Your SlideShare is downloading. ×
The Cybercrime Trial Abigail Abraham Assistant State Attorney Cook County, Illinois Ivan Orton Sr. Deputy Prosecuting Atto...
What’s Different about a Cybercrime Trial <ul><li>Complexity </li></ul><ul><li>Digital Evidence Issues </li></ul>
As With Any Trial, Keys Are: <ul><li>Understanding Your Case </li></ul><ul><li>Preparing Your Case </li></ul><ul><li>Prese...
Understanding Your Case <ul><li>You MUST  Educate Yourself </li></ul><ul><ul><li>But Only About What You Must Understand <...
Understanding Your Case <ul><li>Use Your Resources </li></ul><ul><ul><li>Other Prosecutors </li></ul></ul><ul><ul><li>Offi...
Understanding Your Case <ul><li>The Crime Charged </li></ul><ul><ul><li>Should you  Amend? </li></ul></ul><ul><li>The Lega...
Understanding Your Case <ul><li>What do you have to Prove/Disprove </li></ul><ul><ul><li>Do you have to disprove all alter...
Understanding Your Case <ul><li>S hare your understanding with your trial team (investigator, forensic person, crucial wit...
Preparing Your Case <ul><li>Remember </li></ul><ul><ul><li>Judge/Jury/Defense Understanding Varies Widely </li></ul></ul><...
Preparing Your Case <ul><li>Education </li></ul><ul><li>Expert Witness/Scientific Method </li></ul><ul><li>Problem Areas <...
Preparing Your Case - Education <ul><li>Educate Your Audie nce at Every Stage </li></ul><ul><ul><li>Voir Dire </li></ul></...
Preparing Your Case - Education <ul><li>Keep it Simple  - don’t overexplain </li></ul><ul><ul><li>Case in Chief v. Cross E...
Preparing Your Case - Education We're using age old methods of reasoning trying to evaluate an unfamiliar situation by fin...
Preparing Your Case - Expert Witness <ul><li>Do You Need an Expert (Opinion Witness) </li></ul>
Preparing Your Case - Expert Witness <ul><li>Your Witness Testifies: </li></ul><ul><ul><li>Made F orensic Image </li></ul>...
Preparing Your Case - Expert Witness <ul><li>Which of these Required Expert Witness Testimony  </li></ul><ul><li>Which Req...
Preparing Your Case - Expert Witness <ul><li>Expert Witness  - witness qualified as an expert may give an opinion </li></u...
Preparing Your Case - Expert Witness <ul><li>Your Witness Testifies: </li></ul><ul><ul><li>Made F orensic Image </li></ul>...
Preparing Your Case - Expert Witness <ul><li>Don’t Confuse Expert Testimony with Expert  WITNESS  Testimony </li></ul><ul>...
Preparing Your Case - Scientific Method <ul><li>Evidence Based on Scientific Method Doesn’t Always Have to be Qualified </...
Preparing Your Case - Expert/Scientific Method <ul><li>Effect of “Best Practices” Manuals </li></ul><ul><ul><li>In  Russia...
Preparing Your Case - Expert Witness <ul><li>Preparing Your Expert </li></ul><ul><li>No Real Difference in Cyber Case From...
Preparing Your Case - Problem Areas <ul><li>Tying Defendant to Keyboard </li></ul><ul><li>Defendant’s Knowledge/Motive </l...
Preparing Your Case - Problem Areas <ul><li>Tying Defendant to Keyboard </li></ul><ul><ul><li>Confession/Admission </li></...
June 30, 1999 - 8 Minutes Later <ul><ul><li>From: [email_address] To: [email_address] Subject: Hideho... Date:  Wednesday,...
Preparing Your Case - Problem Areas <ul><li>Defendant’s Knowledge/Intent </li></ul><ul><li>Defendant claims ignorance of c...
