tag:blogger.com,1999:blog-90150680360758533172024-03-05T02:50:23.035-05:00Pro Digital Forensic ConsultingPro Digital Forensic Consulting & Investigation is based in Richmond, Virginia (USA) and available globally, offering forensic data acquisition, analysis, reporting, consultation & expert witness services in support of litigation. In this blog, we discuss digital forensics, legal & technology issues, current events and current & past case studies. Please visit our main website at www.ProDigital4n6.comPro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comBlogger109125tag:blogger.com,1999:blog-9015068036075853317.post-45238515597977337922022-09-01T12:14:00.001-04:002022-09-01T12:14:46.188-04:00Pro Digital is Joining ArcherHall<p><span style="font-family: Helvetica; font-size: 12px;">September 1, 2022</span></p><p><span style="font-family: Helvetica; font-size: 12px;">I built something someone wants. So, I sold it to them.</span></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;">When the happenstance came along that I was introduced to the CEO of <a href="https://archerhall.com" target="_blank">ArcherHall</a>, a Sacramento-based nationwide provider of litigation support and eDiscovery services, I took it in stride. We had a great call, but I had no expectation that it would blossom into anything. It did, and over several months of discussions we came up with an exciting plan for the future that works well for everyone.</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://archerhall.com" imageanchor="1" style="margin-left: 1em; margin-right: 1em;" target="_blank"><img border="0" data-original-height="328" data-original-width="510" height="255" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEGsJ6e8v2R6irkHC93F2M8PlBkE6ZHBCRDeG0sUCnDXCptKU4v6x2xLG0HkaYLQ7aor5VFKZBtKdMZD08hHjkWQqiXcC9ZB3qZiCF67qmAQOvGCModiGZQM7PRapJpapsySfSf4JtyVEWV2nu7X9umfGNGYTJdiSIN3a57P6_vuPs7qB1GMq2iVp7lA/w396-h255/Pro%20Digital%20is%20now%20ArcherHall.jpg" width="396" /></a></div><br /><p class="p3" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px; text-align: center;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;">So here’s what’s changing: Not much.<span class="Apple-converted-space"> </span></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">I will continue to serve current and future clients in the role of Director of Digital Forensics and eDiscovery for ArcherHall out of the former Pro Digital office & lab in the West End of Richmond, VA. We have worked very hard to cultivate the relationships with the attorney-clients with whom we work consistently, and it is our goal to continue to foster those relationships for years to come. Professional Digital Forensic Consulting (dba Pro Digital) will cease to exist as a business entity, and I will join ArcherHall. Because ArcherHall has more financial backing and people performing the casework, the analysis work on future cases will have the benefit of a team of experts working on them with expanded capabilities of tools, training, experience, and knowledge. It’s a win-win for our current and future clients.</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">I will continue to teach as much as possible at the University and private sector levels. I thoroughly enjoy teaching and it’s a great “side-hustle”. This blog may be moving, but it will still exist. There are a few other exciting things on the horizon regarding publications, which I’ll announce on my personal Linked In and personal Twitter feeds. I will stay an active and vocal member of the digital forensic community and hope to be able to contribute more as I will not have the time investment overhead of running a business on a daily basis.</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">That’s the biggest part that will be changing: The administrative side of running a digital forensic consultancy will largely be removed from my responsibilities. Clients can expect more structure, team-based communication and an overall more immersive and responsive experience from me and ArcherHall.</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">The natural question that would be posed is “why?”<span class="Apple-converted-space"> </span>In my multiple conversations and<span class="Apple-converted-space"> </span>meetings with ArcherHall’s CEO, Chief of Staff and Managing Directors, it became apparent that we share the same approach and values in our role as digital forensic service providers.<span class="Apple-converted-space"> </span>Those values include integrity, professionalism and a service-based approach forged with an entrepreneurial spirit.<span class="Apple-converted-space"> </span>These are the core values that Pro Digital’s clients have come to expect and will remain as tenants of our practice moving forward.</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">I’ll wrap up this blog and personal note by thanking everyone who has helped make this possible. When I registered the LLC for Pro Digital back in 2013, I did so as sort of a lark and a fallback position. A little more than a year later, I left full-time law enforcement work and invested in Pro Digital fully and have been churning it ever since. Every close person in my personal and professional circles has helped make this possible in some way or another, from my ex-wife to my children to my current fiancée. My brother and my sister, both successful business owners who offered so much advice to help get started and stay in business. Experts in other areas of forensic services, including noted authors, other DF entrepreneurs and very smart people in our industry. Mentors at Cellebrite and IACIS and the Virginia State Police and Instructors with the Department of Homeland Security and the US Secret Service, as well as colleagues from my 2012 BCERT class. If you are reading this, you know who you are, and I am forever grateful for your contributions to the success of Pro Digital and me personally.</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">In closing, I’d only ask that we, as an industry, always strive to be and do better. I’m not perfect, nor am I the professional ombudsman of the digital forensic service industry. I get educated on areas of improvement regularly and take those lessons in the way they are intended. I can always learn more & do better and am regularly excited to do so. Digital Forensics as an industry can also work toward the standards of constant improvement. Our profession deserves it. Our clients and case stakeholders deserve it. And most importantly, the justice system needs it. Our industry will only grow over the coming decades. It’s incumbent upon all of us to nurture the profession and ensure that it remains a path to the truth in the cases we work.</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Onward….</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">-Patrick</p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Author:<span class="Apple-converted-space"> </span></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Patrick J. Siewert</p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Director of Digital Forensics & eDiscovery</p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">ArcherHall</p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p4" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px;">About the Author:</p><p class="p4" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px;">Patrick Siewert was the Founder & Principal Consultant of Pro Digital Forensic<span class="Apple-converted-space"> </span>Consulting, based in Richmond, Virginia (USA). In 15 years of law enforcement, he investigated hundreds of high-tech crimes to precedent-setting results and continues to support litigation cases and corporations in private digital forensic practice. Patrick is a graduate of SCERS & BCERT and holds several vendor-neutral and specific certifications in the field of digital forensics and high-tech investigation and is a court-certified expert witness in multiple digital forensic areas. He continues to keep in touch with the public safety community as a Law Enforcement Instructor and Adjunct Professor at Virginia Commonwealth University.</p><p class="p2" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="color: black;">Email: </span><span class="s2" style="text-decoration-line: underline;">psiewert@archerhall.com</span></p><p class="p3" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Twitter : @RVA4n6<span class="Apple-converted-space"> </span></p><p class="p2" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="color: black;">Web: <a href="https://archerhall.com"><span class="s2">https://archerhall.com</span></a><span class="Apple-converted-space"> </span></span></p><p class="p4" style="color: #0563c1; font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;">ArcherHall on LinkedIn: <a href="https://www.linkedin.com/company/archerhall/"><span class="s4" style="font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;">https://www.linkedin.com/company/archerhall/</span></a></span><span class="s1" style="color: black;"> </span></p><p class="p2" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="color: black;">Patrick Siewert on LinkedIn: <a href="https://www.linkedin.com/in/patrick-siewert-92513445/"><span class="s2">https://www.linkedin.com/in/patrick-siewert-92513445/</span></a><span class="Apple-converted-space"> </span></span></p>Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comRichmond, VA, USA37.5407246 -77.43604819.2304907638211517 -112.5922981 65.850958436178843 -42.279798099999994tag:blogger.com,1999:blog-9015068036075853317.post-79937113336399220102022-04-19T13:45:00.000-04:002022-04-19T13:45:46.193-04:00Pretty Maps & Plea Bargains: Tips on Handling Cellular Records Analysis in Criminal Defense Cases<p><span style="font-family: Helvetica; font-size: 12px;">April 19, 2022</span></p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p4" style="color: #c00000; font-family: Helvetica; font-size: 18px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; text-align: center;"><span class="s1" style="text-decoration-line: underline;">Pretty Maps & Plea Bargains: Tips on Handling Cellular Records Analysis in Criminal Defense Cases</span></p><p class="p5" style="color: #c00000; font-family: Helvetica; font-size: 18px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 22px; text-align: center;"><span class="s1" style="text-decoration-line: underline;"></span><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">I’m going to be blunt from the start:<span class="Apple-converted-space"> </span>If you are not using a trained, qualified, experienced & knowledgeable analyst for cellular records analysis (i.e., historical cell site location), then you are doing your client a large disservice, regardless of the side you’re representing.<span class="Apple-converted-space"> </span>Furthermore, if you’re taking what the other side tells you as 100% truth, you’re already behind the curve.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><b>Do I have your attention?</b></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Why Do I say this?<span class="Apple-converted-space"> </span>Because I’m coming off the likely second murder acquittal in about a year where the government used analysts to try and pinpoint their suspect’s location using historical cell site location data to illustrate that the Defendant was in or around a relevant location (i.e., crime scene) at or around the incident being investigated and prosecuted.<span class="Apple-converted-space"> </span>Both of these analysts were from federal 3-letter agencies and had allegedly analyzed the same records I was provided.<span class="Apple-converted-space"> </span>I’ll get more into the specifics later…</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p7" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>Historical Cell Site Analysis at a Glance</b></span></p><p class="p8" style="color: red; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 17px;"><span class="s1" style="text-decoration-line: underline;"><b></b></span><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Before we get into specific case examples, we should define and discuss briefly what historical cell site location records are and are not.<span class="Apple-converted-space"> </span>There are volumes of articles and at least one book written on the topic, but I’ll try to trim the fat off the conversation to a simple definition:</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Cellular companies keep records of activity on their network.<span class="Apple-converted-space"> </span>This activity often involves the phone’s use (calls, texts and data) and listing of particular <span class="s1" style="text-decoration-line: underline;">cell sites</span> (i.e., towers) used for these events, which are most commonly divided into <span class="s1" style="text-decoration-line: underline;">three sectors</span> in a 360-degree radius.<span class="Apple-converted-space"> </span>This means that each sector on most cell sites covers an area of roughly 120-degrees.<span class="Apple-converted-space"> </span>Please note, there are exceptions to this.<span class="Apple-converted-space"> </span>However, with the data that is acquired in the investigation and litigation process from the cellular provider, we can map these cell sites, using their verified GPS coordinates, and use the sector-specific information contained in the records to map <i>generalized</i> location of a cell phone that is allegedly tied to a Defendant or litigant. <span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Depending on the timing of the request to the cellular provider, we can also potentially receive and map what are commonly referred to as “specialized location records”, which attempt to estimate the GPS (longitude & latitude) coordinate estimates of the phone itself, within a certain confidence level detailed in the records.<span class="Apple-converted-space"> </span>These records <i>can</i> be problematic when used as evidence, but this is where the knowledge and competence level of the analyst also becomes crucial.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">It should be noted that these records were never intended to be used in litigation.<span class="Apple-converted-space"> </span>They are held by the cellular providers to help increase the user experience and efficiency on the cellular network.<span class="Apple-converted-space"> </span>It just so happens that the ubiquitous nature of cell phones in daily life has led to the location of a cell phone (and potentially the person carrying it) to be valuable data in criminal and civil litigation when analyzed & presented competently.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p7" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>Not All Analysts Are Created Equal</b></span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Just like in the practice of law, medicine, auto mechanics, etc., it is a truism in cellular analysis that not all analysts possess the same work ethic, knowledge, training, capability or level of competence.<span class="Apple-converted-space"> </span>The vast majority of historical cell site data analysts work for the government, and as such, can present their data and analysis with an air of confidence and authority.<span class="Apple-converted-space"> </span>But I have seen multiple cases where this simply is not the case.<span class="Apple-converted-space"> </span>Consider the following examples:</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>Case study #1</b></span>:<span class="Apple-converted-space"> </span>A homicide where data records were used to try and tie the Defendant to the phone.<span class="Apple-converted-space"> </span>Defendant’s primary phone in use was not in question, but the government attempted to illustrate that the “burner” or “drop” phone with which the victim last communicated also belonged to the Defendant by correlating the location of the two phones (known phone & burner phone) together over time, as well as attempting to tie the burner phone and defendant to the area where the victim’s body was located.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Defense Counsel hired a private-sector analyst (me) to conduct an independent analysis of the records and confirm or refute the assertions of the government with regard to this analysis.<span class="Apple-converted-space"> </span>The problem was, the 3-letter agency’s analysis contradicted itself without explanation.<span class="Apple-converted-space"> </span>See below image that was entered into evidence as part of the larger initial analysis: <span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKUaoWeXxaTmdwu68-C5pcwdm0ZhobqTSOwXk9rW1A2kndDa-zO6zfNiT86B_Z9tdZQfq4rGpe6hSGPt77gHasOUZFm1Zdy0g-oDdPRlvXiiAOoQNXwxucm2Zv-jeSS0_VeLxCBFoloBkl13a4QYTnwrgcxDnJfl73IAEKSOHcs8YE1YTAijmfU2pKHA/s611/Screen%20Shot%202022-03-31%20at%2012.50.14%20PM.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="520" data-original-width="611" height="544" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKUaoWeXxaTmdwu68-C5pcwdm0ZhobqTSOwXk9rW1A2kndDa-zO6zfNiT86B_Z9tdZQfq4rGpe6hSGPt77gHasOUZFm1Zdy0g-oDdPRlvXiiAOoQNXwxucm2Zv-jeSS0_VeLxCBFoloBkl13a4QYTnwrgcxDnJfl73IAEKSOHcs8YE1YTAijmfU2pKHA/w640-h544/Screen%20Shot%202022-03-31%20at%2012.50.14%20PM.jpg" width="640" /></a></div><br /><p class="p9" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px; text-align: center;"><br /></p><p class="p10" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; text-align: center;"><span class="s1" style="text-decoration-line: underline;">Map #1</span></p><p class="p9" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px; text-align: center;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Pretty map, isn’t it?<span class="Apple-converted-space"> </span>The problem, as is highlighted in the red boxes (upper left and lower right), is that this map puts the burner phone (events cited in the red boxes & wedges) miles apart at virtually the same time.<span class="Apple-converted-space"> </span>No explanation was provided in the report for this.<span class="Apple-converted-space"> </span>When this was brought forth in cross-examination of the government’s analyst, they testified that their agency calls this “teleportation”.<span class="Apple-converted-space"> </span>And no, that’s not a joke.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">There’s actually a very reasonable explanation for this, which was not relayed to the jury until the analyst was called back to the stand in rebuttal of my testimony and, as coincidence would have it, produced a much more detailed map.<span class="Apple-converted-space"> </span>Regardless, the Defendant was acquitted of the murder charge.<span class="Apple-converted-space"> </span>Was it because of this?<span class="Apple-converted-space"> </span>I have no idea.<span class="Apple-converted-space"> </span>But I’m sure this didn’t help the jury’s confusion about this data… Nor did the “teleportation”!</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>Case Study #2</b></span>:<span class="Apple-converted-space"> </span>A homicide where the Defendant was accused of the murder <i>and</i> assisting the shooter (who was found guilty prior to our Defendant’s trial) in getting away from the crime scene.<span class="Apple-converted-space"> </span>The 3-letter agency analyst produced a very short report/analysis, which lacked many things.<span class="Apple-converted-space"> </span>Take a look at one of the images and I’ll explain what’s lacking:</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7sjlvX2gYwb5a5kl89dVaUHi9XblmTKSapUNPawXZrgb0i2a9M_9HD0X8utJoGzx70okK0GHLhkSdj0eoKxlCkSc8fgPqMWHjGLcLLrZC3tLmtGURQfxXR67on8G9xjNnsV9oK1ibY56Kx9YyDcF5PYdNI1SnRO82CvhFQDRBZPgR2Z75wC_Vc-AN2A/s585/Screen%20Shot%202022-03-31%20at%2012.51.23%20PM.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="447" data-original-width="585" height="490" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7sjlvX2gYwb5a5kl89dVaUHi9XblmTKSapUNPawXZrgb0i2a9M_9HD0X8utJoGzx70okK0GHLhkSdj0eoKxlCkSc8fgPqMWHjGLcLLrZC3tLmtGURQfxXR67on8G9xjNnsV9oK1ibY56Kx9YyDcF5PYdNI1SnRO82CvhFQDRBZPgR2Z75wC_Vc-AN2A/w640-h490/Screen%20Shot%202022-03-31%20at%2012.51.23%20PM.jpg" width="640" /></a></div><br /><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p10" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; text-align: center;"><span class="s1" style="text-decoration-line: underline;">Map #2</span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Another beautiful map!<span class="Apple-converted-space"> </span>But what’s missing?<span class="Apple-converted-space"> </span>First, the crime scene is barely visible amongst the other noise on the map.<span class="Apple-converted-space"> </span>The map is hard to decipher.<span class="Apple-converted-space"> </span>Second, two crucial pieces are missing – the illustration of other <span class="s1" style="text-decoration-line: underline;">cell sites</span> in the area as well as any other potentially relevant locations.<span class="Apple-converted-space"> </span>And not simply alibi locations either – basic things like the Defendant’s home, which is actually within this map view, but you’d never know it because it wasn’t included in the illustration.<span class="Apple-converted-space"> </span>Simply put, this is an incomplete analysis.<span class="Apple-converted-space"> </span>It seeks to prove a theory and disregards the context. <span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">What are the cell sites and why is that important?<span class="Apple-converted-space"> </span>There are dozens of cell sites in the area of the above map (#2), some of which are closer to the crime scene.<span class="Apple-converted-space"> </span>And while I cannot emphasize strongly enough that it is <span class="s1" style="text-decoration-line: underline;"><b>not</b></span> 100% true that the phone always connects to the closest cell site, without the illustration of where the other cell sites are located, we don’t even have enough information to scrutinize.<span class="Apple-converted-space"> </span>It’s an analysis in a bubble.<span class="Apple-converted-space"> </span>The green & red dots on map #1 --<span class="Apple-converted-space"> </span>Those are the cell sites in a fairly populated metropolitan area, similar to the area in the map #2.<span class="Apple-converted-space"> </span>Here’s the same event from map #2 in the same area from the same case, but with the context added (and easier to decipher):</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqAgizg6OLKSgGB9yydWepC9OprmLmMkcioTOkAtCamzF_q7enZyFgUUZ5bk5mLQHMTiZlRXe2tdPfnTfKom44fdqlbd9swdLqODP5zFQ7pQi5e0iJUvXnTLJhLsQo90I-FlRS8TzjfeopLUmWbPL72-nJ23wmBIwTlrqjQ42ZAnRKLi5JASZAWMy8tw/s704/Screen%20Shot%202022-04-19%20at%201.31.08%20PM.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="475" data-original-width="704" height="432" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqAgizg6OLKSgGB9yydWepC9OprmLmMkcioTOkAtCamzF_q7enZyFgUUZ5bk5mLQHMTiZlRXe2tdPfnTfKom44fdqlbd9swdLqODP5zFQ7pQi5e0iJUvXnTLJhLsQo90I-FlRS8TzjfeopLUmWbPL72-nJ23wmBIwTlrqjQ42ZAnRKLi5JASZAWMy8tw/w640-h432/Screen%20Shot%202022-04-19%20at%201.31.08%20PM.jpg" width="640" /></a></div><br /><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Those orange dots are all cell sites for this cellular carrier in the area not used for this event.<span class="Apple-converted-space"> </span>The other potentially relevant locations, as well as the crime scene, have also been added to this map.<span class="Apple-converted-space"> </span>The final potentially relevant piece is the terrain of the area.<span class="Apple-converted-space"> </span>While not a large issue in this particular example, geographical features like terrain <i>can</i> have an effect on which cell site the cellular device chooses to use.<span class="Apple-converted-space"> </span>For further context, this usage event was 4 minutes after the shooting (as verified by surveillance video time stamp).<span class="Apple-converted-space"> </span>As you can see, there are several cell sites in between this event and the crime scene, but again, the cell phone will <b>NOT</b> always connect to the closest cell site, rather the cell site with the best signal.<span class="Apple-converted-space"> </span>That said, the cell site in use is over 2 miles away from the crime scene in a fairly densely populated area.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">This map was generated as a more complete view of the relevant data and presented in comparison to map #2 for presentation to the Jury.<span class="Apple-converted-space"> </span>The exclusion of this information in map #2 is inexplicable.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p7" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>Why Is Any of This An Issue?</b></span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">I have been engaged in historical cell site records analysis in litigation for approximately 6 years, and in the practice of forensic data analysis (computers, cell phones, etc.) for 13 years.<span class="Apple-converted-space"> </span>In that time, I’ve conducted dozens of analyses of carriers of all types, cases spanning from insurance investigations to divorce/custody disputes to criminal prosecution and defense.<span class="Apple-converted-space"> </span>The practice of historical cell site analysis is not “junk science”, no matter what snake-oil salesman “defense expert” may try to tell you.<span class="Apple-converted-space"> </span>It works in most cases, if done properly.<span class="Apple-converted-space"> </span>And if it didn’t work, no one would use it.<span class="Apple-converted-space"> </span>Further, location of the phone is but one use of these records.<span class="Apple-converted-space"> </span>There are multiple others, as <a href="https://prodigital4n6.com/beyond-location-data-in-cellular-records-analysis/"><span class="s2" style="color: #0563c1;">discussed here</span></a>.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">That said, the problem I’ve seen repeatedly with criminal investigations utilizing historical cell site analysis is that Defense Counsel may be misinformed or lacking in their knowledge about what is presented to them by the government’s analyst.<span class="Apple-converted-space"> </span>When a client is charged with a serious crime and the government gets the historical cell usage site location records and requests the <b>[insert 3-letter law enforcement agency name here]</b> to conduct an analysis and produce pretty maps showing that your guy was likely there at the wrong time, it tends to force a plea bargain because it looks good and it’s relatively technical.<span class="Apple-converted-space"> </span>This happens regularly and can often not be in the best interest of the client.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">So what <i>can</i> help your client?<span class="Apple-converted-space"> </span>A thoughtful and informed conversation with an independent, experienced historical cell records analysis expert who can look at the records and provide a practical assessment.<span class="Apple-converted-space"> </span>To be clear, <span class="s1" style="text-decoration-line: underline;"><i>you do not want a “defense expert”</i></span>.<span class="Apple-converted-space"> </span>You want an <span class="s1" style="text-decoration-line: underline;">independent</span> expert who will take in all of the available data and conduct as thorough analysis as possible, given what is available through discovery.<span class="Apple-converted-space"> </span>And there’s more to “available data” than simply the records in most cases.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p7" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>A Few Tips From Experience</b></span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">I’m not perfect and I don’t know everything.<span class="Apple-converted-space"> </span>On top of that, I’m not a lawyer.<span class="Apple-converted-space"> </span>However, I have worked many large litigation cases with these types of records and I’ve learned a few tips along the way that could help the process along more smoothly:</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p11" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 0px 36px; text-indent: -18px;"><span class="s3" style="font-family: Symbol; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;">•<span class="Apple-tab-span" style="white-space: pre;"> </span></span>Consider obtaining the records allegedly associated with the target of the investigation <i>independent</i> of discovery.<span class="Apple-converted-space"> </span>This assists in the ability for you to introduce the records and your expert’s analysis at trial, even if the government chooses not to do so.<span class="Apple-converted-space"> </span>If the government never enters the records into evidence, it may not be possible for the hard work of your analyst to be presented to the judge or jury.<span class="Apple-converted-space"> </span>Obtaining these records can be done via Court Order and should be done as soon as possible and in consultation with your independent expert for proper terminology of the request.<span class="Apple-converted-space"> </span>Some carriers don’t retain certain records for a long period of time (see record retention article <a href="https://prodigital4n6.com/cellular-provider-record-retention-periods/"><span class="s2" style="color: #0563c1;">here</span></a>.<span class="Apple-converted-space"> </span>Updated data may be available.)</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p11" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 0px 36px; text-indent: -18px;"><span class="s3" style="font-family: Symbol; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;">•<span class="Apple-tab-span" style="white-space: pre;"> </span></span>The value of illustrating these usage events on a map can be compelling evidence, but static maps don’t always tell the whole story.<span class="Apple-converted-space"> </span>Consider using an expert who has access to tools that will help animate the movement in the usage to help paint an overall clearer picture of the cellular location evidence in your case.<span class="Apple-converted-space"> </span>To date, I’ve not seen a government analyst use animations to illustrate the records.<span class="Apple-converted-space"> </span>I have, however, conducted analysis <i>for</i> the government using animations.</p><p class="p12" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 0px 36px; min-height: 14px;"><br /></p><p class="p11" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 0px 36px; text-indent: -18px;"><span class="s3" style="font-family: Symbol; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;">•<span class="Apple-tab-span" style="white-space: pre;"> </span></span>Be careful with your stipulations prior to trial.<span class="Apple-converted-space"> </span>Stipulating to the authenticity of the records is <i>probably </i>OK.<span class="Apple-converted-space"> </span>Anything beyond that, including stipulating to the other analyst’s credentials, may cause issues down the road during trial testimony and presentation of evidence.</p><p class="p13" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px 36px; min-height: 14px;"><br /></p><p class="p11" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 0px 36px; text-indent: -18px;"><span class="s3" style="font-family: Symbol; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;">•<span class="Apple-tab-span" style="white-space: pre;"> </span></span>Don’t forget that there is probably relevant data in more than one place.<span class="Apple-converted-space"> </span>While it’s true the government has likely tried to cover all of their bases on this – particularly in a major criminal case – that doesn’t mean that there won’t be information to help confirm or refute alibis, alternate location data, etc. that is stored on the cell phone itself or potentially in cloud data sources.<span class="Apple-converted-space"> </span>If your cellular analyst doesn’t also have experience with analysis of these items, I’d suggest finding someone who has the ability to conduct this “holistic” type of analysis incorporating <i>all</i> potentially relevant pieces of data.</p><p class="p13" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px 36px; min-height: 14px;"><br /></p><p class="p11" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 0px 36px; text-indent: -18px;"><span class="s3" style="font-family: Symbol; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;">•<span class="Apple-tab-span" style="white-space: pre;"> </span></span>Look closely at what isn’t provided.<span class="Apple-converted-space"> </span>I’ve learned that there is almost as much (if not more) value in looking at the evidence that <b>ISN’T</b> presented than there is at looking at evidence that <i>IS</i> presented.<span class="Apple-converted-space"> </span>If something obvious – like data from the Defendant’s cell phone (i.e., the device itself) was obtained, analyzed and <i>not</i> presented as evidence, that probably means there may be something on that phone that is not favorable to the other side’s case.<span class="Apple-converted-space"> </span>Look at this closely.</p><p class="p14" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px 18px; min-height: 14px;"><br /></p><p class="p7" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>In Conclusion</b></span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">I was in law enforcement for nearly 15 years, and I still travel the country teaching cops in any number of different subjects, including this one.<span class="Apple-converted-space"> </span>Many of my former (and current) law enforcement compatriots may read this article and conclude that I’m trying to give the defense a “leg up” or reveal some trade secrets.<span class="Apple-converted-space"> </span>Nothing could be further from the truth.<span class="Apple-converted-space"> </span>My goal in relaying this information is simply to do my part to ensure the right people go to prison and the innocent people do not.<span class="Apple-converted-space"> </span>This involves hard work, no matter who the victim is or what the circumstances of their death or attack may have been.<span class="Apple-converted-space"> </span>I work many cases for the prosecution.<span class="Apple-converted-space"> </span>I work many cases for the defense.<span class="Apple-converted-space"> </span>The truth is always the ultimate goal, and should be for everyone involved in this process. <span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><b>A final note for prosecuting attorneys who are using government analysts in these investigations</b>:<span class="Apple-converted-space"> </span>The devil is in the details with this data.<span class="Apple-converted-space"> </span>There can often be missteps, omissions or other potential Brady-like material that is overlooked simply because the right questions were not asked by the analyst or a plea is expected in many of these cases.<span class="Apple-converted-space"> </span>While it is true that many times this data can help prove your case, I’ve seen more success with a 360-degree approach to the evidence, rather than relying on one piece to illustrate guilt.<span class="Apple-converted-space"> </span></p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Author:<span class="Apple-converted-space"> </span></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Patrick J. Siewert</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Founder & Principal Consultant</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Professional Digital Forensic Consulting, LLC<span class="Apple-converted-space"> </span></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Virginia DCJS #11-14869</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Based in Richmond, Virginia</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Available Wherever You Need Us!</p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p15" style="color: #c00000; font-family: Helvetica; font-size: 22px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; text-align: center;"><span class="s1" style="text-decoration-line: underline;"><i>We Find the Truth for a Living</i></span><i>!</i></p><p class="p16" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px; text-align: center;">Computer Forensics -- Mobile Forensics -- Specialized Investigation</p><p class="p17" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px;">About the Author:</p><p class="p17" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px;">Patrick Siewert is the Founder & Principal Consultant of <a href="https://prodigital4n6.com/"><span class="s2" style="color: #0563c1;">Pro Digital Forensic Consulting</span></a>, based in Richmond, Virginia (USA).