State v Bradley Cooper 4-28-2011

DNA Solves
DNA Solves
DNA Solves
Status
Not open for further replies.
Nice!

Gessner warning Boz (without saying it) that his rebuttal will let this witness in with a FISH FRY ANALOGY! AWESOME!
 
Would/could this have been BC?

Only if LE had connected his computer to the network or a WiFi hot-spot while it was in their custody; which I suppose is possible if they turned it on without disabling the WiFi radio in the presence of an unsecured hot-spot.

Which is why LE should NEVER even turn on a computer they have seized. The drive should be removed, connected to a write-blocker, imaged, hashed and placed in a sealed evidence bag. All forensic examination should be conducted on the copied image.

The hash is so that they can go back at anytime and verify that the hash of the original drive is the same before it was sealed in the bag as after and that any copied images have the same hash after being created to show that any examination has been started from the same point.
 
Nice!

Gessner warning Boz (without saying it) that his rebuttal will let this witness in with a FISH FRY ANALOGY! AWESOME!

I guess JG tipping his hand a little bit that there may be no evidence upon which the State can offer rebuttal, at least in regards to cisco stuff.
 
Gessner warning Boz (without saying it) that his rebuttal will let this witness in with a FISH FRY ANALOGY! AWESOME![/QUOTE]

Please elaborate.
 
I guess JG tipping his hand a little bit that there may be no evidence upon which the State can offer rebuttal, at least in regards to cisco stuff.

Curious to me that Kurtz said it's not the state's fault they haven't gotten it from Cisco.
 
Well, I had a 25 minute phone call and missed the last of the defense's direct and all of the state's cross of this witness.
So, somebody tampered with the computer but we still don't know how or who?
 
Only if LE had connected his computer to the network or a WiFi hot-spot while it was in their custody; which I suppose is possible if they turned it on without disabling the WiFi radio in the presence of an unsecured hot-spot.

Which is why LE should NEVER even turn on a computer they have seized. The drive should be removed, connected to a write-blocker, imaged, hashed and placed in a sealed evidence bag. All forensic examination should be conducted on the copied image.

The hash is so that they can go back at anytime and verify that the hash of the original drive is the same before it was sealed in the bag as after and that any copied images have the same hash after being created to show that any examination has been started from the same point.


I was under the impression it was left on, not that they turned it on. Does anyone know?
 
Explain it for the 1,000th time, judge. Good!! Denied!! Yesssssss

If there is potential evidence/testimony that important in determining guilt or innocence, you should want that admitted.
 
I guess JG tipping his hand a little bit that there may be no evidence upon which the State can offer rebuttal, at least in regards to cisco stuff.

The could rebutt the size of a router that accepts an fxo card since there is apparently a smaller one that was MD'd in 2008.
 
Only if LE had connected his computer to the network or a WiFi hot-spot while it was in their custody; which I suppose is possible if they turned it on without disabling the WiFi radio in the presence of an unsecured hot-spot.

Which is why LE should NEVER even turn on a computer they have seized. The drive should be removed, connected to a write-blocker, imaged, hashed and placed in a sealed evidence bag. All forensic examination should be conducted on the copied image.

The hash is so that they can go back at anytime and verify that the hash of the original drive is the same before it was sealed in the bag as after and that any copied images have the same hash after being created to show that any examination has been started from the same point.

It would depend on when the tampering occured. The computer was deemed in the custody of the police the moment the search warrant was executed on the house. The computer remained powered up and on the network until the detective(s) unplugged it and removed the battery. If the tampering occured after the house was seized but before the computer was powered down, it could still have been Brad. MOO
 
Well, I had a 25 minute phone call and missed the last of the defense's direct and all of the state's cross of this witness.
So, somebody tampered with the computer but we still don't know how or who?

Yes, it appears so.
 
If there is potential evidence/testimony that important in determining guilt or innocence, you should want that admitted.

Only if you care more about getting to the truth than getting to a guilty verdict.
 
Gessner warning Boz (without saying it) that his rebuttal will let this witness in with a FISH FRY ANALOGY! AWESOME!

Please elaborate.[/QUOTE]

he told Kurtz that the motion was premature (to enter this witness under his discretion and reconsideration) because they may have other fish to fry.

(The witness made it extremely clear that the examination was continuing i.e. get to the bottom of it whether he went on the stand or not and seemed to be more on the lines of getting to some manner of truth, as opposed to Boz who is taking FULL ADVANTAGE of the newness of the technology)

Basically, Boz was talking out of both sides of his mouth.

One side says: I need to get this last piece in or it will prejudice the state.

The other says: He can't get a new guy in, my guys were on the list. Not my fault this technology is new and we've had three years to do this.
 
Status
Not open for further replies.

Members online

Online statistics

Members online
64
Guests online
1,782
Total visitors
1,846

Forum statistics

Threads
602,089
Messages
18,134,539
Members
231,231
Latest member
timbo1966
Back
Top