Preparing Your Case - Problem Areas <ul><li>Number of Pictures </li></ul><ul><li>Directory Structure </li></ul><ul><li>Fil...
Preparing Your Case - Problem Areas <ul><li>Time and Date Stamps </li></ul>
Preparing Your Case - Problem Areas <ul><li>Windows Files have 3 Dates/Times: </li></ul><ul><ul><li>Create Date </li></ul>...
Preparing Your Case - Problem Areas <ul><li>Date/Time Stamps - Limitations </li></ul><ul><ul><li>Depends on accuracy of in...
Preparing Your Case - Problem Areas <ul><li>Date/Time Stamps - Ways to Check </li></ul><ul><ul><li>Internal file accuracy ...
Preparing Your Case - Problem Areas <ul><li>Date/Time Stamps - Ways to Check </li></ul><ul><ul><li>If computer is attached...
Preparing Your Case - Problem Areas <ul><li>Forensic Report </li></ul><ul><li>Abigail Example </li></ul>
Preparing Your Case - Jury Instructions <ul><li>Do Pattern Jury Instructions Exist? </li></ul><ul><ul><li>If not, can you ...
Presenting Your Case <ul><li>Voir Dire </li></ul><ul><li>Explaining Complicated or Technological Issues </li></ul><ul><li>...
Presenting Your Case-Voir Dire <ul><li>Know your audience—what is their knowledge of computers?  </li></ul><ul><li>Educate...
<ul><li>“ Do you own a computer?” </li></ul><ul><li>“ Is your home computer a Macintosh or IBM compatible” </li></ul><ul><...
<ul><li>“ If a person enters a chatroom, are they ‘assuming the risk?’” </li></ul><ul><li>“ Do you think that pursuing a p...
<ul><li>A little younger, but not too young. </li></ul><ul><li>A little more educated, but not too academic. </li></ul><ul...
Presenting Your Case-Voir Dire   Not All Cybercases Are the Same <ul><li>Trade secret theft </li></ul><ul><li>Child porn/e...
Voir Dire – Child Exploits/Porn <ul><li>It’s OK to have strong feeling about the sexual exploitation of children, but does...
Voir Dire – Fraud/Identity Theft  <ul><li>Victimization – Self/Friend/Family </li></ul><ul><li>Media Attention – Read/Hear...
Voir Dire – Hacking/Intrusion <ul><li>Does anyone have an image in their mind when I use the term “Hacker.” </li></ul><ul>...
Voir Dire - Piracy <ul><li>Does anyone think there’s a difference between making one copy of a movie/cd/tape for a friend ...
Voir Dire – Trade Secrets <ul><li>Does anyone feel a company can’t be a victim? </li></ul><ul><li>Has anyone ever had the ...
Presenting Your Case - Complicated/Technical Issues 1. Have a very simple analogy 2. Have a uncomplicated correct definiti...
<ul><li>6.  Link  your technology to something jurors do on their computers.  </li></ul><ul><li>7.  Link  your definition,...
<ul><li>Charts, Diagrams, Pictures </li></ul>Presenting Your Case - Presentation Tools
<ul><li>Animation </li></ul>Presenting Your Case - Presentation Tools
<ul><li>Animation Used to Show How Things Work  </li></ul><ul><ul><li>Power Point Example </li></ul></ul>Presenting Your C...
Hard Drive File Allocation Table Storage Area CLUSTER 1 Unallocated FILE STORAGE CLUSTER 2 Unallocated CLUSTER 3 Unallocat...
Hard Drive File Allocation Table Storage Area FILE   DELETE CLUSTER 3 Unallocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. ...
Hard Drive File Allocation Table Storage Area FILE   DELETE CLUSTER 3 Unallocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. ...
INFO Hard Drive Download DC01.jpg 10,555 Bytes 5/5/99 1:22 p.m. Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. Recycle INFO (Down...