<span class="Apple-converted-space"> </span>In 15 years of law enforcement, he investigated hundreds of high-tech crimes to precedent-setting results and continues to support litigation cases and corporations in his digital forensic practice.<span class="Apple-converted-space"> </span>Patrick is a graduate of SCERS & BCERT and holds several vendor-neutral and specific certifications in the field of digital forensics and high-tech investigation and is a court-certified expert witness in digital forensics and historical cell site analysis & mapping.<span class="Apple-converted-space"> </span>He continues to hone his digital forensic expertise in the private sector while growing his consulting & investigation business marketed toward litigators, professional investigators and corporations, while keeping in touch with the public safety community as a Law Enforcement Instructor.</p><p class="p18" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s4" style="color: black;">Email:<span class="Apple-converted-space"> </span></span><span class="s1" style="text-decoration-line: underline;">Inquiries@ProDigital4n6.com</span></p><p class="p18" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s4" style="color: black;">Web: <a href="https://prodigital4n6.com/"><span class="s1">https://ProDigital4n6.com</span></a></span></p><p class="p18" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s4" style="color: black;">Pro Digital Forensic Consulting on LinkedIn: <a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc"><span class="s1">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</span></a></span></p><p class="p18" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s4" style="color: black;">Patrick Siewert on LinkedIn:<span class="Apple-converted-space"> </span><a href="https://www.linkedin.com/in/patrick-siewert-92513445/"><span class="s1">https://www.linkedin.com/in/patrick-siewert-92513445/</span></a> </span><span class="Apple-converted-space"> </span></p>Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comVirginia, USA37.4315734 -78.65689429.1213395638211523 -113.8131442 65.741807236178843 -43.500644199999996tag:blogger.com,1999:blog-9015068036075853317.post-15036192295674737342022-02-14T15:15:00.003-05:002022-02-14T15:15:55.609-05:00When the Absence of Evidence is Good Evidence<p><span style="font-family: Helvetica; font-size: 12px;">February 14, 2022</span></p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p4" style="color: #c00000; font-family: Helvetica; font-size: 18px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; text-align: center;"><span class="s1" style="text-decoration-line: underline;">When the Absence of Evidence is Good Evidence</span></p><p class="p5" style="color: #c00000; font-family: Helvetica; font-size: 18px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 22px; text-align: center;"><span class="s1" style="text-decoration-line: underline;"></span><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Fielding dozens of inquiries every month for nearly 9 years as a digital forensic service provider, we start to get a good sense about what many cases involve, even before the details of an incident are revealed.<span class="Apple-converted-space"> </span>Whether the case involves mobile device evidence, computer evidence, cellular records analysis or electronic-based investigation, the general approach to the case, depending on the scope, is about the same.<span class="Apple-converted-space"> </span>What many attorneys and their clients are seeking is the proverbial “smoking gun” or “nail in the coffin” of their case.<span class="Apple-converted-space"> </span>As we often tell them, that does happen, from time to time.<span class="Apple-converted-space"> </span>But it is not the norm. <span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">More often than not, we are provided data that is lacking or missing something important.<span class="Apple-converted-space"> </span>The question then becomes why is the data missing, when did it go missing and who (if anyone) caused it to become missing?<span class="Apple-converted-space"> </span>In this game of piecing the digital puzzle together, often what is absent can also be key to the case.<span class="Apple-converted-space"> </span>But there are some definite considerations that go along with this notion as well.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p7" style="font-family: "Times New Roman"; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 15px; text-align: center;"><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgoj0oy838UJY-Jyrlms8QofIMsiw4ya3exZ0hb4DmBEIXUwWMLF8mibzf43i_Sr_MQLna5EcePDfvTqFyxGAQ-PLqj6h0w_kcwQC5ItPgfaz9xNCVIaCjwzIBzgKta8_hGgM4WQQVTR9w73uKGXiOVN_ZDvGTXu0sGV6EroYrWnZ4Ji0FTGDJbTH_wMQ" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="264" data-original-width="468" height="241" src="https://blogger.googleusercontent.com/img/a/AVvXsEgoj0oy838UJY-Jyrlms8QofIMsiw4ya3exZ0hb4DmBEIXUwWMLF8mibzf43i_Sr_MQLna5EcePDfvTqFyxGAQ-PLqj6h0w_kcwQC5ItPgfaz9xNCVIaCjwzIBzgKta8_hGgM4WQQVTR9w73uKGXiOVN_ZDvGTXu0sGV6EroYrWnZ4Ji0FTGDJbTH_wMQ=w426-h241" width="426" /></a></div><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p9" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>The Value of Missing Data</b></span></p><p class="p10" style="color: red; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 17px;"><span class="s1" style="text-decoration-line: underline;"><b></b></span><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">There are circumstances where missing data can tell a decent part of the story.<span class="Apple-converted-space"> </span>For instance, on some mobile devices, items in certain areas are stored sequentially and numbers (or indices) in the sequence are not repeated.<span class="Apple-converted-space"> </span>Accordingly, if we find that there are missing numbers in the sequence, we can conclude that something was removed from the table that stores this information.<span class="Apple-converted-space"> </span>Can we always recover the data itself?<span class="Apple-converted-space"> </span>No.<span class="Apple-converted-space"> </span>But we can often determine that it was removed and at the very least approximate when it was removed, using process of elimination.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">We can further determine the prior existence of this data by:</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p11" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 0px 36px; text-indent: -18px;">1)<span class="Apple-tab-span" style="white-space: pre;"> </span>Searching for the likely file names or monikers of the missing data to see if there are any other records of those files being accessed or used on the system or device.</p><p class="p11" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 0px 36px; text-indent: -18px;">2)<span class="Apple-tab-span" style="white-space: pre;"> </span>Looking at the timeline of activity on the device or system to determine what took place during the time frame that the data is suspected to have been removed.<span class="Apple-converted-space"> </span>Many other areas of the device may have been used around these times to help show the overall activity around these times.</p><p class="p11" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 0px 36px; text-indent: -18px;">3)<span class="Apple-tab-span" style="white-space: pre;"> </span>Looking at patterns of removal of data, either in this or other categories, to see if perhaps a mass-deletion of data may have taken place.<span class="Apple-converted-space"> </span>There are always alternative explanations which need to be explored before coming to concrete conclusions.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">We can also try to determine if some or all of the missing data might have been stored elsewhere.<span class="Apple-converted-space"> </span>Alternative and backup data storage such as computer syncing and cloud-based storage are valuable, common areas that could potentially store either more data and/or the deleted data to help answer these important questions.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p9" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>The Expert’s Conclusions re: Missing Data</b></span></p><p class="p12" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 17px;"><span class="s1" style="text-decoration-line: underline;"><b></b></span><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">The ultimate goal in missing data analysis is to be able to come to some conclusion within a reasonable degree of certainty.<span class="Apple-converted-space"> </span>This is not always easy and it’s almost never 100%.<span class="Apple-converted-space"> </span>However, as analysts and Experts who testify in legal matters, digital forensic practitioners can be *mostly* sure about what happened through thorough analysis and testing, depending on the scope of the case and the needs of the Client. <span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">The important point about our conclusions with regard to when items were deleted, who deleted them and when lies in the thoroughness of our work.<span class="Apple-converted-space"> </span>Leaving no stone unturned is a good approach, but it’s also time-consuming and expensive.<span class="Apple-converted-space"> </span>Many clients will not want to support this cost expenditure, mostly because they don’t see the need for it.<span class="Apple-converted-space"> </span>Ultimately, it is the analyst’s reputation and work that is to be scrutinized in court and by other experts, therefore, the analyst should be steadfast in their calls for whatever measures are appropriate to support their conclusions in court.<span class="Apple-converted-space"> </span>Whatever the conclusion(s) is/are, they must be articulated, defensible, repeatable and supported by the data.<span class="Apple-converted-space"> </span>Otherwise, they will not pass evidentiary muster and ultimately the client will not be served by the expenditure.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">This is another area where peer review can play a vital role.<span class="Apple-converted-space"> </span>No digital forensic analyst knows everything about every data storage medium, file system, application, mobile device, etc.<span class="Apple-converted-space"> </span>However, with a thoughtful and thorough peer review of the procedures, findings and conclusions, we take another valuable step to validating those conclusions for the finder of fact.<span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEhAgEYI4TFEw5R45CCEXM96jHhZbsZmIV70HDx5Vq0VgPn_GyKtrjG2eRT1rkewdnwVOCwGQQi5D77BO193T7J4OQbfTzgUMFoGJ9aUIAByKRuy58C0u0NYmmCPklrKi6vfsvjq5NP-RVj0MPoG9uzSBKNa06LVQWUor8LtxeBZ1e__CgkUOXMiHwLFDQ" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="156" data-original-width="468" height="214" src="https://blogger.googleusercontent.com/img/a/AVvXsEhAgEYI4TFEw5R45CCEXM96jHhZbsZmIV70HDx5Vq0VgPn_GyKtrjG2eRT1rkewdnwVOCwGQQi5D77BO193T7J4OQbfTzgUMFoGJ9aUIAByKRuy58C0u0NYmmCPklrKi6vfsvjq5NP-RVj0MPoG9uzSBKNa06LVQWUor8LtxeBZ1e__CgkUOXMiHwLFDQ=w640-h214" width="640" /></a></div><br /><p class="p13" style="font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 17px;"><b></b><br /></p><p class="p9" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>A Brief Case Study</b></span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">We once worked a divorce case involving an iPod with internet connectivity.<span class="Apple-converted-space"> </span>The husband, our client, found videos on a computer of his wife engaged in sexual relations with another man.<span class="Apple-converted-space"> </span>When the Court ordered her devices turned over, including the iPod on which she was suspected to have chatted for months with her paramour, there were no messages found.<span class="Apple-converted-space"> </span>However, there were suggestive pictures and videos located on the iPod, which supported the suspicion of chatting behavior.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Additionally, the Court ordered her laptop hard drive to be analyzed.<span class="Apple-converted-space"> </span>On the laptop hard drive, there were a number of iPod backup files, nearly all of which contained the application-based chats with the paramour, including their sexually explicit conversations and his admission to killing another person in another state.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p9" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>Wrapping It Up</b></span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">We like to take the approach that the data is virtually always somewhere.<span class="Apple-converted-space"> </span>But even if it’s not anywhere, we can often find markers, indicators, patterns and evidence that it existed in some form prior to our obtaining the data enough to be able to come to some conclusion about it.<span class="Apple-converted-space"> </span>The key lies in the ability, competency & knowledge of the digital forensic analyst to be able to determine what may have happened, when and who is responsible.<span class="Apple-converted-space"> </span>Just because it’s not there doesn’t mean your case is dead or that your analyst can’t do anything to help.<span class="Apple-converted-space"> </span>Tenacity is a virtue in digital forensics.<span class="Apple-converted-space"> </span>Make sure to scrutinize the characteristics of your analyst before asking them to work your case.<span class="Apple-converted-space"> </span>Not all analysts (or lawyers or clients or… ) are created equally.</p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Author:<span class="Apple-converted-space"> </span></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Patrick J. Siewert</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Founder & Principal Consultant</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Professional Digital Forensic Consulting, LLC<span class="Apple-converted-space"> </span></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Virginia DCJS #11-14869</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Based in Richmond, Virginia</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Available Wherever You Need Us!</p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p14" style="color: #c00000; font-family: Helvetica; font-size: 22px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; text-align: center;"><span class="s1" style="text-decoration-line: underline;"><i>We Find the Truth for a Living</i></span><i>!</i></p><p class="p15" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px; text-align: center;">Computer Forensics -- Mobile Forensics -- Specialized Investigation</p><p class="p16" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px;">About the Author:</p><p class="p16" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px;">Patrick Siewert is the Founder & Principal Consultant of <a href="https://prodigital4n6.com/"><span class="s2" style="color: #0563c1;">Pro Digital Forensic Consulting</span></a>, based in Richmond, Virginia (USA).<span class="Apple-converted-space"> </span>In 15 years of law enforcement, he investigated hundreds of high-tech crimes to precedent-setting results and continues to support litigation cases and corporations in his digital forensic practice.<span class="Apple-converted-space"> </span>Patrick is a graduate of SCERS & BCERT and holds several vendor-neutral and specific certifications in the field of digital forensics and high-tech investigation and is a court-certified expert witness.<span class="Apple-converted-space"> </span>He continues to hone his digital forensic expertise in the private sector while growing his consulting & investigation business marketed toward litigators, professional investigators and corporations, while keeping in touch with the public safety community as a Law Enforcement Instructor.</p><p class="p17" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Email:<span class="Apple-converted-space"> </span></span><span class="s1" style="text-decoration-line: underline;">Inquiries@ProDigital4n6.com</span></p><p class="p17" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Web: <a href="https://prodigital4n6.com/"><span class="s1">https://ProDigital4n6.com</span></a></span></p><p class="p17" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Pro Digital Forensic Consulting on LinkedIn: <a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc"><span class="s1">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</span></a></span></p><p class="p17" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Patrick Siewert on LinkedIn:<span class="Apple-converted-space"> </span><a href="https://www.linkedin.com/in/patrick-siewert-92513445/"><span class="s1">https://www.linkedin.com/in/patrick-siewert-92513445/</span></a> </span><span class="Apple-converted-space"> </span></p>Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comVirginia, USA37.4315734 -78.65689429.1213395638211523 -113.8131442 65.741807236178843 -43.500644199999996tag:blogger.com,1999:blog-9015068036075853317.post-24573079144457588162021-11-05T11:33:00.002-04:002021-11-05T11:33:55.807-04:00Popular Case Studies in Digital Forensics<p>
</p><p align="center" class="MsoNormal" style="text-align: center;"><span style="font-family: "Daytona Condensed",sans-serif; font-size: 14.0pt; line-height: 107%;">Popular
Case Studies in Digital Forensics</span></p>
<p class="MsoNormal" style="text-align: justify;"><span style="font-family: "Daytona Condensed",sans-serif;">In
today’s ever-changing and increasing technological world, digital forensics has
become an important step in civil and criminal investigations. This typically
involves collecting, extracting, and examining data evidence from computer hard
drives, mobile devices (smart phones, tablets, GPS units, etc.), emails, text
messages, social media, location (or GPS) data, and cloud storage systems.</span></p>
<p class="MsoNormal" style="text-align: justify;"><span style="font-family: "Daytona Condensed",sans-serif;">There
are several notable and famous cases that involved the utilization of digital
forensics to be solved. Most of the population of this country has heard of
these cases:<span style="mso-spacerun: yes;"> </span>the BTK Killer, Dennis
Rader, the Craigslist Killer, Philip Markoff, and Larry J. Thomas vs the State
of Indiana. </span></p>
<p class="MsoNormal" style="text-align: justify;"><span style="font-family: "Daytona Condensed",sans-serif;">For
over 30 years, the BTK Killer, aka Dennis Rader, tortured and killed at least
ten people while evading identification and capture in Wichita, Kansas,
beginning in the early 1970’s. He made it a habit of taunting law enforcement
as he sent cryptic messages during his killing spree. Everything seemed to stop
in 1991, when BTK seemed to just disappear. However, it was this habit that led
to his capture and arrest on February 25, 2005. Prior to his arrest, Rader
contacted law enforcement to ask whether he could communicate with them via a
floppy disk and virtually asked if it could be traced back to a specific
computer. <span style="mso-spacerun: yes;"> </span>After a number of weeks, a
floppy disk was received by a local television studio and was swiftly traced
back to a computer he used at his church, Christ Lutheran Church and the Park
City library as well as information found in the <b><i>properties</i></b>
section one of the documents, details of the file (metadata) displayed that
this document was saved by an individual named “Dennis”. This was in the early
stages of digital forensics and produced very notable results.</span></p>
<p align="center" class="MsoNormal" style="text-align: center;"><span style="font-family: "Daytona Condensed",sans-serif; mso-no-proof: yes;"></span></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiU6ig62Rnos8LziVsQRB1sqKR5XDgc_bjDBefX389kg91_Iz30I9ttvTElX7N4gwPMxEyay0nW2rSTbdduJWCIjLd95FmIQCHuDfyDUVjqFtTRyKO6PUf0I2hlNuhPna57y_xrxJ6ZVU6g/s1200/BTK+Killer+Dennis+Rader.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="900" data-original-width="1200" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiU6ig62Rnos8LziVsQRB1sqKR5XDgc_bjDBefX389kg91_Iz30I9ttvTElX7N4gwPMxEyay0nW2rSTbdduJWCIjLd95FmIQCHuDfyDUVjqFtTRyKO6PUf0I2hlNuhPna57y_xrxJ6ZVU6g/s320/BTK+Killer+Dennis+Rader.jpg" width="320" /></a></div><span style="font-family: "Daytona Condensed",sans-serif;"></span><p></p>
<p class="MsoNormal" style="text-align: justify;"><span style="font-family: "Daytona Condensed",sans-serif;">Craigslist
is a well-known website where individuals can buy or sell goods and services. However,
the site became synonymous with a murder case that was eventually solved using
digital forensics. On April 14, 2009, a New York woman, Julissa Brisman was
found murdered in an upscale hotel in Boston. There was additionally a report
of an assault on another woman who was robbed at gunpoint. Both women had
posted an ad on Craigslist, which is how the Craigslist killer, 23-year-old,
Philip Markoff, had found his intended victims. On the night of the crimes,
they had each made an appointment to meet a man named “Andy M.”<span style="mso-spacerun: yes;"> </span></span></p>
<p class="MsoNormal" style="text-align: justify;"><span style="font-family: "Daytona Condensed",sans-serif;">Investigators
were able to trace emails sent between the victims and Markoff and discovered
the IP address of the postings, which led them to Markoff after submitting
subpoenas for IP address ownership information. There were also phone calls
exchanged between Markoff and the victims in this case. The phone numbers were
traced back to prepaid cell phones. Surveillance video from the hotel captured
a young man in a black leather jacket and a New York Yankees baseball cap
entering and exiting the hotel around the time of Brisman’s murder. Once law
enforcement discovered the killer’s name, they turned to Facebook for research
and discovered he was engaged to a woman named Megan McAllister. Police staked-out
the couple’s apartment and waited for Markoff. He was arrested on April 20, six
days after the murder and died after his fourth attempt at committing suicide
in prison.</span></p>
<p class="MsoNormal" style="text-align: justify;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_0S-9tw0Jt7o4TXyyNyTCegrtR0DMvA2itLaoEPDxl1R3dg1TkzuxX5RsefY-HXwcFgoHmZ1yZP5B5R2A1qjNOsxdU_mKu6Duzxc15P0w6moglnO6JmtdkH9BQvJZ4FXpaBJSDhmSAHME/s1200/Craigslist+Killer+Philip+Markoff.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1200" data-original-width="1200" height="245" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_0S-9tw0Jt7o4TXyyNyTCegrtR0DMvA2itLaoEPDxl1R3dg1TkzuxX5RsefY-HXwcFgoHmZ1yZP5B5R2A1qjNOsxdU_mKu6Duzxc15P0w6moglnO6JmtdkH9BQvJZ4FXpaBJSDhmSAHME/w245-h245/Craigslist+Killer+Philip+Markoff.jpg" width="245" /></a></div><br /><span style="font-family: "Daytona Condensed",sans-serif;">In
the third case, Larry J. Thomas vs. State of Indiana in 2016, Thomas was found
guilty of the attempted robbery and murder of Rito Llamas-Juarez in his car and
was linked to the murder through social media and Offer Up, which is an app used
to buy and sell items. Thomas had set up a meeting to sell an iPhone 6 to
Llamas-Juarez in a parking lot.</span><p></p>
<p class="MsoNormal" style="text-align: justify;"><span style="font-family: "Daytona Condensed",sans-serif;">Based
on witness accounts of the incident, law enforcement turned to Facebook and
discovered Thomas was using the name “Slaughtaboi Larro” and had posted photos
of himself carrying an assault rifle and ammunition used in the murder of
Llama-Juarez matched that of the weapon posted in the images as well as a
bracelet worn which was found at the crime scene. Cell phone records not only
put him at the scene of the murder but were able to identify the Offer Up app
which was used to set up the meeting with Llamas-Juarez. A treasure trove of
evidence was later found in his possession at his residence, and he was
subsequently arrested.</span></p>
<p class="MsoNormal" style="text-align: justify;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirZbUEyAcuObc5oXPsaV9zK3K96G2MtRf7diJURxPUajvtv47eGFHUD6DFJDhEp0hso-PtemG2I0GcdRQulu8m4VWWXN62audO34MTyNW5LMp6PdIAfaPIEJbXmDy-5kZXVVP-uj24Vwge/s154/Larry+J.+Thomas.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="154" data-original-width="133" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirZbUEyAcuObc5oXPsaV9zK3K96G2MtRf7diJURxPUajvtv47eGFHUD6DFJDhEp0hso-PtemG2I0GcdRQulu8m4VWWXN62audO34MTyNW5LMp6PdIAfaPIEJbXmDy-5kZXVVP-uj24Vwge/w184-h213/Larry+J.+Thomas.jpg" width="184" /></a></div><br /><span style="font-family: "Daytona Condensed",sans-serif;">Civil
cases can also utilize digital forensics to help prove or disprove a claim
between two parties, companies or their representatives.<span style="mso-spacerun: yes;"> </span>One of the most famous divorce cases involved
Tiger Woods. After being suspicious about his behavior, Tiger’s model wife,
Elin Nordegren, texted night club hostess, Rachel Uchitel, pretending to be Tiger.<span style="mso-spacerun: yes;"> </span>This infidelity was later proved in court in
2010.<span style="mso-spacerun: yes;"> </span>Without this confirmation, the
claim of infidelity would have been difficult to prove.<span style="mso-spacerun: yes;"> </span>This case also highlights the ease at which
people can spoof or fake text messages and why having a forensic analysis of a
mobile device (or all devices) in a large litigation case is crucial.</span><p></p>
<p class="MsoNormal" style="text-align: justify;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqafzcAPAOiZO_WQ-eIaKWRqFloxRKiBmOdiOITQ5trlYEnxXrXHr22zDu4_6U0qleFtZudxWkEri35Q3NYuDLMof4L-vsNgWH_nKU22m1rej9PP2Uk981BF97sKgQLVWGk2NcZl97rkP_/s381/Tiger+Woods.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="381" data-original-width="224" height="243" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqafzcAPAOiZO_WQ-eIaKWRqFloxRKiBmOdiOITQ5trlYEnxXrXHr22zDu4_6U0qleFtZudxWkEri35Q3NYuDLMof4L-vsNgWH_nKU22m1rej9PP2Uk981BF97sKgQLVWGk2NcZl97rkP_/w143-h243/Tiger+Woods.jpg" width="143" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiul59j59yROpsIKiCuUO6emI9JmPi6PoU1LPb-JTNX0BUOMoSqnIKqsbHsWeH9MB3_2Yra5Di13jD7UxHEO1A_CTCGydPjKZ5LGz5nutidz8W1SlPASZzVLq2a4r0MTawJk4usf3HieNp_/s397/Rachel+Uchitel.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="397" data-original-width="224" height="244" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiul59j59yROpsIKiCuUO6emI9JmPi6PoU1LPb-JTNX0BUOMoSqnIKqsbHsWeH9MB3_2Yra5Di13jD7UxHEO1A_CTCGydPjKZ5LGz5nutidz8W1SlPASZzVLq2a4r0MTawJk4usf3HieNp_/w138-h244/Rachel+Uchitel.jpg" width="138" /></a></div><br /><span style="font-family: "Daytona Condensed",sans-serif;">Text
messages, emails, social media or a varying array of application data can be
used in most civil cases such as divorce, intellectual property (IP) theft or
employee misconduct to help prove or disprove claims made in the case. </span><p></p>
<p class="MsoNormal"><b><u><span style="font-family: "Daytona Condensed",sans-serif; font-size: 12.0pt; line-height: 107%;">Wrapping It Up</span></u></b></p>
<p class="MsoNormal" style="text-align: justify;"><span style="font-family: "Daytona Condensed",sans-serif;">All
four of these cases were solved in one form of digital forensics or another. Although
in the infancy stage during the time of BTK, digital forensics has changed and
continues to adapt to the newest technologies. With many individuals utilizing
the internet and social media or mobilizing with their digital media or fitness
apps, the use of digital forensics in litigation has become a critical
component in assisting to solve crimes. Technology is alway changing and
increasing in capability, therefore it is crucial for digital forensics to do
the same. Crime and civil disputes will never stop. Accordingly, the value of
digital forensics is a tool that will increasingly be one that investigators
and litigators will need to be aware of and evolve with as the complexity of
cases evolves.</span></p>
<p class="MsoNormal"><b><u><span style="font-family: "Daytona Condensed",sans-serif; font-size: 12.0pt; line-height: 107%;">Author: </span></u></b></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span style="font-family: "Daytona Condensed",sans-serif;">Tami
Smith</span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span style="font-family: "Daytona Condensed",sans-serif;">Digital
Forensic Examiner</span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span style="font-family: "Daytona Condensed",sans-serif;">Professional
Digital Forensic Consulting, LLC </span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span style="font-family: "Daytona Condensed",sans-serif;">Virginia
DCJS #11-14869</span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span style="font-family: "Daytona Condensed",sans-serif;">Based
in Richmond, Virginia</span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span style="font-family: "Daytona Condensed",sans-serif;">Available
Wherever You Need Us!</span></p>
<p align="center" class="MsoNormal" style="text-align: center;"><i><span style="color: #c45911; font-family: "Daytona Condensed",sans-serif; font-size: 20.0pt; line-height: 107%; mso-themecolor: accent2; mso-themeshade: 191;"> We Find the Truth for
a Living!</span></i><span style="color: #c45911; font-family: "Daytona Condensed",sans-serif; font-size: 20.0pt; line-height: 107%; mso-themecolor: accent2; mso-themeshade: 191;"></span></p>
<p class="MsoNormal"><span style="font-family: "Daytona Condensed",sans-serif; font-size: 10.0pt; line-height: 107%;"> </span></p>
<p class="MsoNormal"><span style="font-family: "Daytona Condensed",sans-serif;">Computer
Forensics -- Mobile Forensics -- Specialized Investigation</span></p>
<p class="MsoNormal"><span style="font-family: "Daytona Condensed",sans-serif;">About
the Author:</span></p>
<p class="MsoNormal" style="text-align: justify;"><span style="font-family: "Daytona Condensed",sans-serif;">Tami
Smith is a Digital Forensic Examiner and Consultant of </span><a href="https://www.blogger.com/u/2/"><span style="font-family: "Daytona Condensed",sans-serif;">Pro
Digital Forensic Consulting</span></a><span style="font-family: "Daytona Condensed",sans-serif;">,
based in Richmond, Virginia (USA). An Army Veteran, she is a Suma Cum Laude
graduate of Computer Forensics and Digital Investigations, she has had the
opportunity to practice in the field, examining civil and criminal cases with
the discipline of her military experience. Tami holds vendor-neutral and
specific certifications in the field of digital forensics and high-tech
investigation and is also a Private Investigator in the state of
Virginia. She continues to hone her digital forensic knowledge, education,
and experience in the private sector.</span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span lang="FR" style="font-family: "Daytona Condensed",sans-serif; mso-ansi-language: FR;">Email : Inquiries@ProDigital4n6.com</span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span lang="FR" style="font-family: "Daytona Condensed",sans-serif; mso-ansi-language: FR;">Web : </span><a href="https://www.blogger.com/u/2/"><span lang="FR" style="font-family: "Daytona Condensed",sans-serif; mso-ansi-language: FR;">https://ProDigital4n6.com</span></a><span lang="FR" style="font-family: "Daytona Condensed",sans-serif; mso-ansi-language: FR;"></span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span style="font-family: "Daytona Condensed",sans-serif;">Pro
Digital Forensic Consulting on LinkedIn: </span><a href="https://www.blogger.com/u/2/"><span style="font-family: "Daytona Condensed",sans-serif;">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</span></a><span style="font-family: "Daytona Condensed",sans-serif;"></span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span style="font-family: "Daytona Condensed",sans-serif;">Tami
Smith on LinkedIn: </span><a href="https://www.linkedin.com/in/tami-smith-1b28ab29/"><span style="font-family: "Daytona Condensed",sans-serif;">https://www.linkedin.com/in/tami-smith-1b28ab29/</span></a><span style="font-family: "Daytona Condensed",sans-serif;"> </span></p>
<p class="MsoNormal"><span style="font-family: "Daytona Condensed",sans-serif;"> </span></p>
<p><!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves>false</w:TrackMoves>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>ZH-CN</w:LidThemeAsian>
<w:LidThemeComplexScript>AR-SA</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
DefSemiHidden="false" DefQFormat="false" DefPriority="99"
LatentStyleCount="376">
<w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 9"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="header"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footer"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index heading"/>
<w:LsdException Locked="false" Priority="35" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of figures"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope return"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="line number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="page number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of authorities"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="macro"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="toa heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 5"/>
<w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Closing"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Signature"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="true"
UnhideWhenUsed="true" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Message Header"/>
<w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Salutation"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Date"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Note Heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Block Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="FollowedHyperlink"/>
<w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Document Map"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Plain Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="E-mail Signature"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Top of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Bottom of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal (Web)"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Acronym"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Cite"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Code"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Definition"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Keyboard"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Preformatted"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Sample"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Typewriter"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Variable"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Table"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation subject"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="No List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Contemporary"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Elegant"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Professional"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Balloon Text"/>
<w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Theme"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" QFormat="true"
Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" QFormat="true"
Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" QFormat="true"
Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" QFormat="true"
Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" QFormat="true"
Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" QFormat="true"
Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" SemiHidden="true"
UnhideWhenUsed="true" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
<w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
<w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
<w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
<w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
<w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
<w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
<w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hashtag"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Unresolved Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Link"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:8.0pt;
mso-para-margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;}
</style>
<![endif]--></p>Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comtag:blogger.com,1999:blog-9015068036075853317.post-24216135789585611792021-09-16T11:55:00.006-04:002021-09-16T12:44:27.588-04:00How to Deal with Difficult Clients as a Digital Forensic Examiner<p> <!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves>false</w:TrackMoves>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>ZH-CN</w:LidThemeAsian>
