EMAIL:
Trial Illustration Posters
The Perfect Aid for Testimony About Computer Evidence in Court
It has been said for ages and it is certainly true when computer evidence is presented in trial or during a deposition....."A picture is worth a thousand words".
Many times juries, judges and lawyers have a difficult time understanding
complex computer terms and related computer technology issues. When trial
illustrations are used, in combination with expert testimony, juries and
judges quickly grasp the technical issues. For this reason, NTI has created
a series of eight trial illustration posters for use by computer forensics
experts in court. The use of these generic computer forensics trial
illustrations is demonstrated in
NTI's Computer Expert Witness Training Course
and each participant of that training class receives a full set of the trial
illustration posters in the price of tuition. The posters can also be purchased
separately and they are laminated in plastic for durability. The trial illustration
posters measure 2 feet by 3 feet so they are large enough for visibility in the
court room but they are still small enough for portable. NTI can also create
customized trial illustrations with in-house graphics talent for use in
specific instances when a visual presentation of technical computer evidence
is required.
NTI's Set of Eight Trial Illustration Posters
Poster 1
Bit Stream Backups
are essential in the preservation of computer evidence and NTI's
SafeBack
software is the industry standard for the US DoD, FBI, DEA, etc. However,
the concept of making an exact bit stream backup can be difficult for a jury
to fully understand. NTI has created a trial illustration poster which is
intended for use by expert witnesses who may be required to testify about the
making of an "evidence grade" copy of a computer hard disk drive. In this case,
Aimee McGinnis is using one of the posters to describe the accuracy of a bit
stream backup in combination with her testimony about the process.
Poster 2
Sectors
are the most basic building blocks of data storage on computer
data storage devices. When physical computer forensic searches are
required using low level computer forensic search utilities like NTI's
TextSearch Plus
sectors become the reference point used to identify where the targeted data
was found. In this example Sean Barry is using a trial illustration poster to
supplement his testimony about evidence found in a sector on a computer hard
disk drive.
Poster 3
Clusters
consist of even numbered blocks of sectors and they are the building
blocks of computer files. The last cluster assigned to a file is also where
File Slack
is found. Cluster sizes vary depending upon the operating system involved
and in some cases the size of the data storage device involved. In this
case Jerry Shallenberger is using a trial illustration poster to assist
in his explanation of data associated with a particular cluster on a hard
disk drive.
Poster 4
File Dates and Time Stamps
are extremely important in computer related investigations. Microsoft-based
operating systems automatically record file creation dates and times, last
modified dates and times, and access dates. In the case of Windows NT,
Windows 2000 and Windows XP access times are also automatically recorded.
These dates and times are important in creating timelines of computer
usage and in the investigation of conspiracies which involve computer usage.
In this example, Scott Stevens is using a trial illustration poster to
describe how file dates and times are stored on computer storage devices.
Poster 5
Windows Swap Files
are used transparently by Microsoft Windows operating systems and the data
stored in the swap file can be a source of valuable leads and evidence in
computer related investigations. These unique files essentially act as a
scratch pad for use by the operating system and Windows swap files can
potentially contain any data that was viewed, read, created or even touched
by a Windows-based application. In this example, Andrew Batman is using a
trial illustration poster to supplement his testimony concerning evidence
found in a Windows swap file.
Poster 6
Ram Slack
is a unique source of potential leads and evidence in computer related
investigations. Slack potentially is tied to every file (and previously
deleted file) on the computer. Most computer users, jury members and judges
are unaware of file slack and ram slack as a potential source of computer
leads and evidence. In this case, Mike Sanders is using a trial illustration
to supplement his testimony concerning evidence found in ram slack.
Poster 7
Deleted files aren't really deleted when it comes to Microsoft based
operating systems. When files are deleted, by the computer user, the storage
space assigned to the file is released and made available for the
overwrite of new files. Sometimes this space is referred to as
unallocated storage space
but it is interesting to note that the data remains behind for forensic
discovery until the space is overwritten. In this example, Wayne Bowers is
using a trial illustration poster to supplement his testimony concerning data
found in a previously deleted file.
Poster 8
Mathematical Hashing is used in computer forensics to identify changes
made to data and it is also used to verify the exact match of identical data
sources. Mathematical hashes are frequently used in computer forensics when
accuracy is important. Some computer forensics tools automatically incorporate
mathematical hashes, e.g., when bit stream backups are made. In this example,
Ryan Anderson is using a trial illustration to help explain the use of the RSA
MD5 hash when files are compared.