Hard Drive Download DC01.jpg 10,555 Bytes 5/5/99 1:22 p.m. INFO (DownloadImage.jpg) Recycle RECOVER RECYCLE BIN RECOVER ? ...
<ul><li>Animation Used to Show How Things Work  </li></ul><ul><ul><li>MPEG Example </li></ul></ul>Presenting Your Case - P...
<ul><li>Imaginate </li></ul><ul><li>example </li></ul>Presenting Your Case - Presentation Tools
<ul><li>Live vs. Recorded Demonstrations </li></ul><ul><ul><li>Murphy’s Law </li></ul></ul><ul><ul><li>Data may not look t...
<ul><li>Many Issues we Used to Worry About are Settled </li></ul><ul><li>See US DOJ Guidelines for More Detailed Discussio...
<ul><li>Business Records - Fed R. Evid. 803(6) </li></ul><ul><ul><li>Computer Generated (admissible) </li></ul></ul><ul><u...
<ul><li>Hearsay </li></ul><ul><ul><li>If computer records reflect only computer generated data, no hearsay </li></ul></ul>...
<ul><li>Abigail Abraham, Assistant State Attorney Cook County, Illinois  </li></ul><ul><li>[email_address] </li></ul><ul><...
Upcoming SlideShare
Loading in...5
×

CyberCrime

1,378

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,378
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "CyberCrime"

  1. 1. The Cybercrime Trial Abigail Abraham Assistant State Attorney Cook County, Illinois Ivan Orton Sr. Deputy Prosecuting Attorney King County, Washington
  2. 2. What’s Different about a Cybercrime Trial <ul><li>Complexity </li></ul><ul><li>Digital Evidence Issues </li></ul>
  3. 3. As With Any Trial, Keys Are: <ul><li>Understanding Your Case </li></ul><ul><li>Preparing Your Case </li></ul><ul><li>Presenting Your Case </li></ul>
  4. 4. Understanding Your Case <ul><li>You MUST Educate Yourself </li></ul><ul><ul><li>But Only About What You Must Understand </li></ul></ul><ul><li>Endless Task </li></ul><ul><li>Training and Experience </li></ul>
  5. 5. Understanding Your Case <ul><li>Use Your Resources </li></ul><ul><ul><li>Other Prosecutors </li></ul></ul><ul><ul><li>Office Computer Personnel </li></ul></ul><ul><ul><li>Investigator/Forensic Expert </li></ul></ul><ul><ul><li>Witnesses (ISP, Victim, etc.) </li></ul></ul><ul><ul><li>Digital DA and other online sources </li></ul></ul>
  6. 6. Understanding Your Case <ul><li>The Crime Charged </li></ul><ul><ul><li>Should you Amend? </li></ul></ul><ul><li>The Legal T heory </li></ul><ul><li>The Evidence </li></ul><ul><li>Anticipating Defenses </li></ul>
  7. 7. Understanding Your Case <ul><li>What do you have to Prove/Disprove </li></ul><ul><ul><li>Do you have to disprove all alternative explanations </li></ul></ul><ul><ul><li>Can you disprove all alternative explanations </li></ul></ul><ul><ul><li>Nature of computer “incidents” </li></ul></ul>
  8. 8. Understanding Your Case <ul><li>S hare your understanding with your trial team (investigator, forensic person, crucial witnesses) to get their input </li></ul>
  9. 9. Preparing Your Case <ul><li>Remember </li></ul><ul><ul><li>Judge/Jury/Defense Understanding Varies Widely </li></ul></ul><ul><ul><li>You Must Be a Teacher </li></ul></ul><ul><ul><li>Law is Settling Down but . . . </li></ul></ul><ul><ul><li>Technology is double edged </li></ul></ul>
  10. 10. Preparing Your Case <ul><li>Education </li></ul><ul><li>Expert Witness/Scientific Method </li></ul><ul><li>Problem Areas </li></ul><ul><li>Jury Instructions </li></ul>
  11. 11. Preparing Your Case - Education <ul><li>Educate Your Audie nce at Every Stage </li></ul><ul><ul><li>Voir Dire </li></ul></ul><ul><ul><li>Opening </li></ul></ul><ul><ul><li>Every Witness </li></ul></ul><ul><ul><li>Closing </li></ul></ul><ul><ul><li>Objections </li></ul></ul>