<w:LidThemeComplexScript>AR-SA</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
DefSemiHidden="false" DefQFormat="false" DefPriority="99"
LatentStyleCount="376">
<w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 9"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="header"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footer"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index heading"/>
<w:LsdException Locked="false" Priority="35" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of figures"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope return"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="line number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="page number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of authorities"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="macro"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="toa heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 5"/>
<w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Closing"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Signature"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="true"
UnhideWhenUsed="true" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Message Header"/>
<w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Salutation"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Date"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Note Heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Block Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="FollowedHyperlink"/>
<w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Document Map"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Plain Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="E-mail Signature"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Top of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Bottom of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal (Web)"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Acronym"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Cite"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Code"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Definition"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Keyboard"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Preformatted"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Sample"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Typewriter"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Variable"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Table"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation subject"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="No List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Contemporary"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Elegant"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Professional"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Balloon Text"/>
<w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Theme"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" QFormat="true"
Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" QFormat="true"
Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" QFormat="true"
Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" QFormat="true"
Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" QFormat="true"
Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" QFormat="true"
Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" SemiHidden="true"
UnhideWhenUsed="true" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
<w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
<w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
<w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
<w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
<w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
<w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
<w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hashtag"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Unresolved Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Link"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:8.0pt;
mso-para-margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;}
</style>
<![endif]-->
</p><p align="center" class="MsoNormal" style="text-align: center;"><span face=""Daytona Condensed",sans-serif" style="font-size: 14pt; line-height: 107%;">How
to Deal with Difficult Clients as a Digital Forensic Examiner</span></p>
<p class="MsoNormal" style="text-align: justify;"><span face=""Daytona Condensed",sans-serif">Businesses
large and small often have the unfortunate occasion where they must deal with a
difficult client.<span style="mso-spacerun: yes;"> </span>In the world of
digital forensics, this is no exception. It is essentially how you deal with
them that matters.<span style="mso-spacerun: yes;"> </span>Truth be told, most
of us know that this is not always an easy task.<span style="mso-spacerun: yes;"> </span>We often work with attorneys on behalf of
their clients.<span style="mso-spacerun: yes;"> </span>That being said, in our
field, we have the occasional clients that represent themselves, however, a
majority of clients are the attorneys which represent another individual(s). </span></p>
<p align="center" class="MsoNormal" style="text-align: center;"><img alt="Mad male employee blaming female colleague for mistake Mad male worker yelling at female colleague asking her to leave office, multiracial coworkers disputing during business negotiations, employees cannot reach agreement, blaming for mistake or crisis angry client stock pictures, royalty-free photos & images" class="MosiacAsset-module__thumb___L2F4y" height="270" src="https://media.istockphoto.com/photos/mad-male-employee-blaming-female-colleague-for-mistake-picture-id994164986?k=20&m=994164986&s=612x612&w=0&h=7oTzP6VKjZvBRHwwMO_-PX7Etidah5OXDTkcPne38P0=" width="405" /></p>
<p class="MsoNormal" style="text-align: justify;"><span face=""Daytona Condensed",sans-serif">There
are several strategies to take into consideration when working and dealing with
“difficult” clients.<span style="mso-spacerun: yes;"> </span>In truth, there
will be some clients that will be difficult regardless of what is done to
remedy an issue they may present. However, many difficult situations can be
potentially averted if certain steps are taken to minimize any potential issues
that could arise.<span style="mso-spacerun: yes;"> </span></span></p>
<p class="MsoListParagraphCxSpFirst" style="mso-list: l0 level1 lfo1; text-align: justify; text-indent: -0.25in;"><span face=""Daytona Condensed",sans-serif" style="mso-bidi-font-family: "Daytona Condensed"; mso-fareast-font-family: "Daytona Condensed";"><span style="mso-list: Ignore;">1.<span style="font: 7pt "Times New Roman";">
</span></span></span><b><span face=""Daytona Condensed",sans-serif">Set
clear concise boundaries and expectations</span></b><span face=""Daytona Condensed",sans-serif">.<span style="mso-spacerun: yes;"> </span>If a
client knows where you stand from the beginning of the business relationship,
there is likely to be less confusion, deterring an angry client.<span style="mso-spacerun: yes;"> </span>Items such as cost, schedule, deadlines and
requirements are crucial in this step.<span style="mso-spacerun: yes;">
</span>Each case will vary to one degree or another, therefore, those
stipulations should be discussed in the initial meeting and put into a contract
that all parties sign and date if agreed upon.<span style="mso-spacerun: yes;">
</span>It should be noted that if a complication in a deadline arises, it
should be addressed immediately and not held until the last minute.<span style="mso-spacerun: yes;"> </span>This is applicable for <i>ALL</i> parties in
the case.</span></p>
<p class="MsoListParagraphCxSpMiddle" style="mso-list: l0 level1 lfo1; text-align: justify; text-indent: -0.25in;"><span face=""Daytona Condensed",sans-serif" style="mso-bidi-font-family: "Daytona Condensed"; mso-fareast-font-family: "Daytona Condensed";"><span style="mso-list: Ignore;">2.<span style="font: 7pt "Times New Roman";">
</span></span></span><b><span face=""Daytona Condensed",sans-serif">Be
professional</span></b><span face=""Daytona Condensed",sans-serif">.<span style="mso-spacerun: yes;"> </span>It is sometimes easy to get emotional in
litigation, especially if you feel attacked on a personal level. It is best to
remain calm and talk to the client in a professional matter, regardless of the
manner to which they choose to respond.<span style="mso-spacerun: yes;">
</span>In the field of digital forensics, we are often sought out for a
specific task.<span style="mso-spacerun: yes;"> </span>How you react to a
difficult customer can impact not only your business, but your reputation as
well.</span></p>
<p class="MsoListParagraphCxSpMiddle" style="mso-list: l0 level1 lfo1; text-align: justify; text-indent: -0.25in;"><span face=""Daytona Condensed",sans-serif" style="mso-bidi-font-family: "Daytona Condensed"; mso-fareast-font-family: "Daytona Condensed";"><span style="mso-list: Ignore;">3.<span style="font: 7pt "Times New Roman";">
</span></span></span><b><span face=""Daytona Condensed",sans-serif">Document,
document, document</span></b><span face=""Daytona Condensed",sans-serif">!!<span style="mso-spacerun: yes;"> </span>As previously stated, not everyone will be
happy with a resolution proposed.<span style="mso-spacerun: yes;"> </span>There
may be instances that arise that you may not have an immediate solution for an
issue that pops up.<span style="mso-spacerun: yes;"> </span>This is where
documentation is critical.<span style="mso-spacerun: yes;"> </span>Just as when
performing an analysis from beginning to end, documentation is the backbone to
cover yourself.<span style="mso-spacerun: yes;"> </span>This is no
exception.<span style="mso-spacerun: yes;"> </span></span></p>
<p class="MsoListParagraphCxSpMiddle" style="mso-list: l0 level1 lfo1; text-align: justify; text-indent: -0.25in;"><b><span face=""Daytona Condensed",sans-serif" style="mso-bidi-font-family: "Daytona Condensed"; mso-fareast-font-family: "Daytona Condensed";"><span style="mso-list: Ignore;">4.<span style="font: 7pt "Times New Roman";">
</span></span></span></b><b><span face=""Daytona Condensed",sans-serif">If
a mistake is made, own it!<span style="mso-spacerun: yes;"> </span></span></b><span face=""Daytona Condensed",sans-serif">Naturally, no one likes to
admit they made a mistake.<span style="mso-spacerun: yes;"> </span>We are human,
mistakes happen.<span style="mso-spacerun: yes;"> </span>However, trying to pawn
the blame off on someone else, including the client, will do nothing but
produce friction.<span style="mso-spacerun: yes;"> </span>It is best to be
upfront and honest about the mistake, address it and work on a solution to fix
it.<span style="mso-spacerun: yes;"> </span>Of course, the opposite can also
apply in this situation.<span style="mso-spacerun: yes;"> </span>If a mistake is
made and it was not any fault of yours, do not take the blame on yourself.<span style="mso-spacerun: yes;"> </span>This causes a divide in the business
relationship.</span></p>
<p class="MsoListParagraphCxSpLast" style="mso-list: l0 level1 lfo1; text-align: justify; text-indent: -0.25in;"><b><span face=""Daytona Condensed",sans-serif" style="mso-bidi-font-family: "Daytona Condensed"; mso-fareast-font-family: "Daytona Condensed";"><span style="mso-list: Ignore;">5.<span style="font: 7pt "Times New Roman";">
</span></span></span></b><b><span face=""Daytona Condensed",sans-serif">One
big thing…</span></b><span face=""Daytona Condensed",sans-serif">If
the client is so difficult that there is no solution that pleases them, know
when to walk away.<span style="mso-spacerun: yes;"> </span>Do not be afraid to
let them know that their behavior will not be tolerated. Digital Forensic
Examiners have a specialty that other seek out.<span style="mso-spacerun: yes;">
</span>No one should be disrespected in the workplace.<span style="mso-spacerun: yes;"> </span></span></p>
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqpObemYzJre_dvh2-aUyZ9M5C40AlXqXvvD2BXW8DMOKk110yT8il-TfaagwLEQq1gp_l3jzLpVJZj8vwosXGOFsnTlArzZNgOBFnVRmhEj4uRMLhju5J-U3UwHJsFbmatlAat4KxMJOA/s1370/Working+together.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="770" data-original-width="1370" height="244" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqpObemYzJre_dvh2-aUyZ9M5C40AlXqXvvD2BXW8DMOKk110yT8il-TfaagwLEQq1gp_l3jzLpVJZj8vwosXGOFsnTlArzZNgOBFnVRmhEj4uRMLhju5J-U3UwHJsFbmatlAat4KxMJOA/w434-h244/Working+together.jpg" width="434" /></a></div><br /><p align="center" class="MsoNormal" style="text-align: center;"></p>
<p class="MsoNormal" style="text-align: justify;"><b><span face=""Daytona Condensed",sans-serif" style="color: red; font-size: 13pt; line-height: 107%;">NOTE:</span></b><span face=""Daytona Condensed",sans-serif" style="color: red; font-size: 10pt; line-height: 107%;"><span style="mso-spacerun: yes;"> </span></span><span face=""Daytona Condensed",sans-serif">In the world of digital
forensic cases, examiners are accustomed to the technology and forensic
programs we work with daily, so often we tend to speak in terms that we
understand without realizing that our clients are not as versed in such, making
this confusing for them and leading to further frustration.<span style="mso-spacerun: yes;"> </span>We must always remember to take this into
consideration at the beginning of any professional relationship to lessen the
possibility of frustration for all parties.</span></p>
<p class="MsoNormal"><b><u><span face=""Daytona Condensed",sans-serif" style="font-size: 12pt; line-height: 107%;">Wrapping It Up</span></u></b></p>
<p class="MsoNormal" style="text-align: justify;"><span face=""Daytona Condensed",sans-serif" style="font-size: 10pt; line-height: 107%;">In today’s
business world, having a difficult client is almost a certainty.<span style="mso-spacerun: yes;"> </span>How a business professional handles a
difficult client makes all the difference.<span style="mso-spacerun: yes;">
</span>At the same time, every individual deserves a modicum of respect. You
cannot be afraid to walk away from a situation if you are put in a situation
that makes you uncomfortable.<span style="mso-spacerun: yes;"> </span>Your
reputation and business could be on the line as a result of how a situation is
handled with a difficult client.<span style="mso-spacerun: yes;"> </span>As with
any relationship, whether it be personal or professional, constant open
communication and boundaries are key to the successful relationship between the
service provider and the Client and/or attorney handling their matter.</span></p>
<p class="MsoNormal"><b><u><span face=""Daytona Condensed",sans-serif" style="font-size: 12pt; line-height: 107%;">Author: </span></u></b></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span face=""Daytona Condensed",sans-serif">Tami
Smith</span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span face=""Daytona Condensed",sans-serif">Digital
Forensic Examiner</span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span face=""Daytona Condensed",sans-serif">Professional
Digital Forensic Consulting, LLC </span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span face=""Daytona Condensed",sans-serif">Virginia
DCJS #11-14869</span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span face=""Daytona Condensed",sans-serif">Based
in Richmond, Virginia</span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span face=""Daytona Condensed",sans-serif">Available
Wherever You Need Us!</span></p>
<p class="MsoNormal"><i><span face=""Daytona Condensed",sans-serif" style="font-size: 10pt; line-height: 107%;"> </span></i></p>
<p align="center" class="MsoNormal" style="text-align: center;"><i><span face=""Daytona Condensed",sans-serif" style="color: #c45911; font-size: 20pt; line-height: 107%; mso-themecolor: accent2; mso-themeshade: 191;">We Find the Truth for
a Living!</span></i><span face=""Daytona Condensed",sans-serif" style="color: #c45911; font-size: 20pt; line-height: 107%; mso-themecolor: accent2; mso-themeshade: 191;"></span></p>
<p class="MsoNormal"><span face=""Daytona Condensed",sans-serif">Computer
Forensics -- Mobile Forensics -- Specialized Investigation</span></p>
<p class="MsoNormal"><b><span face=""Daytona Condensed",sans-serif" style="font-size: 12pt; line-height: 107%;">About the Author:</span></b></p>
<p class="MsoNormal" style="text-align: justify;"><span face=""Daytona Condensed",sans-serif">Tami
Smith is a Digital Forensic Examiner and Consultant of </span><a href="https://www.blogger.com/u/2/"><span face=""Daytona Condensed",sans-serif">Pro
Digital Forensic Consulting</span></a><span face=""Daytona Condensed",sans-serif">,
based in Richmond, Virginia (USA). An Army Veteran, she is a Suma Cum
Laude graduate of Computer Forensics and Digital Investigations, she has had
the opportunity to practice in the field, examining civil and criminal cases
with the discipline of her military experience.<span style="mso-spacerun: yes;">
</span>Tami holds vendor-neutral and specific certifications in the field of
digital forensics and high-tech investigation and is also a Private
Investigator in the state of Virginia. She continues to hone her digital
forensic knowledge, education, and experience in the private sector.</span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span face=""Daytona Condensed",sans-serif" lang="FR" style="mso-ansi-language: FR;">Email: Inquiries@ProDigital4n6.com</span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span face=""Daytona Condensed",sans-serif" lang="FR" style="mso-ansi-language: FR;">Web: </span><a href="https://www.blogger.com/u/2/"><span face=""Daytona Condensed",sans-serif" lang="FR" style="mso-ansi-language: FR;">https://ProDigital4n6.com</span></a><span face=""Daytona Condensed",sans-serif" lang="FR" style="mso-ansi-language: FR;"></span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span face=""Daytona Condensed",sans-serif">Pro
Digital Forensic Consulting on LinkedIn: </span><a href="https://www.blogger.com/u/2/"><span face=""Daytona Condensed",sans-serif">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</span></a><span face=""Daytona Condensed",sans-serif"></span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-top: 0in; mso-add-space: auto; mso-margin-bottom-alt: 8.0pt; mso-margin-top-alt: 0in;"><span face=""Daytona Condensed",sans-serif">Tami
Smith on LinkedIn: </span><a href="https://www.linkedin.com/in/tami-smith-1b28ab29/"><span face=""Daytona Condensed",sans-serif">https://www.linkedin.com/in/tami-smith-1b28ab29/</span></a><span face=""Daytona Condensed",sans-serif"> </span></p>
<p class="MsoNormal" style="text-align: justify;"><b><span face=""Daytona Condensed",sans-serif"> </span></b></p>
Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comVirginia, USA37.4315734 -78.656894210.029529494344896 -113.8131442 64.8336173056551 -43.500644199999996tag:blogger.com,1999:blog-9015068036075853317.post-21989751404642745012021-08-10T09:50:00.000-04:002021-08-10T09:50:06.073-04:00Apple’s New CSAM Detection Policy Analysis<p> <span style="font-family: Helvetica; font-size: 12px;">August 10, 2021</span></p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p4" style="color: #c00000; font-family: Helvetica; font-size: 18px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; text-align: center;"><span class="s1" style="text-decoration-line: underline;">Apple’s New CSAM Detection Policy Analysis</span></p><p class="p5" style="color: #c00000; font-family: Helvetica; font-size: 18px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 22px; text-align: center;"><span class="s1" style="text-decoration-line: underline;"></span><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Several times a year, there seem to be current events or topics that strike a chord both inside and beyond the digital forensic community.<span class="Apple-converted-space"> </span>We’ve discussed these in previous articles with regard to the <a href="https://prodigital4n6.com/discussion-scotus-carpenter-call-detail-records/"><span class="s2" style="color: #0563c1;">Carpenter v. US decision</span></a> and Apple’s previous <a href="https://prodigital4n6.com/apple-vs-the-f-b-i-some-forensic-implications/"><span class="s2" style="color: #0563c1;">spat with the FBI</span></a> in the wake of the San Bernardino, CA terrorist attack.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">As no stranger to these current event discussions (i.e., controversy) when it comes to matters of privacy and cooperation with Law Enforcement, last week we had another <a href="https://www.apple.com/child-safety/"><span class="s2" style="color: #0563c1;">“bombshell” dropped by Apple</span></a> that in a new US-based update, they will be subjecting user’s on-device photos to hash analysis attempting to track down images of known child sex abuse material (CSAM) that may be uploaded to iCloud and forwarding this information for follow-up to the <a href="https://www.missingkids.org/"><span class="s2" style="color: #0563c1;">National Center for Missing & Exploited Children (NCMEC)</span></a> or other law enforcement investigative entity.<span class="Apple-converted-space"> </span>Here, we’ll discuss how this works and explore both sides of the issue.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p7" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px; text-align: center;"><br /></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdV-akUj7mG_f87mcA5uH-4L-BIpo8daIzW39b9RltSqujFEuAS7Vsm3OVRz87JbCcAj7oFGaEA2RSWcdjs1WKVrtB_7GlI28iwzZu9FG-3QtEaplbfKOW8s-bHnU_2mwLO5i65OgmhRKf/" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="2048" data-original-width="1201" height="329" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdV-akUj7mG_f87mcA5uH-4L-BIpo8daIzW39b9RltSqujFEuAS7Vsm3OVRz87JbCcAj7oFGaEA2RSWcdjs1WKVrtB_7GlI28iwzZu9FG-3QtEaplbfKOW8s-bHnU_2mwLO5i65OgmhRKf/w193-h329/Apple+Update+CSAM.jpeg" width="193" /></a></div><br /><br /><p></p><p class="p8" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 17px;"><span class="s1" style="text-decoration-line: underline;"><b></b></span><br /></p><p class="p8" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 17px;"><span class="s1" style="text-decoration-line: underline;"><b></b></span><br /></p><p class="p9" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>How CSAM Detection Works</b></span></p><p class="p10" style="color: red; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 17px;"><span class="s1" style="text-decoration-line: underline;"><b></b></span><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">It is a commonplace practice for internet (or electronic) service providers (ISPs/ESPs) to work in conjunction with law enforcement to detect known CSAM images.<span class="Apple-converted-space"> </span>The first question naturally is, what is a known CSAM image?<span class="Apple-converted-space"> </span>Simply put, an image becomes known CSAM when a victim has been positively identified in the image.<span class="Apple-converted-space"> </span>This routinely comes through the investigation of new/unknown images and positive identification on the children in those images.<span class="Apple-converted-space"> </span>Often times, the images are within a series, depicting child sex abuse of one or more victims in the same setting with the same abuser and around the same time frame.<span class="Apple-converted-space"> </span>Law enforcement entities such as NCMEC, DHS and the FBI all maintain file hash databases of these images for use by law enforcement in investigation.<span class="Apple-converted-space"> </span>These file hash values are used to track down purveyors of child pornography across peer-to-peer networks, as well as those who may upload and share CSAM images to cooperating ESPs such as DropBox, Gmail, Yahoo, Kik, etc. <span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Once a known CSAM image has been identified by the ESP by hash value, the offending party’s account information as well as the specific date/time of upload and manner of upload are all provided to NCMEC as an investigative lead.<span class="Apple-converted-space"> </span>NCMEC then performs a variety of open-source intelligence gathering on the offending party and provides the information to law enforcement in what is known as a Cybertip.<span class="Apple-converted-space"> </span>An affiliate or cooperating law enforcement agency receives the Cybertip for investigative follow up, which can include knock-and-talk, search warrant, additional investigation or a combination of these (or other) investigative methods.<span class="Apple-converted-space"> </span>Some Cybertips go nowhere.<span class="Apple-converted-space"> </span>Some, like one I worked while a member of law enforcement, are not eligible for a search warrant, but end up in a knock-and-talk, consent search and confession from the offending party of not only possessing CSAM, but molestation of his 10 year-old step daughter.<span class="Apple-converted-space"> </span>The value of Cybertips in the hands of properly trained investigators cannot be overstated.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Whether or not you know it, you are explicitly agreeing to this process in the End User License Agreement (EULA) by using any of these services.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p9" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>One Side of the Argument: Privacy</b></span></p><p class="p8" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 17px;"><span class="s1" style="text-decoration-line: underline;"><b></b></span><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Privacy is understandably an important issue to users of technology across the spectrum.<span class="Apple-converted-space"> </span>Apple has traditionally been very privacy-centric in their practices, including refusal to help the FBI unlock the iPhone belonging to a terrorist couple who killed several people.<span class="Apple-converted-space"> </span>And privacy is very important to almost all users.<span class="Apple-converted-space"> </span>The argument here on the privacy side is that, by <a href="https://www.apple.com/child-safety/"><span class="s2" style="color: #0563c1;">Apple’s own statement</span></a>, they are installing an agent on iDevices to subject photos to a hashing algorithm and then alert law enforcement if a “threshold” of CSAM content is discovered.<span class="Apple-converted-space"> </span>This is a half-step further in a direction than what Google, Yahoo or Kik do to detect CSAM content in that they detect content uploaded to their servers and report what is suspected CSAM to NCMEC.<span class="Apple-converted-space"> </span>Apple is detecting content on individual devices and reporting suspected CSAM content that may be shared via iCloud which meets the “threshold” to NCMEC.<span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p7" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px; text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0U16Ta_KOaYKksSXL4Ga7jb-b_spfJvL-KDt24oIxw7Ytd4F_IDSTYFydUlW57LJ9VKmCWaICkTsDYTJUEla95-OdnAMszIB9hOuzX3PyLw1hKYBUEVtHuGv-ibHtkFTG4cAAShGqUg0h/" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="600" data-original-width="960" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0U16Ta_KOaYKksSXL4Ga7jb-b_spfJvL-KDt24oIxw7Ytd4F_IDSTYFydUlW57LJ9VKmCWaICkTsDYTJUEla95-OdnAMszIB9hOuzX3PyLw1hKYBUEVtHuGv-ibHtkFTG4cAAShGqUg0h/w359-h225/Data+security.jpg" width="359" /></a></div><br /><div class="separator" style="clear: both; text-align: center;"><br /></div><p></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">In some spirited discussion about this new policy on Linked In recently, it was pointed out that this may be a violation of a user’s <a href="https://constitution.congress.gov/constitution/amendment-4/"><span class="s2" style="color: #0563c1;">4<sup>th</sup> Amendment rights against unreasonable search & seizure</span></a> because Apple is acting as a would-be agent of law enforcement and “searching” people’s photos on their devices without a warrant.<span class="Apple-converted-space"> </span>We’ll discuss this a bit further in the next section, but this is a valid argument on its face.<span class="Apple-converted-space"> </span>But like with most things in life, the devil is in the details. <span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Another point brought up in discussion was the fact that Apple is projecting that they have the technology to scan files on your device generally, which could be more of a concern in the future.<span class="Apple-converted-space"> </span>This is very powerful technology that has the capability of infiltrating people’s devices without their express knowledge and potentially providing information to a third party, possibly for criminal investigation.<span class="Apple-converted-space"> </span>Furthermore, it opens the door for a would-be hacking entity to exploit this new door that Apple has opened on a much wider scale.<span class="Apple-converted-space"> </span>The security and data privacy implications may only be in the early stages.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p9" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>The Other Side of the Argument: Child Safety</b></span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">As a former law enforcement investigator on the Internet Crimes Against Children Task Force, I can assure you that proliferation of CSAM images across the internet is a real problem.<span class="Apple-converted-space"> </span>While doing this work also in the private sector, I’m sometimes asked how law enforcement knows that the images are of children and not simply people in their upper-teens who could easily be mistaken for someone over 18.<span class="Apple-converted-space"> </span>They know.<span class="Apple-converted-space"> </span>The most egregious examples of CSAM material involve infants and toddlers in sexually exploitative scenarios that no investigator can ever un-see.<span class="Apple-converted-space"> </span>These images are by-in-large not questionable in age or physical development.<span class="Apple-converted-space"> </span>They are small children, even sometimes babies.<span class="Apple-converted-space"> </span>Are there exceptions to this?<span class="Apple-converted-space"> </span>Yes.<span class="Apple-converted-space"> </span>Teens who possess smart devices also possess the ability to make their own images and share them with whomever they wish, particularly if their parent/guardian is not tech-savvy or they have not been taught the impact that the decision to share explicit photos can be long-lasting when it comes to the internet.<span class="Apple-converted-space"> </span>These images sometimes become part of criminal investigations as well, and they can be added to the CSAM database if the correct criteria and procedures are in place.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">So why is Apple’s decision generally a good one for law enforcement?<span class="Apple-converted-space"> </span>The approach that investigators take with CSAM images is that a child is victimized every time these images are viewed or shared.<span class="Apple-converted-space"> </span>This then requires law enforcement investigation and intervention to help stem the flow of these images across the internet and decrease child sexual exploitation.<span class="Apple-converted-space"> </span>Apple’s cooperation in this mission opens a door not previously available without another third-party alerting NCMEC of images potentially stored on a device.<span class="Apple-converted-space"> </span>Additionally, with the proliferation of human trafficking, particularly of missing children, Apple’s new policy gives law enforcement another tool in the proverbial toolbox to help track down and locate missing children.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p7" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px; text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIFPRkDuY1A4DymLIRwxZkZOhndWq0S4-qIWopDMqlM_sQ54zqHR90fbj2fgTXCmG9TvRGMTU50QV1e_NWF_kEfpKMUJrzwe7diRX5uPWwSGWkOegRZVznmI3No0fCGk9DSS8Uz0mXdR9W/" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="640" data-original-width="960" height="238" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIFPRkDuY1A4DymLIRwxZkZOhndWq0S4-qIWopDMqlM_sQ54zqHR90fbj2fgTXCmG9TvRGMTU50QV1e_NWF_kEfpKMUJrzwe7diRX5uPWwSGWkOegRZVznmI3No0fCGk9DSS8Uz0mXdR9W/w358-h238/US+constitution.jpg" width="358" /></a></div><br /><br /><p></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;">The argument that this practice goes against 4<sup>th</sup> Amendment protections against unreasonable search & seizure is a compelling one.<span class="Apple-converted-space"> </span>But there are some arguments to the contrary.<span class="Apple-converted-space"> </span>First, no one has a Constitutional right to own an iPhone.<span class="Apple-converted-space"> </span>If you don’t like Apple’s new policy, switch to Android.<span class="Apple-converted-space"> </span>Second, whenever we get a new i-Device (iPhone, iPad, iPod, etc.), we are prompted to “Agree” to Apple’s terms of service in the EULA, and this is in perpetuity for the time we use their software and hardware.<span class="Apple-converted-space"> </span>It is Apple’s discretion to change or updated the terms of this policy, as they have done recently with implementation of this new practice.<span class="Apple-converted-space"> </span>In short, we gave them permission to do this.<span class="Apple-converted-space"> </span>Finally, an argument can be made that while Apple’s practice for detecting CSAM images goes a half-step beyond other ESPs, the protection of children from sexual exploitation is worth whatever freedom we give up.<span class="Apple-converted-space"> </span>There is a tried & true adage that liberty and security rarely go hand-in-hand.<span class="Apple-converted-space"> </span>We frequently give up liberty for security.<span class="Apple-converted-space"> </span>Been to the airport lately? <span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Finally, the argument was also brought up about mistaken identification of traders of CSAM images through this new process.<span class="Apple-converted-space"> </span>If we take Apple’s statement at face-value, there is a one in “one trillion chance per year” that this could happen, meaning it is far less than statistically insignificant.<span class="Apple-converted-space"> </span>I’m also quite certain the army of Legal Counsel at Apple have thoroughly reviewed and signed-off on this practice.</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGumUW-SGWLmnLv0hwc8ARNQmgq2v7IKQaJ-uIqBtg7eBP0wITm_N8iWCuj3ljNnX8lQbo-xn4vHFGUFW4JgD0piEJpis80UPpXBuKkpSu25T87HYsepwqXfvvEKaTspLstUOMoitKxwCd/" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="640" data-original-width="960" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGumUW-SGWLmnLv0hwc8ARNQmgq2v7IKQaJ-uIqBtg7eBP0wITm_N8iWCuj3ljNnX8lQbo-xn4vHFGUFW4JgD0piEJpis80UPpXBuKkpSu25T87HYsepwqXfvvEKaTspLstUOMoitKxwCd/" width="320" /></a></div><p></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p7" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px; text-align: center;"><br /></p><p class="p9" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>Wrapping It Up</b></span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">This is a hot topic that won’t soon go away.<span class="Apple-converted-space"> </span>Apple has caught heat many times for many different approaches over the years and this is just the latest measure to garner such attention.<span class="Apple-converted-space"> </span>It is ultimately up to us as the consumers of Apple to decide… Do we want to give up a tiny bit of privacy (for now) in furtherance of the mission to stem the flow of child sex abuse images or do we care more about privacy over the content of our devices?<span class="Apple-converted-space"> </span>It’s a personal choice and fortunately, we still have the freedom to choose in the United States!</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p11" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">NOTE:<span class="Apple-converted-space"> </span>Article with additional information published on 8/9/2021:<span class="Apple-converted-space"> </span><a href="%22"><span class="s1">https://www-bbc-com.cdn.ampproject.org/c/s/www.bbc.com/news/technology-58145943.amp</span></a><span class="Apple-converted-space"> </span></span></p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Author:<span class="Apple-converted-space"> </span></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Patrick J. Siewert</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Founder & Principal Consultant</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Professional Digital Forensic Consulting, LLC<span class="Apple-converted-space"> </span></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Virginia DCJS #11-14869</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Based in Richmond, Virginia</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Available Wherever You Need Us!