Juan is not doing rebuttal right now. He is presenting the State's case on mitigation issues. Next up is the defense rebuttal case. JSS has no authority to deny that option. If there is any surrebuttal in this phase it will be Juan asking for it, not the defense. It's confusing because Juan presented some evidence before this phase really got started, to get the jury caught up on the premeditation and cruelty issues.
From AZ Lawyer
http://www.websleuths.com/forums/sh...-of-Jodi-Arias-Day-34&p=11484600#post11484600 thread day 34, post #1354
Now, for the sake of argument, what if like everything else IT, this long winded, multi texted message WAS from a computer, say like CMJA logged into TA's FB, MS accounts and texted a message from that account?
EVERYTHING has a path on the computer or cell phones (or whatever they're called now days). Images have coded GPS in their pixels as to where the pic was taken (time, date, and all that).
I would imagine the "Texts" were coded to the IP address source that they came from. If it didn't come from TA's IP addy or his phone..............then where did it come from?
And we KNOW that CMJA destroyed her laptop. There has to be a way for techs to know what her IP addy (source)was before it was destroyed just from emails to TA's computer from her.
You can do this to any email message, right click the header (not the actual email)
and it will give you "properties" at the bottom, click it and you get this:
Then click the message source option at the bottom:
This email came from Evie using her cell phone.........and all of her phone's identifiers.
This is simple computer stuff you learn back in the 1990's to identify spam or malicious contents. I imagine techs can do the exact same things with texts on phones.
PSS: I still don't know why no one has analyzed the "properties" of DB's junk pic.........that's a slam/dunk, if it doesn't go back to DB's phone, it would go back to CMJA's laptop or phone (probably why she "lost" it the first time around.