  12. 12. Preparing Your Case - Education <ul><li>Keep it Simple - don’t overexplain </li></ul><ul><ul><li>Case in Chief v. Cross Ex and Rebuttal </li></ul></ul><ul><li>Let Defense make it complex </li></ul><ul><li>Use Analogies but . . . </li></ul>
  13. 13. Preparing Your Case - Education We're using age old methods of reasoning trying to evaluate an unfamiliar situation by finding analogy to a familiar one. But applied to the web the analogies get so complex that the familiar turns into the unfamiliar. To make the situation accurate you have to make it so weird that it doesn't help us figure things out. David Weinberger , Commentator on All Things Considered
  14. 14. Preparing Your Case - Expert Witness <ul><li>Do You Need an Expert (Opinion Witness) </li></ul>
  15. 15. Preparing Your Case - Expert Witness <ul><li>Your Witness Testifies: </li></ul><ul><ul><li>Made F orensic Image </li></ul></ul><ul><ul><li>Examined the Drives </li></ul></ul><ul><ul><li>What Found on Drives </li></ul></ul><ul><ul><li>What this Means </li></ul></ul>
  16. 16. Preparing Your Case - Expert Witness <ul><li>Which of these Required Expert Witness Testimony </li></ul><ul><li>Which Required Admission of Scientific Evidence </li></ul>
  17. 17. Preparing Your Case - Expert Witness <ul><li>Expert Witness - witness qualified as an expert may give an opinion </li></ul><ul><li>Results of a Scientific Method - In Federal system and many states, Judge must be convinced results of scientific method will be useful </li></ul><ul><li>In some states method must be generally accepted by peer community </li></ul>
  18. 18. Preparing Your Case - Expert Witness <ul><li>Your Witness Testifies: </li></ul><ul><ul><li>Made F orensic Image </li></ul></ul><ul><ul><li>Examined the Drives </li></ul></ul><ul><ul><li>What Found on Drives </li></ul></ul><ul><ul><li>What this Means </li></ul></ul>
  19. 19. Preparing Your Case - Expert Witness <ul><li>Don’t Confuse Expert Testimony with Expert WITNESS Testimony </li></ul><ul><ul><li>Witness can be shown to be highly qualified as a way of increasing her/his credibility </li></ul></ul><ul><ul><li>So long as not seeking to give opinion, don’t have to qualify as expert witness </li></ul></ul>
  20. 20. Preparing Your Case - Scientific Method <ul><li>Evidence Based on Scientific Method Doesn’t Always Have to be Qualified </li></ul><ul><ul><li>Jury is shown p icture t aken by 7-11 c amera to c ompare to d efendant </li></ul></ul><ul><ul><li>No need to qualify photography as a scientific method </li></ul></ul><ul><ul><li>Will need to authenticate/lay foundation </li></ul></ul><ul><ul><li>Only if expert is giving an opinion based on scientific method evidence must evidence be qualified </li></ul></ul>
  21. 21. Preparing Your Case - Expert/Scientific Method <ul><li>Effect of “Best Practices” Manuals </li></ul><ul><ul><li>In Russian Hacker case FBI agent quizzed by defense attorney on not following DOJ Computer Search and Seizure Manual </li></ul></ul>
  22. 22. Preparing Your Case - Expert Witness <ul><li>Preparing Your Expert </li></ul><ul><li>No Real Difference in Cyber Case From Any Other Case Involving Expert </li></ul><ul><ul><li>Don’t Overstate </li></ul></ul><ul><ul><li>Keep Things Simple </li></ul></ul><ul><ul><li>Don’t Argue with Defense Attorney </li></ul></ul><ul><ul><ul><li>“ Isn’t it true that . . . ?| </li></ul></ul></ul><ul><ul><ul><li>“ Yes, and I can explain my answer if you’d like.” </li></ul></ul></ul>
  23. 23. Preparing Your Case - Problem Areas <ul><li>Tying Defendant to Keyboard </li></ul><ul><li>Defendant’s Knowledge/Motive </li></ul><ul><li>Time and Date Stamps </li></ul><ul><li>Forensic Report </li></ul>