</p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p12" style="color: #c00000; font-family: Helvetica; font-size: 22px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; text-align: center;"><span class="s1" style="text-decoration-line: underline;"><i>We Find the Truth for a Living</i></span><i>!</i></p><p class="p12" style="color: #c00000; font-family: Helvetica; font-size: 22px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; text-align: center;"><i><br /></i></p><p class="p13" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px; text-align: center;">Computer Forensics -- Mobile Forensics -- Specialized Investigation</p><p class="p14" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px;">About the Author:</p><p class="p14" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px;">Patrick Siewert is the Founder & Principal Consultant of <a href="https://prodigital4n6.com/"><span class="s2" style="color: #0563c1;">Pro Digital Forensic Consulting</span></a>, based in Richmond, Virginia (USA).<span class="Apple-converted-space"> </span>In 15 years of law enforcement, he investigated hundreds of high-tech crimes to precedent-setting results and continues to support litigation cases and corporations in his digital forensic practice.<span class="Apple-converted-space"> </span>Patrick is a graduate of SCERS & BCERT and holds several vendor-neutral and specific certifications in the field of digital forensics and high-tech investigation and is a court-certified expert witness.<span class="Apple-converted-space"> </span>He continues to hone his digital forensic expertise in the private sector while growing his consulting & investigation business servicing litigators and their clients, professional investigators and corporations, while keeping in touch with the public safety community as a Law Enforcement Instructor.</p><p class="p11" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Email:<span class="Apple-converted-space"> </span></span><span class="s1" style="text-decoration-line: underline;">Inquiries@ProDigital4n6.com</span></p><p class="p11" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Web: <a href="https://prodigital4n6.com/"><span class="s1">https://ProDigital4n6.com</span></a></span></p><p class="p11" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Pro Digital Forensic Consulting on LinkedIn: <a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc"><span class="s1">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</span></a></span></p><p class="p11" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Patrick Siewert on LinkedIn:<span class="Apple-converted-space"> </span><a href="https://www.linkedin.com/in/patrick-siewert-92513445/"><span class="s1">https://www.linkedin.com/in/patrick-siewert-92513445/</span></a> </span><span class="Apple-converted-space"> </span></p>Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comVirginia, USA37.4315734 -78.65689429.1213395638211523 -113.8131442 65.741807236178843 -43.500644199999996tag:blogger.com,1999:blog-9015068036075853317.post-46064313070296874872021-07-14T16:11:00.001-04:002021-07-14T16:11:10.760-04:00Three Myths About Digital Forensics as a Practice<p><span style="font-family: Helvetica; font-size: 12px;">July 14, 2021</span></p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p4" style="color: #c00000; font-family: Helvetica; font-size: 18px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; text-align: center;"><span class="s1" style="text-decoration-line: underline;">Three Myths About Digital Forensics as a Practice</span></p><p class="p5" style="color: #c00000; font-family: Helvetica; font-size: 18px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 22px; text-align: center;"><span class="s1" style="text-decoration-line: underline;"></span><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Following up on last month’s article about “<a href="https://prodigital4n6.com/three-faqs-about-digital-forensics-as-a-service/"><span class="s2" style="color: #0563c1;">Three FAQs About Digital Forensics as a Service</span></a>”, we thought it useful to spend some time debunking some myths about digital forensics from both a general practitioner and service provider perspective. <span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Every industry comes with “urban legends” or popularized myths that surround the practice.<span class="Apple-converted-space"> </span>Many of these rarely represent reality and some are outright false.<span class="Apple-converted-space"> </span>The more intriguing or interesting the field, the more pervasive these falsehoods can be.<span class="Apple-converted-space"> </span>Digital Forensics is no different than any other industry in this respect.<span class="Apple-converted-space"> </span>The reality is that TV and movies have sensationalized what we do to the point where there are several misconceptions about the practice of digital forensics, which run the gamut of the various sub-sets of the practice and affect those in law enforcement, private sector litigation support, incident response and government contractors.<span class="Apple-converted-space"> </span>While Hollywood has tried to make the profession “sexy”, there are some realities to this field, including the long hours spent staring at a computer monitor, developing a script or researching an application.<span class="Apple-converted-space"> </span>While not overly exciting, those are activities in which any practitioner worth their salt needs to engage on a regular basis… But it doesn’t make for good TV.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">In order to dispel some common myths about our field, three of these misconceptions are discussed in this article.<span class="Apple-converted-space"> </span>This selection of industry myths has been garnered through discussing and working cases with people outside the industry over the combined time in law enforcement and private sector practice of digital forensics for the past 12 years.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p7" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>Myth #1:<span class="Apple-converted-space"> </span>Nothing Is Ever Truly Deleted</b></span></p><p class="p8" style="color: red; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 17px;"><span class="s1" style="text-decoration-line: underline;"><b></b></span><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">I wish this were true.<span class="Apple-converted-space"> </span>However, the reality is that it is not.<span class="Apple-converted-space"> </span>Not only are there anti-forensics methods readily available to users on the market (i.e., Hillary Clinton and “<a href="https://en.wikipedia.org/wiki/BleachBit"><span class="s2" style="color: #0563c1;">BleachBit</span></a>”), but increasingly there are measures being put in place at the manufacturing level for both mobile devices and higher-end computer systems that make deletion of data a permanent state.<span class="Apple-converted-space"> </span>To be more accurate, the security over the stored data is such that when and item is deleted, it is often not recoverable. <span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">For example, on an iPhone, data is stored in the same basic way for most applications.<span class="Apple-converted-space"> </span>However, if an item is deleted from the phone, depending on the type of item (i.e., picture or video vs. text message), the item is sent to free space on the phone memory, which is encrypted and not accessible through the forensic process.<span class="Apple-converted-space"> </span>The image may not be gone, per se, but it is not accessible or viewable.<span class="Apple-converted-space"> </span>On newer Mac computers and other devices equipped with solid-state memory (i.e., not a spinning hard drive), there is a process in place called “Trim” which also helps clean up the free space of the memory and makes recovery of deleted items extremely difficult, if not impossible.<span class="Apple-converted-space"> </span>In the era of heightened data security, these measures are becoming more commonplace.<span class="Apple-converted-space"> </span>Deleted text messages that were once partially recoverable are now increasingly unavailable, even with the most state-of-the-art forensic tools. <span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgP4zF-RGmpxSHFNfmcLNyDg9HUBKY6coja-zn1jM3A7dMYHy-4SlsPeYwzykchCrFODULpXY3Z-1i6tocUydRQgyl1ooP4czSJp_f2yodn7hpAbjcQz0-kDyU23ed9I6KxMUa7PIXxBkDU/s835/Delete+Button.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="720" data-original-width="835" height="296" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgP4zF-RGmpxSHFNfmcLNyDg9HUBKY6coja-zn1jM3A7dMYHy-4SlsPeYwzykchCrFODULpXY3Z-1i6tocUydRQgyl1ooP4czSJp_f2yodn7hpAbjcQz0-kDyU23ed9I6KxMUa7PIXxBkDU/w343-h296/Delete+Button.webp" width="343" /></a></div><br /><p class="p9" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px; text-align: center;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">There are almost always alternative storage methods, however.<span class="Apple-converted-space"> </span>Hard backups (computer-based) or copies or cloud-based data can all be potential areas where valuable evidence can exist, but the reality of the digital consumer marketplace is that if all we have is the device and nothing else, we <i>may</i> not get your deleted data. <span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p9" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px; text-align: center;"><br /></p><p class="p7" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>Myth #2:<span class="Apple-converted-space"> </span>If It’s Deleted, It’s Gone</b></span></p><p class="p10" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 17px;"><span class="s1" style="text-decoration-line: underline;"><b></b></span><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">I know this sounds totally contradictory to the previous comments and Myth #1, but just because it’s deleted, doesn’t mean the evidence you need is gone.<span class="Apple-converted-space"> </span>Indeed, this is and always has been at the heart of the forensic process.<span class="Apple-converted-space"> </span>We utilized industry-standard methods to acquire, analyze, recover and report about the data.<span class="Apple-converted-space"> </span>The emphasis with this myth is the recovery part.<span class="Apple-converted-space"> </span>I tell potential clients and attorneys all the time, the data is *<i>usually</i>* stored in more than one place.<span class="Apple-converted-space"> </span>The aforementioned cloud-based data storage being the most ubiquitous, but there can also be additional data stored in some surprising places.<span class="Apple-converted-space"> </span>The more data we can get our hands on that is related to the matter at-hand, the more success we will have in getting you some evidence that will help confirm or refute your assertions in the case.<span class="Apple-converted-space"> </span>There are also methods of analysis that a trained, competent examiner will attempt to incorporate in many cases, including partial recovery of valuable data from places like file-slack (leftover space where a file may have previously existed) or volume shadow copies that are automatically created in Windows. <span class="Apple-converted-space"> </span></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="Apple-converted-space"><br /></span></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidSLLZtOPWu8UVPF99g_C3QpXruQVdNiiCpeFmxPxx-eYQTgfXzW3RQfnVcRDxrl_aGOFQVYqegFZPxpscJDUNJ7eNh3ngkhenHX_0waqYNlR2SXZRck5AkN1WmgTu_SKAKKGDuA7-9bbJ/s960/cloud-computing.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="640" data-original-width="960" height="248" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidSLLZtOPWu8UVPF99g_C3QpXruQVdNiiCpeFmxPxx-eYQTgfXzW3RQfnVcRDxrl_aGOFQVYqegFZPxpscJDUNJ7eNh3ngkhenHX_0waqYNlR2SXZRck5AkN1WmgTu_SKAKKGDuA7-9bbJ/w373-h248/cloud-computing.jpg" width="373" /></a></div><br /><span class="Apple-converted-space"><br /></span><p></p><div class="separator" style="clear: both; text-align: center;"><span style="font-family: Helvetica; font-size: 12px; text-align: left;">In most cases, the proverbial smoking gun is not a realistic possibility.</span><span class="Apple-converted-space" style="font-family: Helvetica; font-size: 12px; text-align: left;"> </span><span style="font-family: Helvetica; font-size: 12px; text-align: left;">We have certainly worked and seen cases where the smoking gun has come about and it has always met with great success, but the reality of our practice is that we will likely find *</span><i style="font-family: Helvetica; font-size: 12px; text-align: left;">something</i><span style="font-family: Helvetica; font-size: 12px; text-align: left;">* to help you, but it may not be the one piece of evidence that will confirm or refute the matter at-hand.</span><span class="Apple-converted-space" style="font-family: Helvetica; font-size: 12px; text-align: left;"> </span><span style="font-family: Helvetica; font-size: 12px; text-align: left;">Will it add value?</span><span class="Apple-converted-space" style="font-family: Helvetica; font-size: 12px; text-align: left;"> </span><span style="font-family: Helvetica; font-size: 12px; text-align: left;">Most likely.</span><span class="Apple-converted-space" style="font-family: Helvetica; font-size: 12px; text-align: left;"> </span><span style="font-family: Helvetica; font-size: 12px; text-align: left;">The real value comes in with the examiner’s ability to articulate what they did, how they found what they did and to explain these findings in non-technical terms that everyone can understand. </span><span class="Apple-converted-space" style="font-family: Helvetica; font-size: 12px; text-align: left;"> </span></div><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Tools don’t do the work.<span class="Apple-converted-space"> </span>They present the data for the analyst to do the work, so make sure your analyst is knowledgeable and not afraid of doing the work.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p9" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px; text-align: center;"><br /></p><p class="p7" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>Myth #3:<span class="Apple-converted-space"> </span>It’s Just A Phone… What’s The Big Deal?</b></span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">It’s not unlikely that the origination of this myth is rooted in our innate perception of the fact that the size of things should equal more cost.<span class="Apple-converted-space"> </span>Bigger vehicles cost more than smaller vehicles.<span class="Apple-converted-space"> </span>Bigger houses cost more than smaller ones, and so on.<span class="Apple-converted-space"> </span>So why should a device that fits in my pocket be more of a challenge to acquire and analyze data than my laptop or desktop computer? <span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">In recent years, the marketplace has demanded that phones be more complex, store more data and be much more secure than your computer.<span class="Apple-converted-space"> </span>Apple comes out with a new iteration of iPhone every year, and they usually (and much more quietly) update their computer hardware and software as well, but the emphasis since the inception of the iPhone has been on the mobile device.<span class="Apple-converted-space"> </span>So what’s so problematic about it?</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgr_DLYuYDll4MwQq7dE8ZxKP4OLN63UKD1kj9Hh2erD-U0vD3L8PsuQDjpLE2lobr6IvJkTTStm5RvWBH7kDUlJOk_5GRJJ81MmHZAi7c6MV-dPKL7lKPCBstV1e08CjhctXE5vDZqI3oI/s960/Apps+on+Phone.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="640" data-original-width="960" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgr_DLYuYDll4MwQq7dE8ZxKP4OLN63UKD1kj9Hh2erD-U0vD3L8PsuQDjpLE2lobr6IvJkTTStm5RvWBH7kDUlJOk_5GRJJ81MmHZAi7c6MV-dPKL7lKPCBstV1e08CjhctXE5vDZqI3oI/w400-h266/Apps+on+Phone.jpg" width="400" /></a></div><br /><p class="p9" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px; text-align: center;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">As I tell attorneys and their clients frequently, many times we are acquiring the data that Apple <i>allows</i> us to have.<span class="Apple-converted-space"> </span>To be clear, this is almost always more than what the user could do themselves and in a forensically sound manner appropriate for evidence presentation, but Apple can be quite restrictive for non-law enforcement to obtain data.<span class="Apple-converted-space"> </span>We get the basics – messages, photos, videos, web history, and supported app data.<span class="Apple-converted-space"> </span>Many times we can also analyze unsupported app data as well.<span class="Apple-converted-space"> </span>But much of the deleted data is unavailable.<span class="Apple-converted-space"> </span>In recent years, more advanced methods for acquiring iPhone data have come about, but they are only available on certain iterations of the iPhone hardware and software.<span class="Apple-converted-space"> </span>But to be clear, we always try to get as much data as possible.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Android phones are increasingly problematic as well.<span class="Apple-converted-space"> </span>Last year, we had a Samsung Galaxy S20 in for acquisition and analysis.<span class="Apple-converted-space"> </span>I was amazed at how little data we obtained, despite multiple attempts at multiple different methods of acquisition.<span class="Apple-converted-space"> </span>Fortunately, the mobile forensic tool developers are always coming out with newer ways to get more data for our use and analysis, but it’s a constant game of catch-up. <span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">A final point about the volume of data that can be analyzed on phones, Apple currently has up to 512 GB of storage on an iPhone.<span class="Apple-converted-space"> </span>Some Android phones are pushing to 1TB or more worth of storage.<span class="Apple-converted-space"> </span>That may not seem like a lot when you’re using the phone, but it’s A LOT of data.<span class="Apple-converted-space"> </span>And the more we have to search that mountain of data, the longer it takes.<span class="Apple-converted-space"> </span>These are not the Nokia flip phones we all had in the mid-2000’s.<span class="Apple-converted-space"> </span>They’re not even the Blackberry Pearl you had and thought was so cool.<span class="Apple-converted-space"> </span>These are complex computer devices with as much storage capacity as many commonly used computer systems, with many enhanced security measures.<span class="Apple-converted-space"> </span>They may be small, but they’re mighty!</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p7" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>Wrapping It Up</b></span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">The myths discussed here are a small sample of the push-back we sometimes get when it comes to the length of time and the cost associated with acquisition, analysis and reporting about the data on these devices.<span class="Apple-converted-space"> </span>For those in law enforcement, phones are seized daily and sometimes the means by which to simply acquire the data are challenging and time-consuming (if not impossible).<span class="Apple-converted-space"> </span>We are not miracle workers, but we do try to get you data that you can use in your case to help confirm or refute your suspicions or claims.<span class="Apple-converted-space"> </span>Just know, it’s not always easy, it’s not always quick and it’s unfortunately not always possible.<span class="Apple-converted-space"> </span>Sometimes, we just don’t know until we get into analyzing the data!</p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Author:<span class="Apple-converted-space"> </span></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Patrick J. Siewert</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Principal Consultant</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Professional Digital Forensic Consulting, LLC<span class="Apple-converted-space"> </span></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Virginia DCJS #11-14869</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Based in Richmond, Virginia</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Available Wherever You Need Us!</p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p11" style="color: #c00000; font-family: Helvetica; font-size: 22px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; text-align: center;"><span class="s1" style="text-decoration-line: underline;"><i>We Find the Truth for a Living</i></span><i>!</i></p><p class="p12" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px; text-align: center;">Computer Forensics -- Mobile Forensics -- Specialized Investigation</p><p class="p13" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px;">About the Author:</p><p class="p13" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px;">Patrick Siewert is the Founder & Principal Consultant of <a href="https://prodigital4n6.com/"><span class="s2" style="color: #0563c1;">Pro Digital Forensic Consulting</span></a>, based in Richmond, Virginia (USA).<span class="Apple-converted-space"> </span>In 15 years of law enforcement, he investigated hundreds of high-tech crimes to precedent-setting results and continues to support litigation cases and corporations in his digital forensic practice.<span class="Apple-converted-space"> </span>Patrick is a graduate of SCERS & BCERT and holds several vendor-neutral and specific certifications in the field of digital forensics and high-tech investigation and is a court-certified expert witness.<span class="Apple-converted-space"> </span>He continues to hone his digital forensic expertise in the private sector while growing his consulting & investigation business servicing litigators and their clients, professional investigators and corporations, while keeping in touch with the public safety community as a Law Enforcement Instructor.</p><p class="p14" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Email:<span class="Apple-converted-space"> </span></span><span class="s1" style="text-decoration-line: underline;">Inquiries@ProDigital4n6.com</span></p><p class="p14" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Web: <a href="https://prodigital4n6.com/"><span class="s1">https://ProDigital4n6.com</span></a></span></p><p class="p14" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Pro Digital Forensic Consulting on LinkedIn: <a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc"><span class="s1">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</span></a></span></p><p class="p14" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Patrick Siewert on LinkedIn:<span class="Apple-converted-space"> </span><a href="https://www.linkedin.com/in/patrick-siewert-92513445/"><span class="s1">https://www.linkedin.com/in/patrick-siewert-92513445/</span></a><span class="Apple-converted-space"> </span></span></p><div class="separator" style="clear: both; text-align: center;"><br /></div><br /><div class="separator" style="clear: both; text-align: center;"><br /></div><br />Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comVirginia, USA37.4315734 -78.65689429.1213395638211523 -113.8131442 65.741807236178843 -43.500644199999996tag:blogger.com,1999:blog-9015068036075853317.post-45968934871684719182021-06-09T15:03:00.000-04:002021-06-09T15:03:44.969-04:00Three FAQs About Digital Forensics as a Service<p> <span style="font-family: Helvetica; font-size: 12px;">June 8, 2021</span></p><p class="p2" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p3" style="color: #c00000; font-family: Helvetica; font-size: 18px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; text-align: center;"><span class="s1" style="text-decoration-line: underline;">Three FAQs About Digital Forensics as a Service</span></p><p class="p4" style="color: #c00000; font-family: Helvetica; font-size: 18px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 22px; text-align: center;"><span class="s1" style="text-decoration-line: underline;"></span><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">There are many tentacles to the practice of digital forensics.<span class="Apple-converted-space"> </span><a href="https://prodigital4n6.com/keys-to-success-in-digital-forensics-incident-response-vs-litigation-support/"><span class="s2" style="color: #0563c1;">As explored in a previous article, there can be two main tracks to the practice of digital forensics:<span class="Apple-converted-space"> </span>Incident Response & Litigation Support</span></a>.<span class="Apple-converted-space"> </span>Along the same vein, there are practitioners both in the public sector (law enforcement, government contractors, etc.) and the private sector.<span class="Apple-converted-space"> </span>While the practice is essentially the same across both sectors, the types of cases called upon to work and the complaints or inquiries received can be vastly different. <span class="Apple-converted-space"> </span></p><p class="p5" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">When I was a law enforcement examiner, my time was spent mainly investigating criminal incidents involving child sex abuse material (CSAM) and other crimes, such as fraud, cyber-stalking, etc.<span class="Apple-converted-space"> </span>After transitioning to the private sector, I found the case inquiries and cases worked to be quite different.<span class="Apple-converted-space"> </span>Sure, there’s a minority percentage of cases in the criminal realm, but many of our cases span family law, corporate law, intellectual property theft and other civil disputes.<span class="Apple-converted-space"> </span>One of the most notable areas that the shift has occurred has been in the types of inquires receive.<span class="Apple-converted-space"> </span>The three questions explored and answered here are designed to provide those would-be clients with answers that they can readily access without the need to contact a forensic service provider and to help provide guidance for some in our industry as a whole.<span class="Apple-converted-space"> </span>These questions are taken directly from inquiries we receive weekly.</p><p class="p5" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p6" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>FAQ #1:<span class="Apple-converted-space"> </span>I think someone (estranged spouse, other person) is “hacking” me.<span class="Apple-converted-space"> </span>Can you find out who it is</b></span><b>?</b></p><p class="p7" style="color: red; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 17px;"><span class="s1" style="text-decoration-line: underline;"><b></b></span><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">This is probably the most frequent question we receive and it eats up a ton of time.<span class="Apple-converted-space"> </span>Indeed, there are many reasons why someone might feel they’ve been “hacked”, but at a 30,000-foot level, it’s not likely.<span class="Apple-converted-space"> </span>Why isn’t it likely?<span class="Apple-converted-space"> </span>Well, the first question anyone needs to ask themselves is <b><i>WHY</i></b> would someone hack your devices on purpose?<span class="Apple-converted-space"> </span><a href="https://en.wikipedia.org/wiki/Jeff_Bezos_phone_hacking"><span class="s2" style="color: #0563c1;">Jeff Bezos’ iPhone was hacked</span></a>.<span class="Apple-converted-space"> </span>He’s also the CEO of a multi-billion dollar corporation and he was targeted with a very specific electronic exploit by a quasi-trusted source in a coordinated event and the means to hack his device were engineered specifically for that purpose.<span class="Apple-converted-space"> </span>Let’s be clear:<span class="Apple-converted-space"> </span>No one is likely doing that to <b>YOU</b>.<span class="Apple-converted-space"> </span>The time, effort, resources and level of technical sophistication needed to hack an individual’s devices at that level are so advanced and multi-faceted that no one with a standard or mid-range knowledge of computers or cell phones would be able to do that to you.</p><p class="p5" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">And just because they “work in I.T.” doesn’t mean they have any advanced coding<span class="Apple-converted-space"> </span>knowledge to be able to hack your devices.</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0YrmpHGt83FTzZ6-J-8zTOVhJ8bahPcaE0guAzvVBDOnb4iJFOiHtl6c_kf5IP-SbC1Pm97RPedWkhB7I-71CksCirXsm1FI4lo8ktG7t2P9bm3aBg74Vf3grcnWpu-J-T-1ZHc1ddLsJ/s720/hacked.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="720" data-original-width="720" height="284" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0YrmpHGt83FTzZ6-J-8zTOVhJ8bahPcaE0guAzvVBDOnb4iJFOiHtl6c_kf5IP-SbC1Pm97RPedWkhB7I-71CksCirXsm1FI4lo8ktG7t2P9bm3aBg74Vf3grcnWpu-J-T-1ZHc1ddLsJ/w284-h284/hacked.png" width="284" /></a></div><p class="p3" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px; text-align: center;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Most of these allegations surround mobile devices, but to be more specific, an iPhone is quite difficult to “hack”, at least to the level where one would be reading your text messages or tracking your location or listening to your calls.<span class="Apple-converted-space"> </span>Everything on the phone needs to run in an application and there are no applications on the Apple App Store which allow this type of activity.<span class="Apple-converted-space"> </span>This is why iPhones are generally considered more secure than Android devices – because you *have* to run everything as an app and the only place to get an app is the App Store and Apple has tight controls over what they allow on the App Store.<span class="Apple-converted-space"> </span></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">What is likely the case in roughly 99.9% of instances is that access was granted by the iCloud account holder (i.e., iPhone owner) to the alleged hacker at some point prior to the “hacking” and they are using utilities like Find my iPhone and iMessage syncing to track these locations and activities.<span class="Apple-converted-space"> </span>Also not unlikely is that a formerly-trusted source knows your standard passwords and accessed your account using one of those, and may even have 2-factor authentication access from an older device.<span class="Apple-converted-space"> </span>Change your iCloud login and password and make the password strong and unique.<span class="Apple-converted-space"> </span>Also, <a href="https://www.businessinsider.com/how-to-remove-a-device-from-icloud"><span class="s1" style="color: #0563c1;">disconnect older devices from your iCloud</span></a>.<span class="Apple-converted-space"> </span>Finally, don’t use public wi-fi.</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Android devices, while theoretically easier to “hack” than iPhones, still require some access for 99.9% of users to be able to track location, read messages, etc.<span class="Apple-converted-space"> </span>Apple, Samsung, LG, etc. don’t make money and keep customers by making their devices easy to exploit to any sort of hacking activity.<span class="Apple-converted-space"> </span>If that were the case, we’d all be walking around with hacked smart phones.<span class="Apple-converted-space"> </span>The security on these devices, particularly the newer models, is strong enough to ensure that the vast majority of people to whom access is not granted to the data, cannot access the data… And with each new generation of device, the security gets stronger. <span class="Apple-converted-space"> </span></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">The reality is that we are all bleeding our location, purchase history, check-in activity, life events and much more on our mobile devices every day without even realizing it.<span class="Apple-converted-space"> </span>Google has more data on you than the NSA and they exploit it to make money.<span class="Apple-converted-space"> </span>Does hacking of an iPhone or Android phone happen? Yes.<span class="Apple-converted-space"> </span>But it is very, very unlikely for 99.9% of users.</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">As a final note, I tell all potential clients that call with this complaint, hacking in many forms is a crime.<span class="Apple-converted-space"> </span>If you have evidence you’ve been hacked, report that to the authorities and initiate a criminal investigation.<span class="Apple-converted-space"> </span>They work for you and you pay them with your tax dollars.<span class="Apple-converted-space"> </span>They also have the power to issue things like subpoenas and search warrants, which any private practitioner does not.<span class="Apple-converted-space"> </span>In short, they can help you much more than we can.</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p4" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 17px;"><span class="s2" style="text-decoration-line: underline;"><b></b></span><br /></p><p class="p5" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s2" style="text-decoration-line: underline;"><b>FAQ #2:<span class="Apple-converted-space"> </span>Someone is sending me harassing text messages anonymously.<span class="Apple-converted-space"> </span>Can you identify who it is</b></span><b>?</b></p><p class="p4" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 17px;"><span class="s2" style="text-decoration-line: underline;"><b></b></span><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">The short answer to this is, probably not.<span class="Apple-converted-space"> </span>If the only evidence we are afforded are the text messages from the phone of the person receiving them, there isn’t much evidence for us to investigate from the device itself.<span class="Apple-converted-space"> </span>The existence of the text messages is not in dispute, the origin is what is sought.<span class="Apple-converted-space"> </span>Most of these numbers are issued through a third-party and purposely anonymous at a practical level, so our ability to track down the number to a specific person is very limited. <span class="Apple-converted-space"> </span></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">In order to track the number to a person, litigation needs to be in place or a criminal investigation needs to be undertaken.<span class="Apple-converted-space"> </span>This will provide the power of subpoena or search warrant to help track down and follow the bread-crumb trail to who may be responsible.<span class="Apple-converted-space"> </span>Even still, this can require multiple levels of subpoena, which can take time and often be a dead-end in the investigation.</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Harassing text messages and/or calls are annoying.<span class="Apple-converted-space"> </span>They may even be illegal, depending on where you live.<span class="Apple-converted-space"> </span>But it’s much easier and less expensive to change your phone number and let trusted friends & family know you’ve changed your number than it is to try to dig down into the rabbit-hole that is a chain of subpoenas to try and track down who is responsible.<span class="Apple-converted-space"> </span>As a wise man once said to me, “the juice isn’t worth the squeeze”.</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuxL9wCwdl82uDTi-jss8dwDQbpTxA0haej_IK3tfQbLqgOadYoqraG7GmKjbprbD-kqzdXXrLrusV0rMJGxGxlOV9UFE74Z6EOCheWChc9HV3g7LS9ZL-JezV3bWes0HjR43yW3Y0kA2W/s960/Computer+Cell+Phone.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="640" data-original-width="960" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuxL9wCwdl82uDTi-jss8dwDQbpTxA0haej_IK3tfQbLqgOadYoqraG7GmKjbprbD-kqzdXXrLrusV0rMJGxGxlOV9UFE74Z6EOCheWChc9HV3g7LS9ZL-JezV3bWes0HjR43yW3Y0kA2W/w400-h266/Computer+Cell+Phone.webp" width="400" /></a></div><br /><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p3" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px; text-align: center;"><br /></p><p class="p5" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s2" style="text-decoration-line: underline;"><b>FAQ #3:<span class="Apple-converted-space"> </span>I suspect my spouse or significant other is cheating. Can you analyze their phone to let me know if this is true or not</b></span><b>?</b></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">We get this question a lot.<span class="Apple-converted-space"> </span>And it’s usually followed up with a statement by the would-be client that “the account is in my name”.