Retrial for Sentencing of Jodi Arias - 12/09-11

DNA Solves
DNA Solves
DNA Solves
Status
Not open for further replies.
Michael Kiefer ‏@michaelbkiefer · 23s23 seconds ago
Willmott shows Smith a copy of Mesa PD policy and asks him to read to himself.

Jen's Trial Diaries ‏@TrialDiariesJ · 32s33 seconds ago
Willmott has the Mesa PD policy manual and Perry is reading it #jodiarias #3tvarias
 
From WAT:

Wild About Trial @WildAboutTrial · 47s 47 seconds ago

Willmott is auto tuning. "So you didn't know that?" was so high pitched it was almost inaudible. #JodiArias


Wild About Trial @WildAboutTrial · 6s 6 seconds ago

Willmott brings up ex 12, page 6 shows part of Mesa PD policy on how to impound a computer. #JodiArias
 
Correct. They are both exact copies, but the image is compressed and protected. The image is what you use for forensic purposes because you know it hasn't been changed and won't change by you looking at it.

BN gave Juan clones, so Juan's expert can't look at them without changing them.

You know computers that well too ( I should have known, given yr wizard work on FCA's case). I think I'm going to have to join the official AZL fan club . ;)
 
From WAT:

Wild About Trial @WildAboutTrial · 47s 47 seconds ago

Willmott is auto tuning. "So you didn't know that?" was so high pitched it was almost inaudible. #JodiArias


Wild About Trial @WildAboutTrial · 6s 6 seconds ago

Willmott brings up ex 12, page 6 shows part of Mesa PD policy on how to impound a computer. #JodiArias

Wonder what year this policy is from?
 
From WAT:

Wild About Trial @WildAboutTrial · 7s 8 seconds ago


Page 6 shows the guidelines on how to impound computers. All officers should be familiar with this explains Willmott. #JodiArias


Wild About Trial @WildAboutTrial · 11s 11 seconds ago

1) secure area around cpu

2) do not turn cpu on/off, attempt to open/close files, run directories, access cpu diskettes/cd/dvd #JodiArias
 
From WAT:

Wild About Trial @WildAboutTrial · 47s 47 seconds ago

Willmott is auto tuning. "So you didn't know that?" was so high pitched it was almost inaudible. #JodiArias


Wild About Trial @WildAboutTrial · 6s 6 seconds ago

Willmott brings up ex 12, page 6 shows part of Mesa PD policy on how to impound a computer. #JodiArias

How many times have policies changed is the last 6 years??
 
I hope Juan goes after BN for manipulating evidence....or intent to deceive....can he do that? Especially since BN called Juan a liar, an expert witness that tries to deceive court should be put out of business....imo

He's a private businessman, so anyone who doesn't do a background check on him or doesn't care is free to hire him. I'm sure he's really good with audio and video files. I mean, he did a good job enhancing the eye photo--people just disagreed whether it showed anything important.
 
Michael Kiefer ‏@michaelbkiefer · 27s27 seconds ago
The policy clearly says to secure the area and not to turn computers on or off or open files or access registries or discs.
 
Jen's Trial Diaries ‏@TrialDiariesJ · 30s31 seconds ago
POLICY:
Computers- Secure the area around computer. Do not turn on/off attempt to opne/close files, run directories...cont.....#jodiarias
 
Ok, gang, the defense and BN had 3, count 'em, at least 3 chances to turn over the original mirror image they supposedly made.

If I were JSS, I'd say, at the end of the day, that the DT had not made their case and refuse the defense one more chance to turn over the real deal, if they even have it.

IIRC, Neumeister testified that there was no incinerator on the drive???

I don't understand a whole lot, but I do get that the defense is really trying hard to get one over on the judge.

Also, I wonder if Wilmott is off somewhere in the courthouse chit-chatting with BN asking, "What the He** do I ask now?"