  24. 24. Preparing Your Case - Problem Areas <ul><li>Tying Defendant to Keyboard </li></ul><ul><ul><li>Confession/Admission </li></ul></ul><ul><ul><li>Circumstantial (only resident at computer location) </li></ul></ul><ul><ul><li>Substantive knowledge unique to defendant </li></ul></ul><ul><ul><li>Content analysis </li></ul></ul>
  25. 25. June 30, 1999 - 8 Minutes Later <ul><ul><li>From: [email_address] To: [email_address] Subject: Hideho... Date: Wednesday, June 30, 1999 2:23 PM </li></ul></ul><ul><ul><li>Hideho....dear Marni....how're you today....did you sleep well...I bet you didn't...unfortunately...one of my spies told me you'll have a opening training camp next Monday in Toronto...so I'll have more women to either fuck or destory ...Michelle Stilwell, huh....I love quadraplagia girls...amputees like Chantal Benoit is also a perfect choice....so you may survive...now I realize compare to the same level, Shira Golden is more attractive to me than you do...I switched my airplane ticket...I'll fly directly to Toronto instead of Vancouver...See ya next Monday...Hideho..have a nice day and keep a good shape... </li></ul></ul><ul><ul><li>PARALYZED WOMEN KILLER FROM HONG KONG 7-1-99 </li></ul></ul>destory
  26. 26. Preparing Your Case - Problem Areas <ul><li>Defendant’s Knowledge/Intent </li></ul><ul><li>Defendant claims ignorance of child porn found on his computer. </li></ul><ul><li>How can you overcome claim of ignorance? </li></ul>
  27. 27. Preparing Your Case - Problem Areas <ul><li>Number of Pictures </li></ul><ul><li>Directory Structure </li></ul><ul><li>File Names </li></ul><ul><li>News Group Subscriptions </li></ul><ul><li>History Files </li></ul>
  28. 28. Preparing Your Case - Problem Areas <ul><li>Time and Date Stamps </li></ul>
  29. 29. Preparing Your Case - Problem Areas <ul><li>Windows Files have 3 Dates/Times: </li></ul><ul><ul><li>Create Date </li></ul></ul><ul><ul><ul><li>When the file was created at the current location </li></ul></ul></ul><ul><ul><ul><li>When the file was moved/copied to current location </li></ul></ul></ul><ul><ul><li>Last Written/Modified Date </li></ul></ul><ul><ul><ul><li>When the file was last changed (includes created) </li></ul></ul></ul><ul><ul><ul><li>Does not change when file is moved/copied </li></ul></ul></ul><ul><ul><ul><li>Is reset when a file is downloaded </li></ul></ul></ul><ul><ul><li>Last Accessed Date </li></ul></ul><ul><ul><ul><li>When file was last accessed </li></ul></ul></ul>
  30. 30. Preparing Your Case - Problem Areas <ul><li>Date/Time Stamps - Limitations </li></ul><ul><ul><li>Depends on accuracy of internal clock </li></ul></ul><ul><ul><li>What time zone </li></ul></ul><ul><ul><li>Can be manipulated </li></ul></ul>
  31. 31. Preparing Your Case - Problem Areas <ul><li>Date/Time Stamps - Ways to Check </li></ul><ul><ul><li>Internal file accuracy (date stamp consistent with date inside file) </li></ul></ul><ul><ul><li>E-mail header date/time compared to date/time assigned by system </li></ul></ul><ul><ul><li>Compare known date/time to system date/time (Do you know independently when file was downloaded) </li></ul></ul>
  32. 32. Preparing Your Case - Problem Areas <ul><li>Date/Time Stamps - Ways to Check </li></ul><ul><ul><li>If computer is attached to network, does server set clock on login </li></ul></ul><ul><ul><li>Patterns of file creation dates/times </li></ul></ul><ul><ul><ul><li>If any created after computer was seized you MUST explain </li></ul></ul></ul><ul><ul><li>Experiment </li></ul></ul><ul><ul><ul><li>Using suspect’s computer </li></ul></ul></ul><ul><ul><ul><li>NOT original hard drive </li></ul></ul></ul>
  33. 33. Preparing Your Case - Problem Areas <ul><li>Forensic Report </li></ul><ul><li>Abigail Example </li></ul>