<span class="Apple-converted-space"> </span>The problem is, the data isn’t in your name, and the data is what you’re asking us to analyze.<span class="Apple-converted-space"> </span>The issue of marital ownership of property can get a bit murky, particularly when one feels their trust is being violated. <span class="Apple-converted-space"> </span></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">I know a lot about the law, but I am not a lawyer.<span class="Apple-converted-space"> </span>Generally, we refer people who ask for this service to consult an attorney and the natural rebuttal is “I want proof that something is going on before I get an attorney”.<span class="Apple-converted-space"> </span>At that point, we gracefully exit.<span class="Apple-converted-space"> </span>Why?<span class="Apple-converted-space"> </span>Because past instances have taught us that getting involved in domestic issues where there is no litigation is messy and fraught with complications.<span class="Apple-converted-space"> </span>In short, we’re not going to be the reason you get a divorce.</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Aside from that, there are technical issues which can arise in this.<span class="Apple-converted-space"> </span>The first is access to the data.<span class="Apple-converted-space"> </span>For all modern cell phones, we need the pass code in order to obtain the data.<span class="Apple-converted-space"> </span>Period.<span class="Apple-converted-space"> </span>There are no notable exceptions to this for private sector practitioners.<span class="Apple-converted-space"> </span>Oh, you have the pass code?<span class="Apple-converted-space"> </span>Great.<span class="Apple-converted-space"> </span>We still won’t do it.<span class="Apple-converted-space"> </span>Modern mobile forensic tools also extract authentication keys for social media and other cloud accounts, which is a very powerful tool, particularly if used in the wrong hands.<span class="Apple-converted-space"> </span>By accessing the data on the phone and/or the data on the cloud without proper authorization, we are breaking the law.<span class="Apple-converted-space"> </span>There is no client or any amount of money who would convince us that our professional integrity and reputation is worth one case.<span class="Apple-converted-space"> </span>Finally, if we engaged in this practice and the case did go to litigation, we’d have to testify about how we accessed the data and by what authority.<span class="Apple-converted-space"> </span>That would be a tough question to answer.</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Are there digital forensic practitioners who will do this?<span class="Apple-converted-space"> </span>Absolutely.<span class="Apple-converted-space"> </span>Please contact them and let me know how their testimony goes.</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p5" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s2" style="text-decoration-line: underline;"><b>Wrapping It Up</b></span></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">The FAQs discussed here are just a sampling of some of those we receive quite regularly.<span class="Apple-converted-space"> </span>And while the answers may have a bit of pointed clarification in them, they also touch on a wider theme of ethical practices in private sector digital forensics.<span class="Apple-converted-space"> </span>When you are researching a digital forensic service provider, please ask yourself 1) is what you’re asking them to do within the bounds of the law and/or ethical practices and 2) if they agreed to do it for you, what does that say about their ethical standards? <span class="Apple-converted-space"> </span>The training, tools and ability to do what we do are all extraordinarily powerful and if used by the wrong type of practitioner, could lead to drastic consequences.<span class="Apple-converted-space"> </span>Violations of what could be termed “standards of practice” will affect the industry as a whole.<span class="Apple-converted-space"> </span>Let’s all work together to ensure that doesn’t happen.</p><p class="p6" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Author:<span class="Apple-converted-space"> </span></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Patrick J. Siewert</p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Principal Consultant</p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Professional Digital Forensic Consulting, LLC<span class="Apple-converted-space"> </span></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Virginia DCJS #11-14869</p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Based in Richmond, Virginia</p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Available Wherever You Need Us!</p><p class="p6" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p6" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p7" style="color: #c00000; font-family: Helvetica; font-size: 22px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; text-align: center;"><span class="s2" style="text-decoration-line: underline;"><i>We Find the Truth for a Living</i></span><i>!</i></p><p class="p8" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px; text-align: center;">Computer Forensics -- Mobile Forensics -- Specialized Investigation</p><p class="p9" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px;">About the Author:</p><p class="p9" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px;">Patrick Siewert is the Founder & Principal Consultant of <a href="https://prodigital4n6.com/"><span class="s1" style="color: #0563c1;">Pro Digital Forensic Consulting</span></a>, based in Richmond, Virginia (USA).<span class="Apple-converted-space"> </span>In 15 years of law enforcement, he investigated hundreds of high-tech crimes to precedent-setting results and continues to support litigation cases and corporations in his digital forensic practice.<span class="Apple-converted-space"> </span>Patrick is a graduate of SCERS & BCERT and holds several vendor-neutral and specific certifications in the field of digital forensics and high-tech investigation and is a court-certified expert witness.<span class="Apple-converted-space"> </span>He continues to hone his digital forensic expertise in the private sector while growing his consulting & investigation business marketed toward litigators, professional investigators and corporations, while keeping in touch with the public safety community as a Law Enforcement Instructor.</p><p class="p10" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Email:<span class="Apple-converted-space"> </span></span><span class="s2" style="text-decoration-line: underline;">Inquiries@ProDigital4n6.com</span></p><p class="p10" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Web: <a href="https://prodigital4n6.com/"><span class="s2">https://ProDigital4n6.com</span></a></span></p><p class="p10" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Pro Digital Forensic Consulting on LinkedIn: <a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc"><span class="s2">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</span></a></span></p><p class="p1" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="Apple-converted-space"></span></p><p class="p10" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Patrick Siewert on LinkedIn:<span class="Apple-converted-space"> </span><a href="https://www.linkedin.com/in/patrick-siewert-92513445/"><span class="s2">https://www.linkedin.com/in/patrick-siewert-92513445/</span></a> </span><span class="Apple-converted-space"> </span></p><p></p>Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comVirginia, USA37.4315734 -78.65689429.1213395638211523 -113.8131442 65.741807236178843 -43.500644199999996tag:blogger.com,1999:blog-9015068036075853317.post-24799598815125867182021-02-22T13:13:00.004-05:002021-02-23T13:21:17.292-05:00Keys To Success in Digital Forensics: Incident Response vs. Litigation Support<p><span style="font-family: Helvetica; font-size: 12px;">February 22, 2021</span></p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p4" style="color: #c00000; font-family: Helvetica; font-size: 18px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; text-align: center;"><span class="s1" style="text-decoration-line: underline;">Keys To Success in Digital Forensics:<span class="Apple-converted-space"> </span>Incident Response vs. Litigation Support</span></p><p class="p5" style="color: #c00000; font-family: Helvetica; font-size: 18px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 22px; text-align: center;"><span class="s1" style="text-decoration-line: underline;"></span><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Digital forensics as a practice and as a service has been evolving for since its inception.<span class="Apple-converted-space"> </span>Among the evolutionary explosions we’ve seen in the field are the hardware, the size of data repositories, the data storage technology and the tools we use to acquire and analyze the data we come across in our analysis cases.<span class="Apple-converted-space"> </span>The advent of remote work, cloud data storage, universal use of email and internet-based applications and the development of bad actors on a worldwide scale has confirmed that the field of digital forensics will be not only present, but necessary now and well into the future.<span class="Apple-converted-space"> </span>We’ve also seen offerings in academia growing with colleges offering coursework in both undergraduate and graduate programs focusing on digital forensics.<span class="Apple-converted-space"> </span>What is sometimes overlooked, however, is the nuance that there is more than one path within the field of digital forensics.<span class="Apple-converted-space"> </span>So which path will you choose:<span class="Apple-converted-space"> </span>Incident Response (IR) or Litigation Support?</p><p class="p7" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px; text-align: center;"><br /></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p8" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>Incident Response Path</b></span></p><p class="p9" style="color: red; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 17px;"><span class="s1" style="text-decoration-line: underline;"><b></b></span><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">To help to identify which path is appropriate, it’s probably best to first define the particular path.<span class="Apple-converted-space"> </span>Digital Forensic Incident Response (DFIR) is defined loosely by a myriad of online resources as incorporating digital forensics techniques to identify bad actors at the heart of malicious attacks on networks networks and systems.<span class="Apple-converted-space"> </span>This can include malware/spyware infections, hacker attacks, data theft, data leakage, etc.<span class="Apple-converted-space"> </span>This is often referred to as an arm of Cybersecurity and is <span class="s1" style="text-decoration-line: underline;"><i>part</i></span> of what many cybersecurity professionals do.<span class="Apple-converted-space"> </span>But all one has to do is look up jobs for a Cybersecurity Responder or Engineer to read the litany of responsibilities that are associated with these positions to realize that it is truly only <i>one part</i> of the listed responsibilities.<span class="Apple-converted-space"> </span>I’m often boggled when I search for job openings in Digital Forensics and find the dozens of listings that have very little to do with digital forensics at all, but because the job of a DFIR responder is partially to deal with these incidents, forensic response is listed as one of the desired skills.<span class="Apple-converted-space"> </span>The argument could be made that the forensic component is a dedicated position in itself.</p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWgEuChOpvzdPr-t1q664kuSQti8aC7KIlQP91whZfK78yq08YRyFO0rg6wBAK2pTgdYXeQGBrksmWjxFx8B3zKnEIVpf75_MrlkUdZV1XK7SmMEPurxziNxNmF7_mIpeI-WcQbtDiXZWF/s1280/finger-2081169_1280.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="720" data-original-width="1280" height="237" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWgEuChOpvzdPr-t1q664kuSQti8aC7KIlQP91whZfK78yq08YRyFO0rg6wBAK2pTgdYXeQGBrksmWjxFx8B3zKnEIVpf75_MrlkUdZV1XK7SmMEPurxziNxNmF7_mIpeI-WcQbtDiXZWF/w421-h237/finger-2081169_1280.jpg" width="421" /></a></div><br /><p class="p7" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px; text-align: center;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Regardless of that, the work of a DFIR responder is somewhat different than that of a litigation support professional in several ways.<span class="Apple-converted-space"> </span>First, the manner in which you acquire the data to be analyzed can be very different.<span class="Apple-converted-space"> </span>It is a common practice in IR work to acquire logical data from a network repository for analysis and not a “dead box” physical acquisition of the data.<span class="Apple-converted-space"> </span>This is a practical consideration because networks in enterprise environments can’t be shut down for a physical acquisition.<span class="Apple-converted-space"> </span>Many times, network logs, Windows event logs, registry entries and IP log files play a crucial role in determining <i>who</i> is responsible for the incident.<span class="Apple-converted-space"> </span>Acquisition and analysis of these logs can be tedious and may only lead to part of the conclusion about what happened.<span class="Apple-converted-space"> </span>The job of an IR digital forensic professional is absolutely necessary, particularly in large corporations and those that store sensitive personal information.<span class="Apple-converted-space"> </span>We hear about data breaches of personal information almost weekly and security-minded practitioners struggle with constant pulpit-pounding of good practices leading to good security. <span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Regular readers of this blog know well that I put forth regularly that “forensics” means the acquisition, analysis & reporting of facts associated with the data in such a manner that is presentable in a Court of Law.<span class="Apple-converted-space"> </span>While it is no doubt possible that an IR professional could work a case that would lead to litigation, it is far less likely than in the litigation support realm.<span class="Apple-converted-space"> </span>As such it’s probably safe to say that IR practitioners could reasonably be more on the technical side than the presentation & explanation side.<span class="Apple-converted-space"> </span>However, every incident has at least one stakeholder, so the ability to explain very technical matters to very non-technical people is still a vital skill.</p><p class="p10" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 17px;"><span class="s1" style="text-decoration-line: underline;"><b></b></span><br /></p><p class="p8" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>Litigation Support Path</b></span></p><p class="p10" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 17px;"><span class="s1" style="text-decoration-line: underline;"><b></b></span><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">It’s probably safe to say that when many people decide on a Digital Forensic course of study, they probably think of litigation support as their main path, probably due to the romanticization of the field in TV shows like CSI.<span class="Apple-converted-space"> </span>We hear about data breaches in the IR realm all the time, but we rarely hear in popular media the outcomes of their investigations.<span class="Apple-converted-space"> </span>Litigation support can be (and often is) the exact opposite.<span class="Apple-converted-space"> </span>Most law enforcement digital forensic practitioners are involved in litigation support and do so in very high-profile incidents.<span class="Apple-converted-space"> </span>Many <a href="http://prodigital4n6.com/"><span class="s2" style="color: #0563c1;">private companies</span></a> are also involved in digital forensic litigation support.<span class="Apple-converted-space"> </span>So what does a litigation support analyst do?<span class="Apple-converted-space"> </span>We acquire, analyze and report on evidence most often specific to a particular person, company, etc.<span class="Apple-converted-space"> </span>The means by which we acquire this data often differs from the IR path because we generally have physical access to the suspect or target media to be analyzed. This means we can acquire physical repositories, instead of just logical data.<span class="Apple-converted-space"> </span>Of course, mobile forensics can be a large exception to the last statement, but generally speaking and with current technology, we are able to acquire physical memory of stand-alone computer systems and workstations.<span class="Apple-converted-space"> </span>(However, that will probably not always be the case.)</p><p class="p7" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px; text-align: center;"><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrJeqPneVQRetp0nTna5cdwyJhGJmyIUUaUEJT_awj5HLg2d8-9zwOkTeEFkVm3-dC-LXp81W6iVUR3B0KgXHTh_fLRQCIjdgibsC_zC-uPOGeEIj8FsT-AXV5Hhz88QipkcNZJCTGsSOA/s1280/justice-2071539_1280.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="961" data-original-width="1280" height="285" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrJeqPneVQRetp0nTna5cdwyJhGJmyIUUaUEJT_awj5HLg2d8-9zwOkTeEFkVm3-dC-LXp81W6iVUR3B0KgXHTh_fLRQCIjdgibsC_zC-uPOGeEIj8FsT-AXV5Hhz88QipkcNZJCTGsSOA/w380-h285/justice-2071539_1280.webp" width="380" /></a></div><br /><p class="p7" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px; text-align: center;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Law Enforcement works criminal litigation support by identifying a criminal suspect, seizing their electronic equipment, acquiring & analyzing same as part of their investigation and reporting about their findings.<span class="Apple-converted-space"> </span>Part of their reporting often comes in the form of formal expert testimony in court, which is one of the biggest differences between IR and Litigation Support.<span class="Apple-converted-space"> </span>It requires further refinement of the skill of presenting very technical matters to very non-technical people. <span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s2" style="color: #0563c1; text-decoration-line: underline;"><a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc">Private companies who engage in Litigation Support</a></span> also have a similar approach to casework, but work Civil disputes as well.<span class="Apple-converted-space"> </span>These civil cases may be everything from divorce/custody matters to intellectual property theft to employment disputes to independent analysis in criminal defense cases.<span class="Apple-converted-space"> </span>No matter the court of the case at hand (i.e., criminal or civil), the litigation support professionals seek to add clarity, value and definition to the matters they work as part of the adversarial justice system. <span class="Apple-converted-space"> </span></p><p class="p11" style="font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 17px;"><b></b><br /></p><p class="p8" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>Similarities between Incident Response & Litigation Support</b></span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">We’ve highlighted the main differences between IR and Litigation Support, but there are naturally many similarities.<span class="Apple-converted-space"> </span>The basic knowledge of how data is stored and analyzed is probably the largest similarity.<span class="Apple-converted-space"> </span>Both paths need to have a good basic understanding of data storage and forensic implications thereto.<span class="Apple-converted-space"> </span>Another similarity can be in the tools we use.<span class="Apple-converted-space"> </span>Fortunately, most modern and popular digital forensic tools, whether open source or proprietary, are capable of handling both IR and litigation support work.<span class="Apple-converted-space"> </span>The nuance factors in with the examiner’s ability to properly use the tool, given the particular type of case or incident.<span class="Apple-converted-space"> </span>Some forensic tool vendors like to say their tool has “been validated in Court”.<span class="Apple-converted-space"> </span>This is a misleading statement.<span class="Apple-converted-space"> </span>Tools don’t get validated in court.<span class="Apple-converted-space"> </span>Examiners get qualified as Experts in Court and their findings are validated because of their requisite knowledge, skills, abilities and experience.</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnogJyI-JGupLGR3aeA9pau1d_T_Wi6cOlyzKoFJKCk_c0TEhpEX1md8We5vvPAxz81ehHesq1B8CuPwYT3IdG-8elgFac00S0csGv8t-P3REpT8holaeYPdeY9d4wEUFfa-90BjwPhgyZ/s1280/compliance-5899190_1280.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="853" data-original-width="1280" height="273" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnogJyI-JGupLGR3aeA9pau1d_T_Wi6cOlyzKoFJKCk_c0TEhpEX1md8We5vvPAxz81ehHesq1B8CuPwYT3IdG-8elgFac00S0csGv8t-P3REpT8holaeYPdeY9d4wEUFfa-90BjwPhgyZ/w410-h273/compliance-5899190_1280.jpg" width="410" /></a></div><br /><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Finally, the most important part is that the approach philosophy is and needs to be the same across the digital forensic spectrum.<span class="Apple-converted-space"> </span>In every case, we operate on the approaches of objectivity & neutrality, analyzing the data as the data is presented to us and never allowing personal bias or beliefs about the suspected parties involved to cloud our ability to prove or disprove what happened.<span class="Apple-converted-space"> </span>Digital Forensics is a scientific discipline.<span class="Apple-converted-space"> </span>It requires us to constantly evaluate evidence in a neutral environment to arrive to a conclusion of fact.<span class="Apple-converted-space"> </span>As experts in the field, we are afforded the ability to draw conclusions based upon our knowledge and experience, even if the data doesn’t explicitly show us what those conclusions are.<span class="Apple-converted-space"> </span>But those <b>conclusions are always supported by the data</b> and never created out of conjecture or bias. <span class="Apple-converted-space"> </span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p8" style="color: #c00000; font-family: Helvetica; font-size: 14px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s1" style="text-decoration-line: underline;"><b>Wrapping It Up</b></span></p><p class="p6" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 14px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">In every field, there are nuanced sub-sects.<span class="Apple-converted-space"> </span>If one decides to be a doctor, they can become a surgeon or a psychiatrist.<span class="Apple-converted-space"> </span>If one decides to be a lawyer, they can become a corporate risk manager or a criminal litigator.<span class="Apple-converted-space"> </span>The refined skill sets for the two paths within the same field are where the differences lie and Digital forensics is no different.<span class="Apple-converted-space"> </span>There are nuances within the two paths of Incident Response and Litigation support that dictate which skills will be highlighted and which will be of less value to hone and refine.<span class="Apple-converted-space"> </span>Knowing the difference is key to the practitioner’s success, particularly early in the field of practice. Can a DFIR practitioner choose to switch between IR and Litigation support (or vice-versa)?<span class="Apple-converted-space"> </span>Absolutely!<span class="Apple-converted-space"> </span>Many litigation support professionals from law enforcement retire to work for IR shops.<span class="Apple-converted-space"> </span>The take-away here is to start the thought process about which path is the best fit for you.<span class="Apple-converted-space"> </span>Ultimately, everyone involved the practice of digital forensics wants to get to the heart of the matter, just like all doctors want to help their patients and all lawyers want to serve their client in the best manner possible.<span class="Apple-converted-space"> </span>So do some soul-searching and drill down about what path you’d like to choose.<span class="Apple-converted-space"> </span>And as a wise man once said, “Go with your gut, but use your head!”</p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Author:<span class="Apple-converted-space"> </span></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Patrick J. Siewert</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Principal Consultant</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Professional Digital Forensic Consulting, LLC<span class="Apple-converted-space"> </span></p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Virginia DCJS #11-14869</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Based in Richmond, Virginia</p><p class="p2" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;">Available Wherever You Need Us!</p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p3" style="font-family: Helvetica; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 13px;"><br /></p><p class="p12" style="color: #c00000; font-family: Helvetica; font-size: 22px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; text-align: center;"><span class="s1" style="text-decoration-line: underline;"><i>We Find the Truth for a Living</i></span><i>!</i></p><p class="p13" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px; text-align: center;">Computer Forensics -- Mobile Forensics -- Specialized Investigation</p><p class="p14" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px;">About the Author:</p><p class="p14" style="font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px 0px 8px;">Patrick Siewert is the Founder & Principal Consultant of <a href="https://prodigital4n6.com/"><span class="s2" style="color: #0563c1;">Pro Digital Forensic Consulting</span></a>, based in Richmond, Virginia (USA).<span class="Apple-converted-space"> </span>In 15 years of law enforcement, he investigated hundreds of high-tech crimes to precedent-setting results and continues to support litigation cases and corporations in his digital forensic practice.<span class="Apple-converted-space"> </span>Patrick is a graduate of SCERS & BCERT and holds several vendor-neutral and specific certifications in the field of digital forensics and high-tech investigation and is a court-certified expert witness.<span class="Apple-converted-space"> </span>He continues to hone his digital forensic expertise in the private sector while growing his consulting & investigation business marketed toward litigators, professional investigators and corporations, while keeping in touch with the public safety community as a Law Enforcement Instructor.</p><p class="p15" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Email:<span class="Apple-converted-space"> </span></span><span class="s1" style="text-decoration-line: underline;">Inquiries@ProDigital4n6.com</span></p><p class="p15" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Web: <a href="https://prodigital4n6.com/"><span class="s1">https://ProDigital4n6.com</span></a></span></p><p class="p15" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Pro Digital Forensic Consulting on LinkedIn: <a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc"><span class="s1">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</span></a></span></p><p class="p15" style="color: #0563c1; font-family: Helvetica; font-size: 12px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px;"><span class="s3" style="color: black;">Patrick Siewert on LinkedIn:<span class="Apple-converted-space"> </span><a href="https://www.linkedin.com/in/patrick-siewert-92513445/"><span class="s1">https://www.linkedin.com/in/patrick-siewert-92513445/</span></a> </span><span class="Apple-converted-space"> </span></p>Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comVirginia, USA37.4315734 -78.65689429.1213395638211523 -113.8131442 65.741807236178843 -43.500644199999996tag:blogger.com,1999:blog-9015068036075853317.post-30110412408235418272021-01-07T10:06:00.003-05:002021-01-07T10:06:39.593-05:00Cellebrite Reader: You Don’t Know What You’re Missing!<p>January 7, 2021</p><p style="text-align: center;"><span style="color: #cc0000; font-size: medium;"><b><u>Cellebrite Reader: You Don’t Know What You’re Missing</u>!</b></span></p><p>As a digital forensic practitioner who logs approximately 70% of cases in the mobile device forensics arena, it has become the norm for us to receive discovery in any number of forms from opposing counsel, law enforcement agencies, etc. Being one of the most commonly used mobile forensic tools on the market (particularly by law enforcement), Cellebrite has wisely developed a way for people who wish to view the data on a particular device to do so, also with the capability of generating their own report. This pared-down or lightweight version of the Cellebrite Physical Analyzer program, called the Cellebrite Reader, is a great free way to browse the 30,000-foot view of the data, particularly for laypersons who may just want to get text messages, pictures, videos, etc. These are traditionally the “high points” of the data on the phone or tablet and can sometimes include deleted items, but a serious warning should accompany the Cellebrite Reader file: You don’t know what you’re missing!</p><p><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQqISQe1smYQpZ3tULVFGsJUXqiTjyTf079uNCuTBN3OywANOw_0-yGKsOlsK5R-8cDpDcxblltcGsG8WPBlSrqyL801zZEa8ErSoziDqfL2gEcO5l_tkw64bfJCwYRCu32I1iXUUWoPp0/s296/Cellebrite+Reader+Logo.JPG" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="148" data-original-width="296" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQqISQe1smYQpZ3tULVFGsJUXqiTjyTf079uNCuTBN3OywANOw_0-yGKsOlsK5R-8cDpDcxblltcGsG8WPBlSrqyL801zZEa8ErSoziDqfL2gEcO5l_tkw64bfJCwYRCu32I1iXUUWoPp0/s0/Cellebrite+Reader+Logo.JPG" /></a></div><br /><p><span style="color: #cc0000;"><b><u>Who Should Use The Cellebrite Reader</u>?</b></span></p><p>The Cellebrite (or UFED) Reader is a lightweight version of the paid version of the analysis tool that accompanies a full Cellebrite product license called Physical Analyzer. To say it’s a “lightweight version” of Physical Analyzer is a bit of an understatement. At first glance in the user interface, the two applications look very similar, but as with most things in digital forensic analysis, the devil is in the details. So then who should use the Cellebrite/UFED Reader? If your case involves any of the “basic” data areas, such as undeleted text messages, photographs and some location data, then the UFED Reader tool is probably fine. The tool is best for on-staff investigators, paralegals, private investigators and other mostly non-technical support staff. If you have absolutely no need to dig into the data at all, the UFED Reader program should serve your purposes just fine. The issues emerge when we dive into how the data is generated and what is included, or rather not included, by the person who generated the Reader file.</p><p><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8ECtu43lpPSwTbIqN0PMC8KrcR4kzi8L6bVbzg0keP5NnbEyZucrUr0hU20JBGcia4rWDbO63BW0eZSjeeKnQpwtPAvVBIJN1pkV4zVBuiup-Und7iWt_QgcIBz-aWrv0pypTNLUJ76bl/s613/Analyzed+Data.JPG" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="613" data-original-width="356" height="378" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8ECtu43lpPSwTbIqN0PMC8KrcR4kzi8L6bVbzg0keP5NnbEyZucrUr0hU20JBGcia4rWDbO63BW0eZSjeeKnQpwtPAvVBIJN1pkV4zVBuiup-Und7iWt_QgcIBz-aWrv0pypTNLUJ76bl/w220-h378/Analyzed+Data.JPG" width="220" /></a></div><p style="text-align: center;"><span style="font-size: x-small;">The “Analyzed Data” portion provides a great overview of the simple data areas decoded automatically by Cellebrite, including *some* deleted data <span style="color: #cc0000;">(red parentheses)</span></span></p><p style="text-align: center;"><br /></p><p><b><span style="color: #cc0000;"><u>How Is a Cellebrite Reader File Generated And What Is Included</u>?</span></b></p><p>A Cellebrite/UFED Reader File is generated within the larger licensed tool called Cellebrite UFED Physical Analyzer. Many times, because of case backlog or by specific request, the person doing the data extraction from the device(s) will create a “data dump” report, viewable in the UFED Reader. This creates a .UFDR file, which is only able to be opened and read in the UFED Reader program, which accompanies the UFDR file at no cost to the user. In the case of a data dump report, ostensibly all of the readily viewable and automatically decoded data on the device is included in the UFDR file. </p><p>However, one strong warning about UFDR files is that they can easily be generated by the analyst cherry-picking or selectively choosing the data to include in the UFDR file, which is NOT a data dump. For example, the person responsible for generating the Cellebrite Reader file can choose only certain picture file types or certain text messages or message strings to include in the Reader file. This could *look* the same as a data dump within Cellebrite Reader, but would have far less data than the 100% dump of everything available from the device. There is no clear indication that a data dump file has been generated versus one that is selectively created by the analyst and exported into a UFDR and Cellebrite UFED Reader file. It is not unlikely that the person generating the Cellebrite Reader file for your review has not included things like the databases from the device (pictured below). We’ll discuss the importance of this shortly…</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqKnCDov4kPnaXeA6rV9tBzAvR4Q9Tv0norcMKsRnRQyBPHs-0wiGTZUgjTkIIyYNI3ekraoC6B5gViE-GDtZnTFKJ1luYRvHZUTSbXJbKF2rZlsur0pBeTjsBdWAh_8hQshcOXXJ5Pv8I/s360/Data+Files.JPG" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="360" data-original-width="297" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqKnCDov4kPnaXeA6rV9tBzAvR4Q9Tv0norcMKsRnRQyBPHs-0wiGTZUgjTkIIyYNI3ekraoC6B5gViE-GDtZnTFKJ1luYRvHZUTSbXJbKF2rZlsur0pBeTjsBdWAh_8hQshcOXXJ5Pv8I/s320/Data+Files.JPG" /></a></div><br /><p>The other strong warning about Cellebrite Reader (UFDR) files is that they MAY NOT include all of the data. While companies like Cellebrite, Oxygen, MSAB and Magnet Forensic try very hard to keep up with the trends in mobile technology, they are always playing a game of catch-up with their support of hardware and software because mobile technology moves so fast. Add into the support equation that only a fraction of third-party applications are supported for decoding by these tools and the point becomes clear that if you are relying solely on UFED Reader files, you are likely missing data! There is currently no exception to this rule.</p><p>The analogy we often use is that the Cellebrite Reader file is like a “prepared meal”. A competent digital forensic analyst wants to inspect the ingredients that went into preparing that “meal” to make sure there’s nothing missing.</p><p><br /></p><p><b><span style="color: #cc0000;"><u>What Data Is Missing From Cellebrite Reader Files</u>?</span></b></p><p>At a basic level, all application data (i.e., apps) on mobile devices is stored in roughly the same way. This common storage approach is in a series of databases that are created, updated and stored as part of the application itself. The databases work in the background of the user interface to store and present the data to the user on the device in the native user experience. The problem is that, as stated earlier, a mere fraction (probably 10% or less) of the applications available on the Apple App Store (iPhone) or Google Play Store (Android) are supported for automatic decoding in Cellebrite or any other mobile forensic analysis tool. This means that manual analysis of these databases will frequently become a necessity in your cases. And these databases may not included as part of a UFED Reader file, and you may only be provided with automatically decoded data from supported applications. The illustration below shows a snapshot of how many applications are decoded by Cellebrite on an iPhone 8 Plus running iOS 14. Among the applications not decoded are common applications like Snapchat, Twitter, Instagram and others:</p><p><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjqTEfW4C-o_QynSNtLCiqXJKzsQDX5sCcr7Lwl2AAVoCoyIYKA1kCsw4hetJGVOnPxfksy56mcob9v6Yt_RD7oLs8dPCleB3WjLO_v7VoIKO2jSMQAyN0GCfdGzjQ5dUUD4xA0YvbdOAl/s379/Decoded+By+list.JPG" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="202" data-original-width="379" height="206" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjqTEfW4C-o_QynSNtLCiqXJKzsQDX5sCcr7Lwl2AAVoCoyIYKA1kCsw4hetJGVOnPxfksy56mcob9v6Yt_RD7oLs8dPCleB3WjLO_v7VoIKO2jSMQAyN0GCfdGzjQ5dUUD4xA0YvbdOAl/w385-h206/Decoded+By+list.JPG" width="385" /></a></div><br /><p>Even if an application like WhatsApp is supported for automated decoding in your tool, when the developers of WhatsApp make even minor changes to the application in development and roll the new version of the application out to their users, this could cause the mobile forensic tool to no longer be able to decode and display the data automatically. This is another circumstance where manual analysis of the database(s) for the application will be required and as stated previously, the databases may very well not be included in your Cellebrite Reader file.