BBM

Not only did he testify there was no incinerator on the drive, He mocked Juan, and said there was NO SUCH PROGRAM AS INCINERATER, and tried to make Juan look stupid for even making that claim.
 
Woo Hoo! Testimony that Verizon didn't have sim cards!

They still don't. CDMA networks, which VZW runs on, don't use SIM cards. That's not a good thing, btw, it just is what it is. GSM networks, like what AT&T run on, do use SIM cards.
 
Michael Kiefer ‏@michaelbkiefer · 27s27 seconds ago
The policy clearly says to secure the area and not to turn computers on or off or open files or access registries or discs.

He didn't do any of those things. He woke it up.
 
Jen's Trial Diaries ‏@TrialDiariesJ · 34s35 seconds ago
COMPUTER POLICY- or access computer diskettes, CD, DVD's or any other storage device #jodiarias #3tvarias
 
They still don't. CDMA networks, which VZW runs on, don't use SIM cards. That's not a good thing, btw, it just is what it is. GSM networks, like what AT&T run on, do use SIM cards.

It is a good thing because the defense can't accuse the state of removing SIM cards the phone never had.
 
From WAT:

Wild About Trial @WildAboutTrial · now


Smith: There are reasons to waken a CPU from sleep at a crime scene.

He did it once without a writeblocker. #JodiArias
 
From WAT:

Wild About Trial @WildAboutTrial · now


Smith: There are reasons to waken a CPU from sleep at a crime scene.

He did it once without a writeblocker. #JodiArias



Wild About Trial @WildAboutTrial · 7s 7 seconds ago


Willmott wants to know if Smith wants to add "It can be woken up out of sleep" to the guidelines.

Smith says "yes" lol. #JodiArias
 
I think it's the opposite lin. A clone is what is needed, it is an exact copy of a hard drive. So you have two hard drives that are exactly the same. An image is just compressed image of the hard drive on a Zip file. I don't think it's proper for forensic purposes.

Oh ok, I thought the image was the compressed files and the copy was the clone.

http://www.pcworld.com/article/2029832/backing-up-your-entire-drive-cloning-vs-imaging.html

So what did BN give Juan? Because it sounds like something the expert cannot accurately work with?

He copied the drive, he cloned it. It still had active files on it, which he modified and then tried to submit to JM as acceptable files. Anything other than a write protected image copy, especially on w/ any modification removes the ability of the different forensic people to compare 2014 status of the drive bit by bit with the original image copy that was made in 2008. Forensic image copies are like the ones used in the first trial by Melendez and Dworkin - they used EnCase. Here's a little description that might help that compares an image to a copy (although what BN did is not probably close to "forensically sound" copy):

In contrast, a forensically-sound copy of user data is not nearly as comprehensive as a full forensic image of a hard drive. Instead, a forensically sound copy of a particular set of data faithfully transfers the active data (meaning files that are still resident on the disk) for selected files, bit by bit, from the source, without altering each file’s modified, accessed or created dates. Often, forensically-sound copies are limited to the user's home directory contents – in particular, files that you could actually see if you sat down and the computer and browsed through the files in the user’s account. If the user deleted something the day before, you would not capture any of the data from the deleted file. With a full forensic image, you would very likely capture some or all of that “deleted” data.

The advantages of a full forensic image are probably obvious: the parties are guaranteed to have at their disposal every piece of information that exists on the subject device, even if the information is disguised, obfuscated, corrupted, wholly or partly deleted, stored in nonstandard ways or locations, or is otherwise difficult to analyze. Such a collection also provides forensic analysts with the “breadcrumbs and fingerprints” that are left behind by certain activities, such as browser cache and history files, which may be material to the litigants.
 
Status
Not open for further replies.

Staff online

Members online

Online statistics

Members online
123
Guests online
209
Total visitors
332

Forum statistics

Threads
608,994
Messages
18,248,274
Members
234,522
Latest member
dolljess
Back
Top