  34. 34. Preparing Your Case - Jury Instructions <ul><li>Do Pattern Jury Instructions Exist? </li></ul><ul><ul><li>If not, can you draw on analogous areas (burglary law for computer trespass) </li></ul></ul><ul><li>Special Terms need Definitions? </li></ul>
  35. 35. Presenting Your Case <ul><li>Voir Dire </li></ul><ul><li>Explaining Complicated or Technological Issues </li></ul><ul><li>Presentation Tools </li></ul><ul><li>Digital Evidence Admissibility Issues </li></ul>
  36. 36. Presenting Your Case-Voir Dire <ul><li>Know your audience—what is their knowledge of computers? </li></ul><ul><li>Educate the jury, but keep it simple </li></ul><ul><li>Are jury questionnaires permitted by the Judge? </li></ul><ul><li>Focus on jurors feeling of whether computer crime is really “crime.” </li></ul><ul><li>Consider questions weeding out those that think the victim may be at fault or should “ignore it.” </li></ul>
  37. 37. <ul><li>“ Do you own a computer?” </li></ul><ul><li>“ Is your home computer a Macintosh or IBM compatible” </li></ul><ul><li>“ How familiar are you with computers” </li></ul><ul><li>“ Does your job entail working with computers?” </li></ul><ul><li>“ Do you access the Internet?” “For what purpose?” </li></ul><ul><li>“ Have you ever used e-mail? Chatrooms? Instant messenger?” </li></ul>Presenting Your Case-Voir Dire
  38. 38. <ul><li>“ If a person enters a chatroom, are they ‘assuming the risk?’” </li></ul><ul><li>“ Do you think that pursuing a person in a chatroom is a part of ‘Web/Net culture?’” </li></ul><ul><li>“ If someone is being harassed by e-mail, should they just not turn the computer on or ignore it?” </li></ul><ul><li>“ Does anyone believe that pursuing someone or harassing someone on the internet is not a matter that should be criminal in nature” </li></ul>Presenting Your Case-Voir Dire
  39. 39. <ul><li>A little younger, but not too young. </li></ul><ul><li>A little more educated, but not too academic. </li></ul><ul><li>A little technical knowledge, but not enough to second guess your witnesses. </li></ul><ul><li>Beyond that jurors for the different types of tech cases should follow the profile for the same type of case if their was no tech element. </li></ul>Presenting Your Case-Voir Dire What Jury Do You Want
  40. 40. Presenting Your Case-Voir Dire Not All Cybercases Are the Same <ul><li>Trade secret theft </li></ul><ul><li>Child porn/exploitation </li></ul><ul><li>Hacking </li></ul><ul><li>Fraud </li></ul><ul><li>Component theft </li></ul><ul><li>Piracy </li></ul><ul><li>Cyberstalking </li></ul>
  41. 41. Voir Dire – Child Exploits/Porn <ul><li>It’s OK to have strong feeling about the sexual exploitation of children, but does anybody feel the subject matter alone would make it impossible for them to be fair? </li></ul><ul><li>Have you, a relative, or a close friend ever been sexually victimized? (instruct them they need not answer in open court) </li></ul><ul><li>Will anyone find it impossible to view graphic sexual images of young children? </li></ul><ul><li>Does anyone disagree with the laws prohibiting sexual activity between adults and children? </li></ul>
  42. 42. Voir Dire – Fraud/Identity Theft <ul><li>Victimization – Self/Friend/Family </li></ul><ul><li>Media Attention – Read/Heard/Seen </li></ul><ul><li>Precautions They Take (May expect your victim to do nothing less) </li></ul><ul><li>Assumption of the Risk </li></ul><ul><ul><li>When might you hold the victim to blame for being ripped off? </li></ul></ul><ul><ul><li>Does a victim’s carelessness or naiveté ever justify stealing from them? </li></ul></ul>