</p><p>This is why you should always consult with a digital forensic professional in any case where you are provided data from an opposing party, particularly if there is a possibility that any of this data could be presented as evidence.</p><p><br /></p><p><b><span style="color: #cc0000;"><u>Wrapping It Up</u></span></b></p><p>While Cellebrite and their UFED Reader program are used as an example in this article, many other mobile forensic tools also have similar lightweight versions for simple review of the data. These are often called “portable case files”, or something similar. Regardless of the tool and what they call their lightweight application, the same limitations and warnings apply. And when faced with the possibility that your client could go to prison for a significant period of time or lose custody of their children or perhaps even lose a large sum of money, due diligence dictates consultation with an expert who knows how this data is stored, how to appropriately analyze it and what steps should be taken to ensure nothing is missed. Lives depend on it!</p><p><br /></p><p>Author: </p><p>Patrick J. Siewert</p><p>Principal Consultant</p><p>Professional Digital Forensic Consulting, LLC </p><p>Virginia DCJS #11-14869</p><p>Based in Richmond, Virginia</p><p>Available Wherever You Need Us!</p><p><br /></p><p style="text-align: center;"><b><span style="color: #cc0000; font-size: medium;"><u>We Find the Truth for a Living</u>!</span></b></p><p style="text-align: center;"><b>Computer Forensics -- Mobile Forensics -- Specialized Investigation</b></p><p>About the Author:</p><p>Patrick Siewert is the Principal Consultant of Pro Digital Forensic Consulting, based in Richmond, Virginia (USA). In 15 years of law enforcement, he investigated hundreds of high-tech crimes to precedent-setting results and continues to support litigation cases and corporations in his digital forensic practice. Patrick is a graduate of SCERS & BCERT and holds several vendor-neutral and specific certifications in the field of digital forensics and high-tech investigation and is a court-certified expert witness. He continues to hone his digital forensic expertise in the private sector while growing his consulting & investigation business marketed toward litigators, professional investigators and corporations, while keeping in touch with the public safety community as a Law Enforcement Instructor.</p><p>Email: <a href="mailto:Inquiries@ProDigital4n6.com">Inquiries@ProDigital4n6.com</a></p><p>Web: <a href="https://ProDigital4n6.com">https://ProDigital4n6.com</a></p><p>Pro Digital Forensic Consulting on LinkedIn: <a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</a></p><p>Patrick Siewert on LinkedIn: <a href="https://www.linkedin.com/in/patrick-siewert-92513445/">https://www.linkedin.com/in/patrick-siewert-92513445/</a></p><br /><p></p>Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comVirginia, USA37.4315734 -78.65689429.1213395638211523 -113.8131442 65.741807236178843 -43.500644199999996tag:blogger.com,1999:blog-9015068036075853317.post-41585637332644768972020-12-15T12:50:00.004-05:002020-12-15T12:50:49.326-05:00Keys to Success in Digital Forensics Series: Knowing the Justice System<p></p><div class="separator" style="clear: both; text-align: center;"><span style="text-align: left;"><b><span style="color: #990000; font-size: large;">Keys to Success in Digital Forensics Series: </span></b></span></div><p></p><p style="text-align: center;"><b><span style="color: #990000; font-size: large;">Knowing the Justice System</span></b></p><p><br /></p><p>A recent discussion on an international podcast spawned several offspring topics about what bona-fide occupational qualifications (previously known as BFOQs) are key to success in the field of digital forensics. This question has several answers, some of which are not readily apparent to many who may be pursing coursework and a career in digital forensics, but they are often intangible assets that differentiate between a good examiner and a great examiner. One of these has very little to do with the nuts-and-bolts of digital forensics: Knowledge of the Justice System. We’ll explore the system and elements to this key to success here, concentrating on those elements particularly in the United States.</p><p><span style="color: #990000;"><b><u>Key Element #1: The Difference in Types of Justice Systems</u></b></span></p><p>In the United States, there are several different types or levels of court system. They are also divided into levels inside their own particular system. For instance, there are Federal, State and Uniform Courts of Military Justice (UCMJs), which handles solely military justice matters (i.e., Army, Navy, Air Force, Marine, Coast Guard). The Federal and State Courts are each divided into “lower” and “higher” courts. The lower courts are usually District Courts and the higher courts are usually circuit, appellate and supreme courts. Trials are conducted at the District and Circuit levels, but cases are only reviewed and ruled upon based upon evidence presented at trial in Circuit Courts in the Appellate and Supreme Courts. No additional evidence is heard at the Appellate or Supreme Court levels, only written and oral arguments by the litigators involved. </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQCb42mVoEP4tUPy7WiyxdfJfzgPlcAmf6heSnQ8fjAzqa3wJOhJ3Nh95qOcCQb-VBAkPvv-BKgAoWJg7v7PYA1OKlOgO7pblcKr-7cLJOQowXjHKn_SvTbKUYk_xpl8SebtkWSNBveLrE/s977/Lady+Justice.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="731" data-original-width="977" height="299" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQCb42mVoEP4tUPy7WiyxdfJfzgPlcAmf6heSnQ8fjAzqa3wJOhJ3Nh95qOcCQb-VBAkPvv-BKgAoWJg7v7PYA1OKlOgO7pblcKr-7cLJOQowXjHKn_SvTbKUYk_xpl8SebtkWSNBveLrE/w400-h299/Lady+Justice.png" width="400" /></a></div><br /><p>In addition to the different venue and types of courts, there are types of cases – Criminal or Civil. Criminal cases are those which an accused is arrested based upon a complaint or criminal accusation and faces a fine, jail/prison time or some other punishment laid out in the criminal or penal law. Civil actions are those brought before the court when there is a dispute between two entities, such as two companies or a company and a former employee. Divorces, intellectual property theft, monetary or property disputes and other types of lawsuits are heard in Civil court. Some cases can cross-over between both courts, depending on the circumstances. In Virginia in 2016, Pro Digital was involved in a divorce case which had a criminal element to it, so different parts of the case were heard in two different courts. While most minor cases start in lower courts District courts and proceed up to the Circuit level, many cases may start directly at the Circuit Court level.</p><p><b><u><span style="color: #990000;">Key Element #2: How The Courts Work Differently</span></u></b></p><p>State & Federal Courts do operate somewhat differently, but the differences mainly lie in the types of cases that are heard in each court. In State Criminal Courts, cases brought by local and state law enforcement are heard. Usually, private citizens can also take out certain criminal charges on someone they feel has committed a crime against them and the police are either not willing or unable to conduct an investigation. In Federal Criminal Courts, cases are usually brought by one of any number of 3 or 4-letter federal law enforcement agencies (FBI, DEA, ATF, HSI, etc.) and have specific jurisdiction over the cases via Federal Law. For instance, many child sexual abuse material (CSAM) cases are brough before federal criminal courts because the images are traded/downloaded/traffic across the internet, so the nexus of the case is interstate commerce… Because all traffic over the internet has to cross state lines, whether the accused left their house in commission of the crime or not. Add into the mix that many local law enforcement agents belong to Federal Task Forces for CSAM, drug investigations, etc., which can also affect in which court the case is heard.</p><p>Civil Actions in State Court are generally between two people who either entered into a contract/agreement locally (including marriage) or conduct business on a more local level or inside a state’s boundaries. Federal Civil actions usually deal with the Civil side of interstate commerce, larger national/international business disputes, anything covered under entities like copyright or patent law and so forth. Essentially, the court in which the case you’re working is heard in is determined by jurisdiction. Only courts with jurisdiction to hear a particular case will be appropriate to do so.</p><p><b style="color: #990000;"><u>Key Element #3: Practical Application</u></b></p><p>So what does all of this mean and why is it important to digital forensic practitioners? Whether you know it or not, implement this mindset or not or ever see it in practice or not, you may very well become a first-hand participant in the justice system. Even incident response professionals have the potential to be called as a witness if their investigation leads to criminal charges or a civil action. As such, we should always begin with the end in mind. When being assigned or at the intake phase of a case, ask yourself (or your team) some basic questions:</p><p><br /></p><p>•<span style="white-space: pre;"> </span>What basic facts does this case deal with?</p><p>•<span style="white-space: pre;"> </span>What elements of the case/incident are relevant to prove or disprove?</p><p>•<span style="white-space: pre;"> </span>Who are the potential bad actors and where are they located?</p><p>•<span style="white-space: pre;"> </span>What best practices need to be put in place to ensure that your investigation is conducted in an appropriate manner for court?</p><p>•<span style="white-space: pre;"> </span>What documentation should you have with regard to your methods, procedures, findings and conclusions AND…</p><p>•<span style="white-space: pre;"> </span>Is that documentation appropriate and acceptable for use in Court?</p><p><br /></p><p>Beyond those basic front-end questions, there are considerations after you conduct your analysis and come to your conclusions. The first is how the system moves along. It is not unlikely that you could be called for a pre-trial hearing to testify about any number of issues such as access to the evidence (pre-examination), irregularities with the evidence or limitations to the analysis of the evidence. During this testimony, you may be qualified as an expert witness, and if you’ve never been through the qualification process, you’ll want to work with the attorney handling the case to ensure that you’ll have success in that process. For more details about that process, please <a href="https://www.forensicfocus.com/legal/qualifying-a-digital-forensic-expert-in-court-voir-dire/" target="_blank">check out this recent article</a>.</p><p>After any pre-trial hearings are concluded, the attorney(s) handling the case should have lengthy discussions with you about your procedures and findings. Everything you do in the course of your data acquisition & analysis needs to be defensible and repeatable so that someone with similar qualifications could do what you did and come to the same conclusions. This is where details matter.</p><p><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgP4-4hV4ggbfZhds5iQ4kC9I7gVNjQwyyhnN3iTsH2YLwowqxCD7GmHR1AMG0nAs_iZymMmKtoMKLhe0M-1bu4jahQOJDIqEemPmFhSkL5861wBEZ3ypPWcibGbM36_GcNfU-EYToRWj9S/s977/Einstein+with+judge.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="739" data-original-width="977" height="484" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgP4-4hV4ggbfZhds5iQ4kC9I7gVNjQwyyhnN3iTsH2YLwowqxCD7GmHR1AMG0nAs_iZymMmKtoMKLhe0M-1bu4jahQOJDIqEemPmFhSkL5861wBEZ3ypPWcibGbM36_GcNfU-EYToRWj9S/w640-h484/Einstein+with+judge.png" width="640" /></a></div><br /><p>But what matters most -- and what is arguably the most intangible piece to this whole process -- is not just the ability to relay what you did, why you did it and how you came to your conclusions, but to do so in a manner that is understandable to non-technical people. Lawyers, Clients, Executives, Judges and juries are largely non-technical people. You will need to possess, hone and refine the ability to explain your findings to them in a manner that they will easily understand. Bonus points if you can make it interesting!</p><p><b><u><span style="color: #990000;">Wrapping It Up</span></u></b></p><p>Some may read this article and wonder what on Earth it has to do with digital forensics? To paraphrase Steve Whalen of <a href="sumuri.com" target="_blank">Sumuri</a>, forensics is the application of methods & procedures to come to conclusions that are sound and presentable in a court of law. That’s what is meant by “begin with the end in mind”. We all have stories about that one case or the one examiner who did a halfway-job and somehow skates by without anyone calling them out on their sloppy work. The larger issue is not the one examiner, rather what that examiner represents in our industry. If we accept that our work product will be lackluster, bare minimum or just plain bad, that will eventually affect all DFIR practitioners. And none of us wants that!</p><p>Author: </p><p>Patrick J. Siewert</p><p>Principal Consultant</p><p>Professional Digital Forensic Consulting, LLC </p><p>Virginia DCJS #11-14869</p><p>Based in Richmond, Virginia</p><p>Available Wherever You Need Us!</p><p><br /></p><p style="text-align: center;"><span style="color: #cc0000; font-size: medium;"><b>We Find the Truth for a Living!</b></span></p><p style="text-align: center;"><span style="color: #cc0000; font-size: medium;"><b>Computer Forensics -- Mobile Forensics -- Specialized Investigation</b></span></p><p>About the Author:</p><p>Patrick Siewert is the Founder & Principal Consultant of Pro Digital Forensic Consulting, based in Richmond, Virginia USA. In 15 years of law enforcement, he investigated hundreds of high-tech crimes, incorporating digital forensics into the investigations, and was responsible for investigating some of the highest jury & plea bargain child exploitation investigations in Virginia court history. Patrick is a graduate of SCERS, BCERT, the Reid School of Interview & Interrogation and multiple online investigation schools (among others). He is a Cellebrite Certified Operator, Physical Analyst, Advanced Smartphone Analyst and Instructor, as well as certified in cellular call detail analysis and mapping. He continues to hone his digital forensic expertise in the private sector while growing his consulting & investigation business marketed toward litigators, professional investigators and corporations, while keeping in touch with the public safety community as a Law Enforcement Instructor.</p><p>Email: <a href="mailto:Inquiries@ProDigital4n6.com">Inquiries@ProDigital4n6.com</a></p><p>Web: <a href="http://www.ProDigital4n6.com">www.ProDigital4n6.com</a> </p><p>Pro Digital LinkedIn: <a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</a></p><p></p><p>Patrick Siewert LinkedIn: <a href="https://www.linkedin.com/in/patrick-siewert-92513445/">https://www.linkedin.com/in/patrick-siewert-92513445/</a> </p>Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comVirginia, USA37.4315734 -78.65689429.1213395638211523 -113.8131442 65.741807236178843 -43.500644199999996tag:blogger.com,1999:blog-9015068036075853317.post-85366571754924426632020-10-06T10:52:00.001-04:002020-10-06T10:52:51.554-04:002020 Key Influencers in DFIR<p></p><h1 style="text-align: left;"><div style="text-align: left;"><span style="font-size: medium;">October 6, 2020</span></div></h1><h1><br /></h1><h1 style="text-align: center;"><span style="color: #cc0000;"><u>2020 Key Influencers in DFIR</u></span></h1><div style="text-align: left;"><br /></div><div>One of the things I enjoy most about the field of digital forensics is that it’s a community of people who all generally have one set of goals in mind: Find the truth, get to the facts, uncover the evidence using tried & true methods and present those findings to an ultimate finder-of-fact, whether it be a corporate CEO, an attorney/client, a prosecutor/judge/jury or whatever the case may be. We encounter <a href="https://www.forensicfocus.com/articles/day-to-day-challenges-in-digital-forensics/" target="_blank">daily challenges</a> in our work and we collaborate relatively well because as the technology evolves, so do our approaches to the various challenges need to evolve. </div><div> <br />Like many industries, there are influencers – those who contribute to the profession in ways that go far above-and-beyond typical members of the community, whether it be by sheer volume of notable work, publications, time & effort put forth, etc. In digital forensics, those influencers may stand out even more because of the exclusive and specialized nature of the work we do and the relatively small community in which we work. Some are daily contributors while some share their knowledge and experience with a measure of humility or quiet dignity. I’ve chosen to highlight five such personalities in our industry for this article. They have not paid me, I don’t know all of them personally and I may never have even spoken to one or more of them, but their contributions to our field are valuable and deserve recognition. In compiling this list, I attempted to run the DFIR gambit of key computer forensic influencers, mobile device forensic influencers, incident response influencers and those who may influence all of the above and/or a different specialty that is more on the periphery of our industry. So, at the risk of spawning much heated debate, let’s go!</div><div><br /><u><b><span style="color: #990000;">Key Influencer #1: Eric Zimmerman</span></b></u><br /><br /></div><div>If you don’t know <a href="https://www.linkedin.com/in/eric-zimmerman-6965b22/" target="_blank">Eric Zimmerman</a> and his contributions to our community, you’re at a decided disadvantage. A former FBI Special Agent and government forensicator, Eric has been contributing his vast knowledge and expertise to the DFIR community for many years. I was first introduced to his wealth of knowledge and generosity when he released OS Triage, a free tool for law enforcement examiners to quickly triage and identify evidence on-scene that may (or may not) contain illicit images. The tool was simple, effective and really useful to those of us who 1) didn’t want to spend time analyzing evidence that wasn’t relevant and 2) had limited physical space in which to store such evidence. Since then, Eric has developed other free tools such as Shellbags Explorer and Timeline Explorer, all of which most of us have used in one case or another (or a few dozen). I personally love Shellbags Explorer for, well… Exploring Shellbags! It does a great job at graphically representing the folders that have been touched by the user to help belay any argument that someone else did it. Among the offerings on <a href="https://github.com/EricZimmerman" target="_blank">Zimmerman’s Github</a> are Link File Parser, MFT Parser, Volume Shadow Copy Mounter and more.<br /><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg12dAkm1hVbGJ-IWav7PMQ4vTiMuS7Ekvv6n0sbH0BywmF2U15R1IOety3u7oqxt8fjK4v8ZBePOztXLBeeB1r70Lz5qyAKJb6lHDOEbRDvQZGPrh727H0rwMehEpZduKkR28bLRlw10my/s628/Eric+Zimmerman.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="628" data-original-width="532" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg12dAkm1hVbGJ-IWav7PMQ4vTiMuS7Ekvv6n0sbH0BywmF2U15R1IOety3u7oqxt8fjK4v8ZBePOztXLBeeB1r70Lz5qyAKJb6lHDOEbRDvQZGPrh727H0rwMehEpZduKkR28bLRlw10my/s320/Eric+Zimmerman.png" /></a></div><br /><br /></div><div>Now with Kroll, Zimmerman continues to create and share tools with the community that are exceptionally useful in conducting varying types of analysis (oh, and they’re free). <a href="https://www.kroll.com/en/services/cyber-risk/incident-response-litigation-support/kroll-artifact-parser-extractor-kape" target="_blank">The Kroll Artifact Parser & Extractor (KAPE)</a> is a fast, flexible way to find, extract and analyze artifacts in your case. Simply put, it’s the next generation of free tools from Zimmerman and it is being used daily to help examiners save time and find the evidence they need.</div><div> <br />As an X-Ways Forensics user for the past several years, I’ve also found the book <i><a href="https://xwaysforensics.wordpress.com/" target="_blank">X-Ways Forensics Practitioner’s Guide</a></i> -- which Zimmerman co-wrote with another awesome influencer, <a href="https://www.linkedin.com/in/dfir-training/" target="_blank">Brett Shavers</a> -- to be an invaluable resource. Sure, I’ve been through the XWF Level 1 & 2 training, but sometimes I don’t remember every single tidbit of the 56 hours or so of those courses, so this book is a super helpful reference guide for both new and experienced XWF users. I think both Zimmerman and Shavers would tell you that if you’re not using X-Ways Forensics in your PC analysis, you’re wrong :).</div><div><br />I’d also be remiss if I didn’t mention Eric’s participation in the IACIS list serve. If anyone has a question, Eric frequently chimes in with a pointed, yet helpful response. Heck, sometimes he even makes me laugh! We are truly a better community for Eric being a part of it and sharing his vast knowledge, skills & abilities with us all. </div><div><br /><span style="color: #990000;"><b><u>Key Influencer #2: Heather Mahalik</u></b></span><br /><br /></div><div>I’ve never met Eric Zimmerman in person, but I have met <a href="https://www.linkedin.com/in/heather-mahalik-3615535/" target="_blank">Heather Mahalik</a> in person and we’ve had a few email exchanges over the years, including one surrounding <a href="https://prodigital4n6.com/cyber-dust-privacy-claims-debunked/" target="_blank">this exchange</a> with Shark Mark Cuban. A former government examiner, Heather now works with mainly with Cellebrite as a consultant and <a href="https://www.sans.org/profiles/heather-mahalik/" target="_blank">SANS instructing their mobile forensics courses</a>. A virtual bottomless well of knowledge about mobile device forensics, Heather has also co-written the book <a href="https://www.packtpub.com/product/practical-mobile-forensics-fourth-edition/9781838647520" target="_blank"><i>Practical Mobile Forensics</i></a>, which is another must-have in your reference library if you’re going to be conducting analysis on mobile devices.</div><div><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9Kvz6m0Qjo5ne7abjVaSSnTVb47psVHMWAnGGiEfU4dgmDHuXpSMJQGlfzzgCYwflg1n0D15vkuP3tbZFzPmgrQmFb6nsTih5zxYZNeMCLkp0R1NMG6Fy9-XDB9YcDNlpvMRw0t3WGB8A/s584/Heather+Mahalik.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="584" data-original-width="448" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9Kvz6m0Qjo5ne7abjVaSSnTVb47psVHMWAnGGiEfU4dgmDHuXpSMJQGlfzzgCYwflg1n0D15vkuP3tbZFzPmgrQmFb6nsTih5zxYZNeMCLkp0R1NMG6Fy9-XDB9YcDNlpvMRw0t3WGB8A/s320/Heather+Mahalik.png" /></a></div><br /><div><br />As far as helpfulness, willingness to share their knowledge, ability to test theories and publish the findings we need to know in the ever-changing landscape of mobile forensics -- and just plain giving back to the community -- I’m not sure any influencer in our industry is as generous as Heather. Heather’s ongoing blog, <a href="https://smarterforensics.com/" target="_blank"><i>Smarter Forensics</i></a> frequently jumps on the most current issues with testing of new operating systems and/or applications, validating the findings and putting the initial impressions and impact on our industry in a simple, concise, easy-to-understand format (example, see <a href="https://smarterforensics.com/2020/09/rotten-to-the-core-nah-ios14-is-mostly-sweet/" target="_blank">her blog on iOS 14 here</a>). </div><div><br />Also very active on the IACIS list serve, Heather always seems willing to answer any questions members may pose, particularly with regard to the functionality of Cellebrite and the tool’s ability (or lack thereof) in decoding, parsing, searching, etc. Anyone who does mobile device analysis can see why Cellebrite hired her – In addition to being a virtual walking encyclopedia of mobile forensic knowledge, she’s a terrific ambassador for the company and vocal proponent of all the great things we can analyze, report and testify upon with regard to mobile device evidence. She also hosts a regular webinar, discussing current trends in forensics. She truly gives of herself, her time and her knowledge to help us all out consistently and is clearly passionate about our field.</div><div><br /><b><u><span style="color: #990000;">Key Influencer #3: Harlan Carvey</span></u></b><br /><br /></div><div><a href="https://www.linkedin.com/in/harlan-carvey-86a8694b/" target="_blank">Harlan Carvey</a> is sadly another influencer I’ve never met -- which is odd because he lives about a half an hour from me – but I digress. Harlan has been in the DFIR game virtually since leaving the USMC. Included in his resume are heavy-hitters like IBM, Nuix, SecureWorks and Crowdstrike, to whom he’s referred me and my clients several times. Harlan is probably best known for his books and his contribution to the community with free/open source tools like RegRipper. Another walking encyclopedia of incident response knowledge, Harlan has penned the books <i>Windows Forensic Analysis, Investigating Windows Systems, Windows Registry Forensics, Perl Scripting for Windows Security and Digital Forensics With Open Source Tools</i> (to name a few). Basically, go on Amazon and type in Harlan Carvey. Correction: he’s not a walking encyclopedia of Windows Forensics, he wrote the encyclopedia! </div><div><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6RFxZxmiFYA22fSqkNY1CH-9LApeZy3kSNHXMUZWAg1EWdtZ-x4vsI3SIevQwsh5HW-DnbWGwQqNKxOsj5qOpS89aWyCXEOvv-L9-nlP_NH2ZXprBIxvaKF_GqihAopEOdy8Bp_ndGOOv/s784/Harlan+Carvey.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="784" data-original-width="670" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6RFxZxmiFYA22fSqkNY1CH-9LApeZy3kSNHXMUZWAg1EWdtZ-x4vsI3SIevQwsh5HW-DnbWGwQqNKxOsj5qOpS89aWyCXEOvv-L9-nlP_NH2ZXprBIxvaKF_GqihAopEOdy8Bp_ndGOOv/s320/Harlan+Carvey.png" /></a></div><br /><div><br />Harlan has also contributed to our community with his free, open source toll, <a href="https://github.com/keydet89/RegRipper3.0" target="_blank">RegRipper</a>, which does exactly that – rips through your (exported) suspect system registry files to present a clear, concise view of the artifacts contained therein. While many of us don’t, it’s true that you can perform forensic analysis on PC (and Mac) systems with mainly open-source tools and if you’re going to do that, I suggest that RegRipper be one of your main, go-to tools in the toolbox. It’s a fantastic contribution to our community. Also on Harlan’s <a href="https://github.com/keydet89" target="_blank">Github</a> are presentations that he’s given and other tools/tips that he has shared for the benefit of everyone. </div><div><br />Keeping in line with the “giving of self” theme that is a large component of a contributor to our community, I recall reading a proverbial “tip of the hat” about Harlan, which I believe was written by the aforementioned Brett Shavers. He stated that Harlan never hesitated to answer his questions and give him guidance. He was always open, willing and gracious (paraphrased). I have also seen a bit of this from Harlan myself. He frequently contributes substantively to conversations on LinkedIn and provided some welcomed guidance to me personally with regard to launching into the incident response realm. Many of our colleagues simply ignore requests or don’t have the desire to take the time. Harlan is not one of them. He is thoughtful and generous… And he’s forgotten more about incident response than I’ll probably ever know. Harlan also wants <u><b>you</b></u> to contribute. He truly recognizes DFIR as a collaborative community, so if you can pitch in to make RegRipper a better tool, Harlan wants to hear from you!</div><div><br /></div><div><b><u><span style="color: #990000;">Key Influencer(s) #4: The Hawk Analytics Team</span></u></b></div><div><span style="color: #990000;"><b><u><br /></u></b></span>Ok, I recognize that a for-profit company may come with a bit of an asterisk on this list, but stick with me…<br />I’ve been acquainted with the folks at <a href="https://www.hawkanalytics.com/" target="_blank">Hawk Analytics</a> for several years and have attended their training. In case you’re not familiar, Hawk Analytics makes a tool for cellular records analysis called CellHawk, which helps analysts map and display cellular and other location records. The tool also helps identify known associates by phone number, frequent locations, patterns of usage, incorporates an animated timeline of usage and more. If you are involved in the analysis and mapping of any records with date, time and GPS coordinates – like records for ankle monitors for sex offenders or those out on bail or parole – CellHawk is a must-have tool. It’s robust, flexible and keeps improving.</div><div><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjstvYk5ohTwf2D7fGTUNXAIZ_CjjE5-gqtWlv-z2afe30g3MzTWWgx5BY6B9RHSgEZ9UVSZe1SYeGHnJ-i1EGOPp9XbIQVmZtWKsIgzjhBxI_opY5a3Vd0KGOvK2VEW2h8oTO4FAxnb4bg/s452/Hawk+Analytics+Logo.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="148" data-original-width="452" height="131" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjstvYk5ohTwf2D7fGTUNXAIZ_CjjE5-gqtWlv-z2afe30g3MzTWWgx5BY6B9RHSgEZ9UVSZe1SYeGHnJ-i1EGOPp9XbIQVmZtWKsIgzjhBxI_opY5a3Vd0KGOvK2VEW2h8oTO4FAxnb4bg/w400-h131/Hawk+Analytics+Logo.png" width="400" /></a></div><br /><div> <br />But what separates the Hawk Analytics team from others in the industry is their passion and dedication to getting to the facts. They do not speculate about things which they are either not trained in or the tool isn’t equipped to handle. Many analysts who are involved in these types of cases erroneously attempt to estimate radio frequency range of cell sites. This is bad practice without specialized equipment and the team at Hawk Analytics knows this. Founded by former cellular engineer <a href="https://www.linkedin.com/in/mike-melson/" target="_blank">Mike Melson</a>, Hawk Analytics and their team genuinely have a desire to do good. Many times behind the scenes, Mike and his team will assist agencies with search & rescue to help find missing and/or endangered persons, despite having families of their own and the obligations of running a company. Even if you’re not a CellHawk user, their team will be more than willing to discuss quirks or anomalies in your record returns or assist with interpretation based upon their vast experience. Even though I may do independent CDR analysis for criminal defendants, they’re always willing to help because they are guided by the truth and don’t engage in conjecture or speculation. </div><div><br />In the spirit of giving to the community, Hawk Analytics also has a <a href="https://support.hawkanalytics.com/" target="_blank">free toolbox</a>, which will help you identify the cellular carrier for phone numbers in your case and even compile a preservation letter or search warrant template for you at the click of a button. Did I mention it’s all free? Mike and his team truly epitomize professionalism and seek to make a positive difference in their own little corner of the world (i.e., their expertise). If you value integrity in your vendors, Hawk Analytics is definitely the way to go.</div><div><br /><b><u><span style="color: #990000;">Key Influencer #5: Larry Daniel</span></u></b></div><div><br />Lastly, in a departure (and perhaps surprise to some), I’d like to give recognition to <a href="https://www.linkedin.com/in/larryedaniel/" target="_blank">Larry Daniel</a> of Envista Forensics as being a key influencer in our field. Having transitioned from law enforcement to the private sector, I have known Larry both in my former life and my current one. Some of you may not know Larry while some of you may have gone up against him in court. To be clear, Larry and his company are essentially business competitors of ours, but that’s sort of like saying your local corner convenience store is a competitor with WalMart, as Envista is a much larger operation than <a href="https://prodigital4n6.com/" target="_blank">Pro Digital</a> and they conduct all manner of forensic analysis, not just digital forensics. Regardless, I’ve come to know Larry as a savvy businessman and a very knowledgeable and formidable forensic and cellular records analyst. I respect Larry not only for his business acumen, but for his tenacity. Larry didn’t have the advantage of the government or a huge corporation sending him through digital forensic training – he did it all himself and learned it from the ground up. He is, as his son and co-worker described to me once – a “serial entrepreneur”, but one that has had a great deal of success in the private sector side of our industry. <br /> </div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglgPG3UrxIENF-VUfg-ga084VxmpX7L40wDIv8t4Ha18DukltCHRxAnhnYjFAiUsJr2Etnuuy8EyMKjEsqTyKvhkqgvEvwIIN3ZRyyowHeBcn1VpHnDBdY-4vzbU0Vzakw6GkoQsm1qfHz/s632/Larry+Daniel.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="632" data-original-width="492" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglgPG3UrxIENF-VUfg-ga084VxmpX7L40wDIv8t4Ha18DukltCHRxAnhnYjFAiUsJr2Etnuuy8EyMKjEsqTyKvhkqgvEvwIIN3ZRyyowHeBcn1VpHnDBdY-4vzbU0Vzakw6GkoQsm1qfHz/s320/Larry+Daniel.png" /></a></div><br /><div><br /></div><div>Larry founded and grew Guardian Digital Forensics in Raleigh, NC and several years ago sold the company to Envista Forensics and took over as Principal Consultant of their digital practice. Since diving head-first into the DFIR pool, Larry has published numerous articles, presented at EnFuse and multiple litigator’s conferences and authored <a href="https://www.amazon.com/Larry-Daniel/e/B005CEQFVC%3Fref=dbs_a_mng_rwt_scns_share" target="_blank">two books</a> – <i>Digital Forensics For Legal Professionals</i> and <i>Cell Phone Location Evidence for Legal Professionals</i>. These books are fairly basic, but in writing them, Larry tapped into a previously uneducated audience that was severely lacking in knowledge about digital forensics and cellular analysis – criminal and civil litigators and paralegals. I think it’s safe to say that Larry has written the book(s) on digital forensics for the private sector legal professional.<br /><br /></div><div>Practitioners like Larry make everyone better. They challenge us to cover all the digital bases and make sure we know the evidence when so much is at stake, whether it be child custody, a large sum of money or someone’s freedom. Quiet professionals like Larry are no different from the quiet professionals that work in DFIR roles in law enforcement, for government contractors and big corporations. We all strive to get to the truth, analyzing the available evidence and utilizing our training, experience and wisdom. <br /><br /></div><div><b><u><span style="color: #990000;">Wrapping It Up</span></u></b><br /><br /></div><div>This list of DFIR influencers isn’t all-encompassing. For every person on this list, there are probably hundreds behind the scenes working hard to prove or disprove the incident or allegation. We all know there are blowhards and charlatans in every industry and digital forensics is no exception. But by the contributions of the people on this list, we are all benefitted. It’s my hope that one day, someone can point to an article or a book that I’ve written or a major case that I’ve worked and say that I’ve contributed to the community in a positive way. Even though all of the people on this list are still active practitioners, their legacy in our field is already carved out. <br /><br /></div><div>It’s my hope that this list will continue to evolve over the next year (and beyond) and we can re-visit and tip our hats to five (or so) more influencers that make our industry great and help make us all better at what we do. Thanks to everyone on this list for all that you do to help us improve and grow… and keep up the great work!<br /><br /></div><div>Author: <br />Patrick J. Siewert<br />Principal Consultant<br />Professional Digital Forensic Consulting, LLC <br />Virginia DCJS #11-14869<br />Based in Richmond, Virginia<br />Available Wherever You Need Us!<br /><br /><div style="text-align: center;"><b><span style="color: #cc0000; font-size: large;"><i><u>We Find the Truth for a Living</u>!</i></span></b></div><div style="text-align: center;"><b>Computer Forensics -- Mobile Forensics -- Specialized Investigation</b></div><div><br /></div>About the Author:<br />Patrick Siewert is the Founder & Principal Consultant of Pro Digital Forensic Consulting, based in Richmond, Virginia USA. In 15 years of law enforcement, he investigated hundreds of high-tech crimes, incorporating digital forensics into the investigations, and was responsible for investigating some of the highest jury and plea bargain child exploitation investigations in Virginia court history. Patrick is a graduate of SCERS, BCERT, the Reid School of Interview & Interrogation and multiple online investigation schools (among others). He is a Cellebrite Certified Operator and Physical Analyst and Instructor, as well as certified in cellular call detail analysis and mapping. He continues to hone his digital forensic expertise in the private sector while growing his consulting & investigation business marketed toward litigators, professional investigators and corporations, while keeping in touch with the public safety community as a Law Enforcement Instructor.<br />Email: <a href="mailto:Inquiries@ProDigital4n6.com">Inquiries@ProDigital4n6.com</a><br />Web: <a href="http://www.ProDigital4n6.com">www.ProDigital4n6.com</a><br />Pro Digital LinkedIn: <a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</a><br />Patrick Siewert LinkedIn: <a href="https://www.linkedin.com/in/patrick-siewert-92513445/ " target="_blank">https://www.linkedin.com/in/patrick-siewert-92513445/ </a> </div><div style="text-align: left;"><br /></div><br /><br /><br /><br /><p></p>Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comVirginia, USA37.4315734 -78.656894210.063719547611758 -113.8131442 64.799427252388242 -43.500644199999996tag:blogger.com,1999:blog-9015068036075853317.post-89603088967756159652020-09-14T13:08:00.000-04:002020-09-14T13:08:25.722-04:00Digital Forensics: Adding Value To Title IX (Title 9) Cases<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<span lang="NO-BOK" style="font-size: 12pt; line-height: 17.12px;">September 14, 2020<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in; text-align: center;">