  43. 43. Voir Dire – Hacking/Intrusion <ul><li>Does anyone have an image in their mind when I use the term “Hacker.” </li></ul><ul><li>Has anyone experienced the damage that can be caused by a computer virus. (describe it) </li></ul><ul><li>Does anyone here keep personal information on their computer? </li></ul><ul><li>Is their anyone here uncomfortable with the idea of someone having uncontrolled access to your personal information ? </li></ul><ul><li>Should a victim be required to take steps to prevent an intentional intrusion? </li></ul>
  44. 44. Voir Dire - Piracy <ul><li>Does anyone think there’s a difference between making one copy of a movie/cd/tape for a friend and making a hundred to sell at the flea market? </li></ul><ul><li>Where’s the line between fair use and theft? </li></ul><ul><li>Does anyone have strong feelings about the movie/music/software industries business, pricing, or distribution practices? </li></ul><ul><li>Has anyone seen media for sale they thought might be counterfeit? Describe the situation? What alerted you? </li></ul>
  45. 45. Voir Dire – Trade Secrets <ul><li>Does anyone feel a company can’t be a victim? </li></ul><ul><li>Has anyone ever had the experience of having someone else steal their idea or take credit for their work? </li></ul><ul><li>Can anyone give an example of an idea that was worth lots of money? </li></ul><ul><li>Can anyone give an example of something that’s only valuable if it’s secret? </li></ul>
  46. 46. Presenting Your Case - Complicated/Technical Issues 1. Have a very simple analogy 2. Have a uncomplicated correct definition 3. Find/develop a picture/drawing of what your technology “looks like”. 4. Have a credible expert explain technology using all above #1, #2, #3. 5. Have your expert use that picture/drawing.
  47. 47. <ul><li>6. Link your technology to something jurors do on their computers. </li></ul><ul><li>7. Link your definition, as it is explained, to what the defendant DID. </li></ul><ul><li>8. Repeatedly, again and again USE YOUR PICTURE of the technology. </li></ul><ul><li>9. No overkill; the more time you spend, you may confuse or open doors </li></ul><ul><li>10. Try your analogy, definition and pictures out on experts and lay people. </li></ul>Presenting Your Case - Complicated/Technical Issues
  48. 48. <ul><li>Charts, Diagrams, Pictures </li></ul>Presenting Your Case - Presentation Tools
  49. 49. <ul><li>Animation </li></ul>Presenting Your Case - Presentation Tools
  50. 50. <ul><li>Animation Used to Show How Things Work </li></ul><ul><ul><li>Power Point Example </li></ul></ul>Presenting Your Case - Presentation Tools
  51. 51. Hard Drive File Allocation Table Storage Area CLUSTER 1 Unallocated FILE STORAGE CLUSTER 2 Unallocated CLUSTER 3 Unallocated CLUSTER 1 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - CLUSTER 2 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2
  52. 52. Hard Drive File Allocation Table Storage Area FILE DELETE CLUSTER 3 Unallocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - CLUSTER 2 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2 CLUSTER 1 Allocated
  53. 53. Hard Drive File Allocation Table Storage Area FILE DELETE CLUSTER 3 Unallocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - CLUSTER 2 Allocated Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2 CLUSTER 1 Allocated CLUSTER 1 Unallocated CLUSTER 2 Unallocated ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2 ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m. - Clusters 1+2
  54. 54. INFO Hard Drive Download DC01.jpg 10,555 Bytes 5/5/99 1:22 p.m. Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. Recycle INFO (DownloadImage.jpg) DELETE RECYCLE BIN DELETE ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m.