<u><span style="color: #c00000; font-size: 18pt; line-height: 25.68px;">Digital Forensics: Adding Value To Title IX (Title 9) Cases<o:p></o:p></span></u></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in; text-align: center;">
<br /></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in; text-align: center;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<span style="font-size: 12pt; line-height: 17.12px;">For the past several years, there have been multiple business <a href="https://www.researchandmarkets.com/reports/4804814/digital-forensics-global-market-trajectory-and?utm_source=GNOM&utm_medium=PressRelease&utm_code=hs4pwm&utm_campaign=1287918+-+Global+Digital+Forensics+Market+Research+Report+2019-2025+-+Computer+Forensics+Displays+the+Potential+to+Grow+at+Over+16.6%25+During+the+Forecast+Period&utm_exec=joca220prd" style="color: #954f72;">articles</a> stating how the private sector digital forensics industry will be growing exponentially in the near future. This is partially due to increased data breaches, increased civil litigation filings where data is at issue and increased electronically-facilitated criminal activity. One area where we are seeing a decided uptick in the need for forensic data acquisition, analysis, consulting & expert testimony services is Title IX cases, which occur largely on college campuses. According to <a href="https://titleix.harvard.edu/what-title-ix" style="color: #954f72;">Harvard University</a>:<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<span style="font-size: 12pt; line-height: 17.12px;">“<i>Title IX is a US federal civil rights law passed as part of the Education Amendments of 1972. This law protects people from discrimination based on sex in education programs or activities that receive Federal financial assistance.<o:p></o:p></i></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<i><span style="font-size: 12pt; line-height: 17.12px;">Title IX states that:<o:p></o:p></span></i></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<i><span style="font-size: 12pt; line-height: 17.12px;">‘No person in the United States shall, on the basis of sex, be excluded from participation in, be denied the benefits of, or be subjected to discrimination under any education program or activity receiving Federal financial assistance.’”<o:p></o:p></span></i></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in; text-align: center;">
<span style="font-size: 12pt; line-height: 17.12px;"></span><span style="font-size: 12pt; line-height: 17.12px;"><o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmPlMg2oyy6N_GYD-vUu7XuRqwsVL2xsClCwIFRjYFC2UQpE9gpT87CwU-ehuELbCCYsJwgPhr0BjEI6SXIWpiMVxbMcYSILe5ePfSFaSKUmXHWcnTxPvu3WvPlrGuXbGkn9IREyER24Xh/s1600/university-470184_1280.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="960" data-original-width="1280" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmPlMg2oyy6N_GYD-vUu7XuRqwsVL2xsClCwIFRjYFC2UQpE9gpT87CwU-ehuELbCCYsJwgPhr0BjEI6SXIWpiMVxbMcYSILe5ePfSFaSKUmXHWcnTxPvu3WvPlrGuXbGkn9IREyER24Xh/s400/university-470184_1280.jpg" width="400" /></a></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<span style="font-size: 12pt; line-height: 17.12px;"><br /></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<span style="font-size: 12pt; line-height: 17.12px;">Since it’s initial passing, Title IX has grown to include claims involving sexual harassment, discrimination and sexual violence. The odd procedural issues with Title IX claims are that they may be made personally or anonymously, may or may not lead to a formal administrative charge against the accused and the accused may or may not even know the claim was ever made about them until long after the claim has been filed and/or adjudicated. This can lead to problematic issues surrounding due process, rights to face one’s accuser and false claims made against the accused. Further, if the accused graduates college and submits to any type of background investigation for employment, the presence of the claim on their formal educational record will likely cause expulsion from the hiring process. Because of all of these <a href="https://www.nationalaffairs.com/publications/detail/the-strange-evolution-of-title-ix" style="color: #954f72;">controversial factors</a>, recent years have also seen Title IX civil litigation blossoming into another area where justice may be sought by either the accuser or the accused.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<b><u><span style="color: #c00000; font-size: 14pt; line-height: 19.9733px;">Digital Forensics In Title IX Cases</span></u></b><b><span style="font-size: 14pt; line-height: 19.9733px;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<span style="font-size: 12pt; line-height: 17.12px;">Because Title IX claims deal mainly with college-aged claimants and accused persons, who undoubtedly use their mobile devices to a high level, the likelihood of having data in some form that may show extensive contact between the parties and serve to add value to the case is fairly high. Whether the data is stored on a mobile device via chat or texting apps, pictures, call history, voice recordings, web history and/or email, <i>the appropriate forensic acquisition of this data is of paramount importance</i> to identifying the circumstances surrounding the alleged event. Title IX cases are legal proceedings, however there may be no law enforcement investigation and the proceedings may not have a judge or attorneys present, which can put one or both sides of the matter at a procedural disadvantage. However, the accusation and disposition of the proceedings have a long-lasting effect on the accused and/or the claimant. Because the outcomes of these proceedings are essentially permanent and potentially impactful for a lifetime, the use of screen shots or tools with which the mobile device’s data can be easily altered prior to presentation to document contact between the parties involved is <i><u>highly discouraged</u></i>, as discussed in our <a href="https://prodigital4n6.com/screen-shots-are-not-evidence/" style="color: #954f72;">recent article here</a>. <o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtzGnjU20c60vc0hOxcGFVffT1fCBkvZlAEIyn3qbV-CqQhpBGSVmZCwjTYq29eknkhXVJR1_ujyaMouOf3JIALJtHE_4asV1SFXYy-3foPjAbVsI2DluE7qlnEsNjIFZlt9IyGquggrnJ/s1600/Studen+iPhone.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="853" data-original-width="1280" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtzGnjU20c60vc0hOxcGFVffT1fCBkvZlAEIyn3qbV-CqQhpBGSVmZCwjTYq29eknkhXVJR1_ujyaMouOf3JIALJtHE_4asV1SFXYy-3foPjAbVsI2DluE7qlnEsNjIFZlt9IyGquggrnJ/s400/Studen+iPhone.jpg" width="400" /></a></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in; text-align: center;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<span style="font-size: 12pt; line-height: 17.12px;">Another area that should not be overlooked in Title IX claims is data that may reside on one or both party’s computer systems. While it’s a digital evolutionary fact that much of modern class and professional work can be conducted on mobile devices, many mobile devices are still not ideal for composition of long-form text such as research papers, lengthy emails and files or documents with larger data sets. Email exchanges between the accused and the claimant as well as synced text message contact (iMessage, WhatsApp, etc.) over desktop applications could also be vital evidence in the Title IX claim, some of which may not be present or available via forensic data acquisition from the mobile device. Additionally, it’s very likely that the mobile device in use by either party has been charged and/or synced by the computer system at some point in the recent past. Depending on a number of different parameters, this may lead to a backup of the mobile device data being created, which can then be acquired, analyzed as if it were the mobile device itself and used as evidence in Title IX proceedings. While the Rules of Evidence or Civil Procedure may not be an overwhelming consideration in Title IX cases, the potential that evidence may be used in later formal courtroom litigation dictates that the evidence used in the administrative proceedings should be acquired and analyzed in a forensically sound manner.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<b><u><span style="color: #c00000; font-size: 14pt; line-height: 19.9733px;">Conclusions<o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<span style="font-size: 12pt; line-height: 17.12px;">Title IX cases present a host of challenges for virtually all parties involved. As with all formal proceedings, the truth of the matter can ultimately boil down to the evidence, and particularly the strength of that evidence. Because so much can be at stake with regard to the future of both the claimant and the accused, the appropriate documentation and forensic acquisition and presentation of data in the case is vital to proving or disproving the claim. People increasingly live their lives on their devices, whether it be a mobile device (phone, tablet) or a computer or a combination within the various data storage ecosystem. The good (and sometimes bad) thing about this ubiquitous connection to electronic devices is that they document nearly everything for us. This becomes evidence in many legal and administrative proceedings, but the “devil in the details” can ultimately rest on the proper handling, acquisition, analysis and presentation of the data involved in the case. When someone’s future is at stake, why risk presenting bad, unverifiable or lacking evidence?<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<span style="font-size: 12pt; line-height: 17.12px;">Author:<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<span style="font-size: 12pt; line-height: 17.12px;">Patrick J. Siewert<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<span style="font-size: 12pt; line-height: 17.12px;">Principal Consultant<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<span style="font-size: 12pt; line-height: 17.12px;">Professional Digital Forensic Consulting, LLC<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<span style="font-size: 12pt; line-height: 17.12px;">Virginia DCJS #11-14869<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<span style="font-size: 12pt; line-height: 17.12px;">Based in Richmond, Virginia<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<span style="font-size: 12pt; line-height: 17.12px;">Available Wherever You Need Us!<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in; text-align: center;">
<i><u><span style="color: #c00000; font-size: 22pt; line-height: 31.3867px;">We Find the Truth for a Living</span></u></i><i><span style="color: #c00000; font-size: 22pt; line-height: 31.3867px;">!<o:p></o:p></span></i></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in; text-align: center;">
<i><span style="color: #c00000; font-size: 22pt; line-height: 31.3867px;"><br /></span></i></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 8pt; text-align: center;">
<span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span style="color: windowtext; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;">Computer Forensics -- Mobile Forensics -- Specialized Investigation<o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 8pt;">
<span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span style="color: windowtext; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;">About the Author:<o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 8pt;">
<span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span style="color: windowtext; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;">Patrick Siewert is the Founder & Principal Consultant of Pro Digital Forensic Consulting, based in Richmond, Virginia USA. In 15 years of law enforcement, he investigated hundreds of high-tech crimes, incorporating digital forensics into the investigations, and was responsible for investigating some of the highest jury and plea bargain child exploitation investigations in Virginia court history. Patrick is a graduate of SCERS, BCERT, the Reid School of Interview & Interrogation and multiple online investigation schools (among others). He is a Cellebrite Certified Operator and Physical Analyst and Instructor, as well as certified in cellular call detail analysis and mapping. He continues to hone his digital forensic expertise in the private sector while growing his consulting & investigation business marketed toward litigators, professional investigators and corporations, while keeping in touch with the public safety community as a Law Enforcement Instructor.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<span lang="FR" style="font-size: 12pt; line-height: 17.12px;">Email: <span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;">Inquiries@ProDigital4n6.com</span><o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<span lang="FR" style="font-size: 12pt; line-height: 17.12px;">Web: </span><a href="https://www.blogger.com/null" style="color: #954f72;"><span lang="FR" style="font-size: 12pt; line-height: 17.12px;">www.ProDigital4n6.com</span></a><span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span lang="FR" style="font-size: 12pt; line-height: 17.12px;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in;">
<span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span lang="FR" style="color: windowtext; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;">Pro Digital LinkedIn: </span></span><a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc" style="color: #954f72;"><span lang="FR" style="font-size: 12pt; line-height: 17.12px;">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</span></a><span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span lang="FR" style="font-size: 12pt; line-height: 17.12px;"><o:p></o:p></span></span></div>
<span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span lang="FR" style="color: black; font-family: Calibri, sans-serif; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;">Patrick Siewert LinkedIn: </span></span><span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span lang="DE" style="color: black; font-family: Calibri, sans-serif; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;"><a href="https://www.linkedin.com/in/patrick-siewert-92513445/" style="color: #954f72;"><span lang="FR">https://www.linkedin.com/in/patrick-siewert-92513445/</span></a></span></span><span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span lang="DE" style="color: black; font-family: Calibri, sans-serif; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;"> </span></span><span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span lang="DE" style="font-family: Calibri, sans-serif; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;"> </span></span>Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comRichmond, VA, USA37.5407246 -77.436048137.339233099999994 -77.758771599999989 37.7422161 -77.1133246tag:blogger.com,1999:blog-9015068036075853317.post-89382876659162828512020-06-01T15:14:00.000-04:002020-06-01T15:14:31.094-04:00Beyond Location Data In Cellular Records Analysis<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 8pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">June 1, 2020<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<u><span style="color: #c00000; font-size: 18pt; line-height: 25.68px;">Beyond Location Data In Cellular Records Analysis<o:p></o:p></span></u></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">For reasons I’m not sure I can put a firm grasp on, there still seems to be a debate over the value of cellular call detail records and their strength in being able to prove or disprove location in litigation. Clearly the location data is generally what is sought after the most, because it carries weight with regard to a particular incident and/or time frame at the heart of the dispute. However, some still try to debunk this data as “junk science”. The reasoning for this is a great topic for another article, and is touched upon in our previous article entitled </span><a href="https://prodigital4n6.com/three-reasons-why-call-detail-records-analysis-is-not-junk-science/" style="color: #954f72;"><i><span style="font-size: 12pt; line-height: 17.12px;">Three Reasons Why Call Detail Records Analysis Is Not “Junk Science”</span></i></a><span style="font-size: 12pt; line-height: 17.12px;">. However, there’s much more to the cellular records than location data, or at least much more that is ancillary to location data. This deeper level of analysis can further lend validity to the records themselves and any conclusions drawn from their analysis, location or otherwise.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;"></span><span style="font-size: 12pt; line-height: 17.12px;"><o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikX_aDdxvHn4-vuHg1vXyfuc0979JKtLstfkJctfJwvDIG1aIiWYdWNReensWtqCzpD8PHlzki4TswItTUsRVB4LtuKtJXcXuxkYQYII8ted_trQ2FDi7V6kHC9J0xguDf7TF5Z80mRrX1/s1600/couple-4868387_1920.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1067" data-original-width="1600" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikX_aDdxvHn4-vuHg1vXyfuc0979JKtLstfkJctfJwvDIG1aIiWYdWNReensWtqCzpD8PHlzki4TswItTUsRVB4LtuKtJXcXuxkYQYII8ted_trQ2FDi7V6kHC9J0xguDf7TF5Z80mRrX1/s400/couple-4868387_1920.jpg" width="400" /></a></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<b><u><span style="color: #c00000; font-size: 14pt; line-height: 19.9733px;">Dataset #1: Link Analysis</span></u></b><b><span style="font-size: 14pt; line-height: 19.9733px;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Along with location data, properly obtained cellular records also tell us a great deal about who our target is talking to, when they are talking and how often. This is most commonly referred to as link analysis, but effective analysis of these records goes beyond that. For instance, target is suspected of marital infidelity with a married woman. The call detail records (CDR) show he calls and texts the married woman several dozen times a day. A private investigator tracking the married woman spots the two of them together on a particular date and time. What is likely to happen? They’ll stop calling or texting each other during that time because they’re in the same location. In another example, suspect #1 is arrested and charged with robbery. His defense team has information that he was <i>NOT</i> the only one involved in the robbery, and perhaps was not the primary involved in the robbery. Analyzing who the suspect called and texted the most leading up to the robbery and afterward can be of great value in determining whom an accomplice may have been. Usually what we see with link analysis is the people will call and text their loved ones the most – husbands/wives, parents, best friends, etc. This all goes to show a pattern of usage and helps identify who they talk to the most and potentially, their activity with regard to those people as well.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<b><u><span style="color: #c00000; font-size: 14pt; line-height: 19.9733px;">Dataset #2: Usage Patterns<o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Often in conversations with litigators about analysis of these records, we get asked “what if they turned their phone off?” or “What if he simply left his phone at home or at work?” during the time of interest. All valid questions! The issue becomes, what can we tell is likely during the time frame of interest in relation to other usage patterns. If a cheating husband is meeting his paramour in a hotel during his lunch hour once or twice a week and he leaves his cell phone at the office, we’ll be able to tell from looking at 1) the usage patterns from when he is <i><u>not</u></i> with his paramour and 2) a pattern of missed calls and/or texts for the period of time he was separated from his phone. Let’s also not overlook that he may have had a flurry of text messages or calls with the paramour leading up to this activity. There are very interesting and often very valuable items we can tell by looking at the record, such as: <o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt 0.5in;">
<br /></div>
<div class="MsoListParagraphCxSpMiddle" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt 0.5in; text-indent: -0.25in;">
<span style="font-family: Symbol; font-size: 12pt; line-height: 17.12px;">·<span style="font-family: "Times New Roman"; font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;"> </span></span><span dir="LTR"></span><span style="font-size: 12pt; line-height: 17.12px;">If the phone rang and went to voicemail<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt 0.5in; text-indent: -0.25in;">
<span style="font-family: Symbol; font-size: 12pt; line-height: 17.12px;">·<span style="font-family: "Times New Roman"; font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;"> </span></span><span dir="LTR"></span><span style="font-size: 12pt; line-height: 17.12px;">If the phone was turned off and calls when directly to voicemail<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt 0.5in; text-indent: -0.25in;">
<span style="font-family: Symbol; font-size: 12pt; line-height: 17.12px;">·<span style="font-family: "Times New Roman"; font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;"> </span></span><span dir="LTR"></span><span style="font-size: 12pt; line-height: 17.12px;">If calls were received and unanswered in succession for a period of time (and later returned)<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt 0.5in; text-indent: -0.25in;">
<span style="font-family: Symbol; font-size: 12pt; line-height: 17.12px;">·<span style="font-family: "Times New Roman"; font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;"> </span></span><span dir="LTR"></span><span style="font-size: 12pt; line-height: 17.12px;">If text messages were received and unanswered for a period of time (and later returned)<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt 0.5in; text-indent: -0.25in;">
<span style="font-family: Symbol; font-size: 12pt; line-height: 17.12px;">·<span style="font-family: "Times New Roman"; font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;"> </span></span><span dir="LTR"></span><span style="font-size: 12pt; line-height: 17.12px;">Whether any of this activity is normal, as compared to other activity for time frames outside of the time frame of interest<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">People are creatures of habit. By analyzing the usage patterns in the records, we can see what their habits are in relation to the use of their device. This is the single biggest reason we advise all litigators who wish to use these records to obtain at least 30 days of records <u>on either end of the incident</u> in question. The more data, the better. Usage patterns are of great value when conducting this analysis.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLqYXLzU4m_rc0JkJlra0ijGPiPxxG4FoT6i5EgeakQoFdNOmBWif5HClmkem6OYtGGvEVwUayEU9v_MFQnb_Vixwi9QEYTi5Gt5ifH2EirieoQWFmOWOS1KoZnYAi1cvUGuJ4pNEkKk4d/s1600/man-talking-on-the-phone-1582238_1920.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1200" data-original-width="1600" height="298" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLqYXLzU4m_rc0JkJlra0ijGPiPxxG4FoT6i5EgeakQoFdNOmBWif5HClmkem6OYtGGvEVwUayEU9v_MFQnb_Vixwi9QEYTi5Gt5ifH2EirieoQWFmOWOS1KoZnYAi1cvUGuJ4pNEkKk4d/s400/man-talking-on-the-phone-1582238_1920.jpg" width="400" /></a></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;"></span><span style="font-size: 12pt; line-height: 17.12px;"><o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<b><u><span style="color: #c00000; font-size: 14pt; line-height: 19.9733px;">Dataset #3: Where They Lay Their Head</span></u></b><b><u><span style="font-size: 14pt; line-height: 19.9733px;"><o:p></o:p></span></u></b></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Much of usage analysis mentioned previously has little or nothing to do with location. One area that has to do with location, although not necessarily during the time frame of the alleged incident(s), is where your target lays their head. As stated earlier, people are creatures of habit. Their phones are with them virtually all the time. So even outside of the time frame of the incident, we can likely tell where that person is staying at night. By in large, during late night and early morning hours, we see the mobile device stationary, only using one sector of one cell site for an extended period. This information in the records tells us likely where they lay their head. By filtering down to late night & early morning hours, we can also see if they have more than one place where they may stay at night. This typically generates a “hot list” of cell sites that are used most often, and this is also included in any reports we generate. It’s relevant insofar as it shows the finder of fact or opposing counsel that where their stated address is may not be where they stay. It could also provide additional information for follow-up if the house and likely person with whom they are staying can be determined. It’s a fantastic piece of evidentiary data!<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<b><u><span style="color: #c00000; font-size: 14pt; line-height: 19.9733px;">Wrapping It Up<o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">As illustrated briefly here, there’s more to cellular call detail records analysis than simple location. These points also further prove that the proper and effective analysis of this data is not “junk science”, rather there may be a contingent of analysts who simply don’t have the ability or desire to perform this type of higher-level analysis in their cases. Ignorance of the power and effective use of the data does not make the data invalid. By looking deeper into the data, we can start to sort out what may help to prove or disprove the claims in the case. It could also help shed light upon or validate who else may be involved in the matter, whether previously known or not. The ability to analyze behavior patterns in the record cannot be over-stated either. At the heart of any digital forensic practice is a person, whether it is behind the keyboard, phone screen or a cellular subscriber. People behave in patterns. Your analyst should be able to identify those patterns and determine whether or not they are of relevance in your case. Happy hunting!<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Author:<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Patrick J. Siewert<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Principal Consultant<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Professional Digital Forensic Consulting, LLC<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Virginia DCJS #11-14869<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Based in Richmond, Virginia<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Available Wherever You Need Us!<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<i><u><span style="color: #c00000; font-size: 22pt; line-height: 31.3867px;">We Find the Truth for a Living</span></u></i><i><span style="color: #c00000; font-size: 22pt; line-height: 31.3867px;">!<o:p></o:p></span></i></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 8pt; text-align: center;">
<span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span style="color: windowtext; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;"><br /></span></span></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 8pt; text-align: center;">
<span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span style="color: windowtext; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;">Computer Forensics -- Mobile Forensics -- Specialized Investigation<o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 8pt;">
<span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span style="color: windowtext; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;">About the Author:<o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 8pt;">
<span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span style="color: windowtext; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;">Patrick Siewert is the Principal Consultant of Pro Digital Forensic Consulting, based in Richmond, Virginia. In 15 years of law enforcement, he investigated hundreds of high-tech crimes, incorporating digital forensics into the investigations, and was responsible for investigating some of the highest jury and plea bargain child exploitation investigations in Virginia court history. Patrick is a graduate of SCERS, BCERT, the Reid School of Interview & Interrogation and multiple online investigation schools (among others). He is a Cellebrite Certified Operator and Physical Analyst as well as certified in cellular call detail analysis and mapping. He continues to hone his digital forensic expertise in the private sector while growing his consulting & investigation business marketed toward litigators, professional investigators and corporations, while keeping in touch with the public safety community as a Law Enforcement Instructor.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span lang="FR" style="font-size: 12pt; line-height: 17.12px;">Email: <span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;">Inquiries@ProDigital4n6.com</span><o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span lang="FR" style="font-size: 12pt; line-height: 17.12px;">Web: </span><a href="https://www.blogger.com/null" style="color: #954f72;"><span lang="FR" style="font-size: 12pt; line-height: 17.12px;">www.ProDigital4n6.com</span></a><span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span lang="FR" style="font-size: 12pt; line-height: 17.12px;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span lang="NL" style="color: windowtext; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;">Linked In: </span></span><a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc" style="color: #954f72;"><span lang="NL" style="font-size: 12pt; line-height: 17.12px;">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</span></a><span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span lang="NL" style="font-size: 12pt; line-height: 17.12px; text-decoration-line: none;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comVirginia, USA37.4315734 -78.656894231.0306784 -88.9840427 43.832468399999996 -68.329745699999989tag:blogger.com,1999:blog-9015068036075853317.post-28690773854449913272020-05-13T14:07:00.000-04:002020-05-13T14:07:03.550-04:00So You Want To Start A Digital Forensic Business<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 8pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">May 13, 2020<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<u><span style="color: #c00000; font-size: 18pt; line-height: 25.68px;">So You Want To Start A Digital Forensic Business<o:p></o:p></span></u></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Pro Digital Forensic Consulting is about to embark on it’s 7<sup>th</sup> year in full-time operation. It’s hard to believe that when I made the decision to transition from law enforcement to the private sector, my little company would have come this far, servicing hundreds of clients through the years. Because of my background and the contact I have with the DF community via this blog and professional associations, I usually receive inquiries about starting up a digital forensic consultancy/business several times a year. In fact, I got another one just the other day via Linked In. And with the current state-of-affairs (Covid-19 shut down) and people’s livelihoods being somewhat in question, it seems natural that some might consider taking on a new venture. So, in the spirit of answering some of the frequently asked questions about what to expect if and when someone starts a digital forensic business, it seems a good idea to write down my thoughts and experience for future similar inquiries. To be clear, I could (and may) write a book about this topic, but this blog is fairly well-established, so it seems the appropriate vehicle for sharing these lessons learned. As a slight disclaimer, this article and the tips to follow are geared mainly toward sole-proprietor and small consulting firms. I’m pretty sure Kroll and KPMG have this figured out </span><span style="font-family: Wingdings; font-size: 12pt; line-height: 17.12px;">J</span><span style="font-size: 12pt; line-height: 17.12px;">.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;"></span><span style="font-size: 12pt; line-height: 17.12px;"><o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-x-TiIrAJZpG2QSYkD6fPMfqGVvwSi09NrGwdM-eR4D2qU_8SxM4h8h7J97GNMAwCvAdvpO0SCEeaaWT5Vve7zn1OqVLlDd-fwH2MJygSvH7qkyBjJqO9FAqeHiCuteqUp8F8qKW8PjGJ/s1600/Computer+Business.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="620" data-original-width="936" height="422" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-x-TiIrAJZpG2QSYkD6fPMfqGVvwSi09NrGwdM-eR4D2qU_8SxM4h8h7J97GNMAwCvAdvpO0SCEeaaWT5Vve7zn1OqVLlDd-fwH2MJygSvH7qkyBjJqO9FAqeHiCuteqUp8F8qKW8PjGJ/s640/Computer+Business.jpg" width="640" /></a></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<b><u><span style="color: #c00000; font-size: 14pt; line-height: 19.9733px;">Tip #1: Have A Supplemental Income Plan</span></u></b><b><span style="font-size: 14pt; line-height: 19.9733px;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Virtually no business starts off day 1 churning revenue and making a profit. When Pro Digital was launched full-time in June of 2014, we billed a whopping $7,800 for the from that point to the end of 2014. It would have been much less were it not for one large computer forensic case which accounted for nearly 85% of the billings for 2014. Alongside the work that went into opening a business, I was also fortunate to have some things to fall back on personally, such as part-time and/or contract work, some of which had nothing to do with forensics. The take-away here is that it’s important to have a supplemental income source that you can use to help keep your newly-formed lights on while the business is growing and you’re working on creating awareness and “buzz” for the business. The downside is the marketing and awareness campaigns for your new shingle are a full-time business in themselves, so it can be double the work. I’ll touch on marketing more in Tip #6.