  55. 55. Hard Drive Download DC01.jpg 10,555 Bytes 5/5/99 1:22 p.m. INFO (DownloadImage.jpg) Recycle RECOVER RECYCLE BIN RECOVER ? mage.jpg 10,555 Bytes 5/5/99 1:22 p.m. Image.jpg 10,555 Bytes 5/5/99 1:22 p.m. ? C01.jpg 10,555 Bytes 5/5/99 1:22 p.m. INFO
  56. 56. <ul><li>Animation Used to Show How Things Work </li></ul><ul><ul><li>MPEG Example </li></ul></ul>Presenting Your Case - Presentation Tools
  57. 57. <ul><li>Imaginate </li></ul><ul><li>example </li></ul>Presenting Your Case - Presentation Tools
  58. 58. <ul><li>Live vs. Recorded Demonstrations </li></ul><ul><ul><li>Murphy’s Law </li></ul></ul><ul><ul><li>Data may not look the way you want </li></ul></ul><ul><ul><li>Program may not work the way you want </li></ul></ul><ul><ul><li>Murphy’s Law </li></ul></ul><ul><ul><li>Websites can change </li></ul></ul><ul><ul><li>Live can be turned against you </li></ul></ul>Presenting Your Case - Presentation Tools
  59. 59. <ul><li>Many Issues we Used to Worry About are Settled </li></ul><ul><li>See US DOJ Guidelines for More Detailed Discussion </li></ul>Presenting Your Case - Digital Evidence Admissibility
  60. 60. <ul><li>Business Records - Fed R. Evid. 803(6) </li></ul><ul><ul><li>Computer Generated (admissible) </li></ul></ul><ul><ul><li>Computer Stored (may be hearsay) </li></ul></ul><ul><li>Authenticity - Fed. R. Evid 901(a) </li></ul><ul><ul><li>Mere possibility of tampering doesn’t affect authenticity </li></ul></ul><ul><ul><li>Proving the Author </li></ul></ul><ul><ul><ul><li>Circumstantial Evidence </li></ul></ul></ul><ul><ul><ul><li>See Earlier Discussion - Problem Areas - Putting Defendant at Keyboard </li></ul></ul></ul>Presenting Your Case - Digital Evidence Admissibility: In General
  61. 61. <ul><li>Hearsay </li></ul><ul><ul><li>If computer records reflect only computer generated data, no hearsay </li></ul></ul><ul><ul><li>If computer records contain the assertions of a person, hearsay </li></ul></ul><ul><li>Best Evidence - Fed. R. Evid. 1002 </li></ul><ul><ul><li>See Fed. R. Evid. 1991(3) </li></ul></ul><ul><li>Summaries - Fed. R. Evid. 1006 </li></ul>Presenting Your Case - Digital Evidence Admissibility: In General
  62. 62. <ul><li>Abigail Abraham, Assistant State Attorney Cook County, Illinois </li></ul><ul><li>[email_address] </li></ul><ul><li>(713) 869-2728 </li></ul><ul><li>Ivan Orton, Sr. Deputy Prosecuting Attorney King County, Washington </li></ul><ul><li>[email_address] </li></ul><ul><li>(206) 296-9082 </li></ul>Sweet Home Alabama (or wherever)

×