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<b><u><span style="color: #c00000; font-size: 14pt; line-height: 19.9733px;">Tip #2: Keep Abreast of Trends</span></u></b><b><u><span style="font-size: 14pt; line-height: 19.9733px;"><o:p></o:p></span></u></b></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Most of my notable work in law enforcement was working for a full-service agency on the Internet Crimes Against Children (ICAC) Task Force. Accordingly, all of my training and equipment was paid for by grants and other funding. My last year in law enforcement was in an administrative role for a small campus police department, which had no use for any digital forensic expertise, so the skill sets that I’d worked on for the previous 5+ years sat on a shelf and collected dust. When the business was launched full-time, I quickly realized how much things had evolved, changed and blown past me for the year I was not doing forensics. This is a field driven by current events and evolving technology. Try explaining the differences between and HFS+ and APFS file systems to someone who hasn’t been doing Mac forensics for a year or more. It’s a vast change and the changes don’t stop. I was amazed at how much I’d forgotten in that year and the learning curve was much steeper than I would have liked. It’s imperative to keep up to date with the field. Blogs, webinars, free training, list serves and colleagues are all great resources to keep current with what’s going on in the world of digital forensics. <o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<b><u><span style="color: #c00000; font-size: 14pt; line-height: 19.9733px;">Tip #3: Invest In GOOD Tools & Equipment</span></u></b><b><u><span style="font-size: 14pt; line-height: 19.9733px;"><o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">The start-up investment capital for Pro Digital was not a lot of money and was all self-funded. Accordingly, I did some research on tools and cost/benefit analysis on the investment in those tools and/or training. Initially, I purchased tools and equipment that wouldn’t break the bank and would get the job done. It wasn’t long before I realized that certain things will save me time and therefore, money. Along with that, it’s hard to work cases using tools no one has ever heard of before, particularly when the more tech-savvy attorneys with whom I work know the difference between one tool and another. Some of these tools I still use. Some of the software companies have basically gone belly-up and some I’ve gotten rid of over the years for one reason or another. Additionally, some tools have been purchased for case-specific needs. But the point remains that you need to invest in these things as if you were working a case for a loved-one. Would you want the analyst on your father’s case using sub-par tools that no one really uses? Probably not. Spend the money and get the good stuff. You’ll make your money back many times over. The adage is true, you have to spend money to make money.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<b><u><span style="color: #c00000; font-size: 14pt; line-height: 19.9733px;">Tip #4: Be Picky About Your Clients</span></u></b><b><u><span style="font-size: 14pt; line-height: 19.9733px;"><o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">When you’re hungry, everything looks like filet mignon. The problem is, if you eat everything you’re “fed”, you’ll have a host of side-effects that will be hard to manage. We used to work any and all cases that caused the phone to ring. The most notable and frequent of these are the “I’ve been hacked” cases. It is an unfortunate truth that there are many mentally ill people in the world and the internet gives them free reign to research to their hearts content and contact those whom they feel may be able to assist them in whatever issues they believe they are having, many of them tech-related. But these cases are a forensic and business quagmire. If you’re fortunate enough to get a client who will actually pay for your services, they will <i>never</i> be happy with the results. This could eventually have an adverse effect on your professional reputation as well. This is a reputation and referral-based business, so if you have clients that are in a position to ruin your reputation or malign you publicly, you will likely see fewer referrals over time. <o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">As a matter of policy, Pro Digital has transitioned to a purely litigation support model. If you are not actively involved in litigation or a representative of a corporation that needs digital forensic services, we likely will not take your case. If you’ve hired a PI to work your case, we may take it as a referral from a trusted source. We don’t need anybody’s money *that* badly to work a case for someone who is obviously suffering from some form of mental illness or someone who wants to spy on their spouse to dig up enough dirt to file for divorce. This is an ethical decision, but can also lead to legal issues if you’re not careful, i.e., theft of property, theft of data, unauthorized access to personal information, etc.. Also consider that if you are the digital forensic equivalent of an ambulance chaser, eventually you’ll devalue these services for everyone, including yourself. Be picky. It’s worth it. You’ll get the clients you want and you’ll preserve your professional reputation, this much I know and have seen first-hand. The big take-away here is always ensure you have written consent from the owner and/or an order from the court to access whatever you’re acquiring and analyzing.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<b><u><span style="color: #c00000; font-size: 14pt; line-height: 19.9733px;">Tip #5: YOU Are Your Brand<o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Digital Forensics is a small community. Whether you are in law enforcement, have transitioned out of law enforcement or have branched into digital forensics as an arm of your IT or infosec training, we generally know each other and recognize names and faces. We also recognize when someone is either a charlatan or is pushing an obvious agenda to try and attract clients. Everything you put out for public consumption (including blog articles) is subject to scrutiny, whether it be by the DF community, potential attorney-clients, opposing counsel, referral sources and/or other professional contacts. If you have an opinion about something, make sure you’re on solid footing before getting into public discourse about it. Take this recent example from a public post on Linked In from a professional contact (name and ID redacted):<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<span style="font-size: 12pt; line-height: 17.12px;"></span><span style="font-size: 12pt; line-height: 17.12px;"><o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipcpmWELuPJ1ryPJBboa51V98NcVM2EyDsTQKS1eFXY-dWKtjUC3PaKNkHCaP4tkWZm0rx0MzC_QqvDtrytvNgKehfFI6JLhDHPK84NqdE5VsqXVU4NkkdASUj61TlUzTxOSy_xANinAdR/s1600/Eller+Post+Redacted+01.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1296" data-original-width="838" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipcpmWELuPJ1ryPJBboa51V98NcVM2EyDsTQKS1eFXY-dWKtjUC3PaKNkHCaP4tkWZm0rx0MzC_QqvDtrytvNgKehfFI6JLhDHPK84NqdE5VsqXVU4NkkdASUj61TlUzTxOSy_xANinAdR/s640/Eller+Post+Redacted+01.jpg" width="412" /></a></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;"><br /></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">I’ve worked many independent analysis cases for criminal defense attorneys and have been appointed by the court dozens of times. I don’t know what this person is referring to, nor do I agree with their approach to putting this comment out publicly. Business <b><u>is</u></b> relationships and everything that you put in writing can come back to haunt you. I’ve received more referrals from my former law enforcement colleagues than I can remember over the years. Do you know why? Because I don’t take a public stand with an obvious agenda which maligns professionals. Not only would I never call out the law enforcement community as essentially being crooked and/or liars, I don’t believe that they are because I haven’t seen it in my 7 years working full time in the private sector. I have seen errors. I have seen mistakes. I have seen over-zealous investigators. But I have not seen liars. There’s also nothing “science” about this post. It’s an opinion and it’s part of an agenda to market specifically toward the criminal defense bar.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">The reality of our industry is that the majority of who it serves is law enforcement and government, including government contractors. The government is generally not on the cutting edge of <i>anything</i>, but they’ve certainly been on the cutting edge of digital forensics. Can private practitioners access tools like Gray Key? No. But I have almost never had a need for Gray Key. Why is that? Refer back to tip #4. I virtually always get a pass code and any necessary passwords either by consent or court order. The only exception to this has been when the owner doesn’t remember the password, usually on an older device. And to be clear, about 70% of the cases we work deal with mobile devices.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">When in business, it may be beneficial to remember the wise words of Michael Jordan, who still has his own shoe brand, despite being out of basketball for over 15 years. When asked at a press conference why he stays out of politics, his reply was simple: “Both Republicans and Democrats buy shoes!” Discretion is the better part of valor.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">As a final point to this tip, I was in a discussion with a colleague in law enforcement recently while at a conference. They said to me very confidently “The customer is always right, so you have to do what the client says no matter what!” My reply: “No I don’t!” What’s the point? Your professional integrity and reputation is your most valuable asset in this business. Lose it and you’re done. We will not alter any facts or data in any report or testimony to counsel or their clients, period. I’m sorry if the data doesn’t support your case. The data stands on its own and is irrefutable. Truth is not fungible.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<b><u><span style="color: #c00000; font-size: 14pt; line-height: 19.9733px;">Tip #6: Market Yourself (Because No One Else Will)</span></u></b><b><u><span style="font-size: 14pt; line-height: 19.9733px;"><o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">When I was a member of the ICAC Task Force, I was a fairly big fish in a pretty small pond. The agency for whom I worked had less than 60 sworn officers and was in a rural area. I did all of the tech-based investigation, search warrant planning & execution, evidence collection and as time progressed and casework grew, the forensic analysis. And because many of these cases garnered a lot of public interest, the command staff frequently put me as the media relations person with these cases. I never liked it. As a cop, I considered myself a modest personality. Others nominated me for awards and I was never comfortable in the spotlight. When I launched the business, I quickly realized all of that had to change.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Because I had media contacts already in place, I offered my knowledge and experience as a local media resource for tech-related stories. For a while, I was getting multiple calls every week from local media. Because I had a lot of time (i.e., no clients) in the beginning, I also churned out blog articles virtually once a week. I issued self-written press releases and worked hard on SEO for the company’s website. I also began sponsoring several associations for litigators in my area because, as previously noted, this is a referral-based business. In short, I had to become my own cheerleader because no one else was going to do it. Furthermore, I learned VERY quickly that just having a good professional reputation and a business does not make the phone ring. If you build it, they will not come – at least not like they did in <i>Field Of Dreams</i>.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">If you want the business, you have to go get it. And you have to keep on going out there to get it. The minute you lapse on marketing, the phone will stop ringing. This is why I’m constantly trying to add fresh content to the Pro Digital website. Having a website is great. Paying for Google ads is fine, but content is key. I had to learn this and be taught what works and what doesn’t over time. And I still make mistakes and spend money where I probably shouldn’t, but no one gave me a blueprint for running this business. Tips, advice, counsel & support? Yes. But this is such a niche business, it requires a special marketing skill set. If you don’t have it, you will likely fail. This is the biggest area I think many ex-law enforcement are not comfortable with and probably what turns many of them off to launching their own business. Quiet professionals don’t normally like the public spotlight.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<b><u><span style="color: #c00000; font-size: 14pt; line-height: 19.9733px;">Wrapping It Up<o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Some may read this article and wonder why on earth I would tell potential competitors how to run a successful digital forensic business? One last tip I’ve learned over the years: There’s plenty of work to go around. I find it silly that a competitor of mine seemingly reported the Pro Digital Twitter as “spam”, which caused Twitter to shut it down. I don’t want their clients. I have my own and I am fortunate to bring on new ones every month. If any of these tips can help someone be successful, I’m happy to share what I’ve learned. No one taught me these things when I started out. Hopefully by sharing some of these tips, I can pay it forward to the next old cop who wants to try his hand at something new(ish). Until then, I’m off to work the next case and hopefully clear out my backlog queue. Good luck!<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Author:<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Patrick J. Siewert<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Principal Consultant<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Professional Digital Forensic Consulting, LLC<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Virginia DCJS #11-14869<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Based in Richmond, Virginia<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Available Wherever You Need Us!<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<i><u><span style="color: #c00000; font-size: 22pt; line-height: 31.3867px;">We Find the Truth for a Living</span></u></i><i><span style="color: #c00000; font-size: 22pt; line-height: 31.3867px;">!<o:p></o:p></span></i></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<i><span style="color: #c00000; font-size: 22pt; line-height: 31.3867px;"><br /></span></i></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 8pt; text-align: center;">
<span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span style="color: windowtext; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;">Computer Forensics -- Mobile Forensics -- Specialized Investigation<o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 8pt;">
<span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span style="color: windowtext; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;">About the Author:<o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 8pt;">
<span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span style="color: windowtext; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;">Patrick Siewert is the Principal Consultant of Pro Digital Forensic Consulting, based in Richmond, Virginia. In 15 years of law enforcement, he investigated hundreds of high-tech crimes, incorporating digital forensics into the investigations, and was responsible for investigating some of the highest jury and plea bargain child exploitation investigations in Virginia court history. Patrick is a graduate of SCERS, BCERT, the Reid School of Interview & Interrogation and multiple online investigation schools (among others). He is a Cellebrite Certified Operator and Physical Analyst as well as certified in cellular call detail analysis and mapping. He continues to hone his digital forensic expertise in the private sector while growing his consulting & investigation business marketed toward litigators, professional investigators and corporations, while keeping in touch with the public safety community as a Law Enforcement Instructor.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span lang="FR" style="font-size: 12pt; line-height: 17.12px;">Email: <span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;">Inquiries@ProDigital4n6.com</span><o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span lang="FR" style="font-size: 12pt; line-height: 17.12px;">Web: </span><a href="https://www.blogger.com/null" style="color: #954f72;"><span lang="FR" style="font-size: 12pt; line-height: 17.12px;">www.ProDigital4n6.com</span></a><span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span lang="FR" style="font-size: 12pt; line-height: 17.12px;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span lang="NL" style="color: windowtext; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;">Linked In: </span></span><a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc" style="color: #954f72;"><span lang="NL" style="font-size: 12pt; line-height: 17.12px;">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</span></a><span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span lang="NL" style="font-size: 12pt; line-height: 17.12px; text-decoration-line: none;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comVirginia, USA37.4315734 -78.656894231.0306784 -88.9840427 43.832468399999996 -68.329745699999989tag:blogger.com,1999:blog-9015068036075853317.post-23520420482863205742020-04-24T12:14:00.000-04:002020-04-27T11:35:04.686-04:00Screen Shots Are Not (Good) Evidence<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 8pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">April 24, 2020<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<u><span style="color: #c00000; font-size: 18pt; line-height: 25.68px;">Screen Shots Are Not (Good) Evidence<o:p></o:p></span></u></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Working a variety of civil, corporate and criminal litigation cases, we see a myriad of different approaches to digital forensics in a litigation support model. One of the common cost-benefit questions that comes up is, why would a party involved in litigation spend the money to hire a digital forensic expert if they can simply take screen shots of disputed and/or evidentiary text messages on a mobile device and print them out? It’s a good question & a valid point, on its face. However, there are a number of different reasons we generally discourage this as a practice for presenting evidence in litigation, which we’ll explore here.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;"></span><span style="font-size: 12pt; line-height: 17.12px;"><o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlFmCpJvKzs3KJv_MqKBNLqM63OphAeh_BphwdPOVpc4Z7R4C89lfn5FJ7m2AjbI__AMsb-80yhJrB8i9YPLWJ38rolQexg0ErP19GfSj6QE0pGFknNr3AgNy-VSOtFvuuy6mm2QKRpyaD/s1600/Screen+Shots+Not+Evidence.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="727" data-original-width="974" height="297" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlFmCpJvKzs3KJv_MqKBNLqM63OphAeh_BphwdPOVpc4Z7R4C89lfn5FJ7m2AjbI__AMsb-80yhJrB8i9YPLWJ38rolQexg0ErP19GfSj6QE0pGFknNr3AgNy-VSOtFvuuy6mm2QKRpyaD/s400/Screen+Shots+Not+Evidence.png" width="400" /></a></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<br /></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<b><u><span style="color: #c00000; font-size: 14pt; line-height: 19.9733px;">Screen Shots Are Susceptible to Alteration</span></u></b><b><span style="font-size: 14pt; line-height: 19.9733px;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Consider a real-world example from a criminal case worked several years ago. Our client was charged with a misdemeanor count of assault & battery, but because his career field was such that he did not want a criminal conviction tarnishing his ability to obtain future employment, nor his reputation, he hired a very renowned law firm and a digital forensic expert to help refute the claim of assault because there were to have been exonerating text messages on his phone between he and the complaining party.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">When the trial date came, the complaining party introduced into evidence several screen shots of a text message between them and our client. The content of the messages was different from what we had obtained from the client’s phone via mobile forensic data extraction, which was confusing to the judge and the other parties in the case. When pressed for an answer about this discrepancy, they admitted that they had altered the text message screen shots before printing them to not only change the content of the messages, but the chronology as well. The lesson learned here is that anyone with very basic tools and computer skill can take an image (i.e., screen shot) and cut-and-paste or insert messages to their own ends. This is also true of some non-forensic tools which can be purchased online to extract text messages from a phone.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">When we conduct a mobile forensic data extraction and report the relevant information, we cannot alter the data. Furthermore, even if we could alter the data, we would be violating professional ethics and risking reputation by doing so. This example was a great lesson in why screen shots should never be presented as evidence.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<b><u><span style="color: #c00000; font-size: 14pt; line-height: 19.9733px;">Screen Shots Cannot Be Fully Validated or Authenticated</span></u></b><b><u><span style="font-size: 14pt; line-height: 19.9733px;"><o:p></o:p></span></u></b></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">The point of validation & authentication is an important one for court proceedings. If evidence such as text messages cannot be validated or authenticated, how can they be introduced into evidence? To me, this point all boils down to the source of the evidence that is being presented in court, which is usually some sort of printout of the relevant messages between the parties involved in the case. Who created those printouts or the report from which they came? Was it one of the parties involved in the litigation or was it a third-party expert who used bona-fide, validated and repeatable methods? If the evidence that is being presented was generated by one of the parties involved in the case, that should immediately call the veracity of those messages into question. <o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV8v4qsWVCEHEfgJiIBL7MOxOGdLGyHuBexqxdc9WNX26n7OkmsfgiZ69-z66Pd_23cIw6xrxmTKMrGp3HsYMPFGCub99fyjk7Z7WFxCq2R3WP1kYb4KZmj6v0TmhAsoTfP6yn68Jy-_J6/s1600/Text+messaging.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="770" data-original-width="974" height="315" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV8v4qsWVCEHEfgJiIBL7MOxOGdLGyHuBexqxdc9WNX26n7OkmsfgiZ69-z66Pd_23cIw6xrxmTKMrGp3HsYMPFGCub99fyjk7Z7WFxCq2R3WP1kYb4KZmj6v0TmhAsoTfP6yn68Jy-_J6/s400/Text+messaging.png" width="400" /></a></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<span style="font-size: 12pt; line-height: 17.12px;"></span><span style="font-size: 12pt; line-height: 17.12px;"><o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<b><u><span style="color: #c00000; font-size: 14pt; line-height: 19.9733px;">Presentation is Important<o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">I’d be willing to bet that both attorneys and digital forensic experts who read this article have, at some point, been presented with a series of screen shot printouts from a client which they believe is of extreme importance to their case. Many times, these printouts also include pictures, which if printed out improperly, are simple unrecognizable. Beyond that, some of the text conversations which may be relevant can lead to dozens or hundreds of pages being printed, which are hard to keep track of and just plain look bad!<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">The benefit of a mobile forensic data extraction is that we can often report out just what is relevant in a concise, easy-to-read manner, which is much more concise for presentation in court. The ultimate goal and purpose behind all of the methods used during the forensic process is so we can present those findings, along with any reasonable conclusions, in a court of law. It is counter-productive to present overly voluminous and/or excessive information to the judge, jury and opposing parties because their attention span for what may (or may not) be relevant is quite short during the course of a trial or hearing.<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<b><u><span style="color: #c00000; font-size: 14pt; line-height: 19.9733px;">Wrapping It Up<o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Covey said in his book <i>7 Habits for Highly Effective People</i>, “Begin with the end in mind.” When involved in litigation where text/picture messages may be used as evidence, this is a good rule by which to live. Do we want to be flipping through volumes of printed screen shots, which may or may not be altered by whomever “collected” them, in order to present a relevant point at trial? Probably not. We also don’t want questions about the veracity of the content or chronology of the messages, which is easy to alter and therefore be disputed just as easily. When we “begin with the end in mind”, we can see that it’s always better to have a trained, certified, experienced digital forensic examiner conduct the data collection and reporting. By doing so, we can make great strides toward getting at the truth of the matter!<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Author:<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Patrick J. Siewert<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Principal Consultant<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Professional Digital Forensic Consulting, LLC<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Virginia DCJS #11-14869<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Based in Richmond, Virginia<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span style="font-size: 12pt; line-height: 17.12px;">Available Wherever You Need Us!<o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt; text-align: center;">
<i><u><span style="color: #c00000; font-size: 22pt; line-height: 31.3867px;">We Find the Truth for a Living</span></u></i><i><span style="color: #c00000; font-size: 22pt; line-height: 31.3867px;">!<o:p></o:p></span></i></div>
<div align="center" class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 8pt; text-align: center;">
<span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span style="color: windowtext; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;">Computer Forensics -- Mobile Forensics -- Specialized Investigation<o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 8pt;">
<span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span style="color: windowtext; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;">About the Author:<o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 8pt;">
<span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span style="color: windowtext; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;">Patrick Siewert is the Principal Consultant of Pro Digital Forensic Consulting, based in Richmond, Virginia. In 15 years of law enforcement, he investigated hundreds of high-tech crimes, incorporating digital forensics into the investigations, and was responsible for investigating some of the highest jury and plea bargain child exploitation investigations in Virginia court history. Patrick is a graduate of SCERS, BCERT, the Reid School of Interview & Interrogation and multiple online investigation schools (among others). He is a Cellebrite Certified Operator and Physical Analyst as well as certified in cellular call detail analysis and mapping. He continues to hone his digital forensic expertise in the private sector while growing his consulting & investigation business marketed toward litigators, professional investigators and corporations, while keeping in touch with the public safety community as a Law Enforcement Instructor.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span lang="FR" style="font-size: 12pt; line-height: 17.12px;">Email: <span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;">Inquiries@ProDigital4n6.com</span><o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span lang="FR" style="font-size: 12pt; line-height: 17.12px;">Web: </span><a href="https://www.blogger.com/null" style="color: #954f72;"><span lang="FR" style="font-size: 12pt; line-height: 17.12px;">www.ProDigital4n6.com</span></a><span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span lang="FR" style="font-size: 12pt; line-height: 17.12px;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span lang="NL" style="color: windowtext; font-size: 12pt; line-height: 17.12px; text-decoration-line: none;">Linked In: </span></span><a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc" style="color: #954f72;"><span lang="NL" style="font-size: 12pt; line-height: 17.12px;">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</span></a><span class="MsoHyperlink" style="color: #0563c1; text-decoration-line: underline;"><span lang="NL" style="font-size: 12pt; line-height: 17.12px; text-decoration-line: none;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 15.6933px; margin: 0in 0in 0.0001pt;">
<br /></div>
Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comVirginia, USA37.4315734 -78.656894231.0306784 -88.9840427 43.832468399999996 -68.329745699999989tag:blogger.com,1999:blog-9015068036075853317.post-26025399157265710392020-01-09T15:59:00.000-05:002020-01-09T15:59:21.037-05:00Digital Forensics: Theory vs. Practice
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]-->
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves>false</w:TrackMoves>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>ZH-CN</w:LidThemeAsian>
<w:LidThemeComplexScript>AR-SA</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:ApplyBreakingRules/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
DefSemiHidden="false" DefQFormat="false" DefPriority="99"
LatentStyleCount="376">
<w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 9"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="header"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footer"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index heading"/>
<w:LsdException Locked="false" Priority="35" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of figures"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope return"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="line number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="page number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of authorities"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="macro"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="toa heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 5"/>
<w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Closing"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Signature"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="true"
UnhideWhenUsed="true" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Message Header"/>
<w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Salutation"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Date"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Note Heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Block Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="FollowedHyperlink"/>
<w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Document Map"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Plain Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="E-mail Signature"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Top of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Bottom of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal (Web)"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Acronym"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Cite"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Code"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Definition"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Keyboard"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Preformatted"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Sample"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Typewriter"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Variable"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Table"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation subject"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="No List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Contemporary"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Elegant"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Professional"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Balloon Text"/>
<w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Theme"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" QFormat="true"
Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" QFormat="true"
Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" QFormat="true"
Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" QFormat="true"
Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" QFormat="true"
Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" QFormat="true"
Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" SemiHidden="true"
UnhideWhenUsed="true" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
<w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
<w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
<w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
<w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
<w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
<w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
<w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hashtag"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Unresolved Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Link"/>
</w:LatentStyles>
</xml><![endif]-->
<style>
<!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;
mso-font-charset:0;
mso-generic-font-family:roman;
mso-font-pitch:variable;
mso-font-signature:3 0 0 0 1 0;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;
mso-font-charset:0;
mso-generic-font-family:swiss;
mso-font-pitch:variable;
mso-font-signature:-536859905 -1073732485 9 0 511 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-parent:"";
margin-top:0in;
margin-right:0in;
margin-bottom:8.0pt;
margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoHeader, li.MsoHeader, div.MsoHeader
{mso-style-priority:99;
mso-style-link:"Header Char";
margin:0in;
margin-bottom:.0001pt;
mso-pagination:widow-orphan;
tab-stops:center 3.25in right 6.5in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
mso-themecolor:hyperlink;
text-decoration:underline;
text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-noshow:yes;
mso-style-priority:99;
color:#954F72;
mso-themecolor:followedhyperlink;
text-decoration:underline;
text-underline:single;}
span.HeaderChar
{mso-style-name:"Header Char";
mso-style-priority:99;
mso-style-unhide:no;
mso-style-locked:yes;
mso-style-link:Header;}
.MsoChpDefault
{mso-style-type:export-only;
mso-default-props:yes;
font-size:11.0pt;
mso-ansi-font-size:11.0pt;
mso-bidi-font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
.MsoPapDefault
{mso-style-type:export-only;
margin-bottom:8.0pt;
line-height:107%;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.WordSection1
{page:WordSection1;}
-->
</style>
<!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:8.0pt;
mso-para-margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<!--StartFragment-->
<br />
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">January 9, 2020<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<u><span style="color: #c00000; font-size: 18.0pt; line-height: 107%;">Digital Forensics: Theory vs. Practice<o:p></o:p></span></u></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">As an active digital forensic
practitioner for over 10 years, I have attended many training offerings from
many different companies/resources, read many white papers published by any
number of scientific and academic entities and worked hundreds of active cases
for plaintiffs, defendants and in law enforcement covering PC, Mac and mobile
device forensics.<span style="mso-spacerun: yes;"> </span>One aspect that
crosses all of these areas that has waned slightly in the last few years, but
still rears its ugly head, are the theoretical questions surrounding digital forensics.<span style="mso-spacerun: yes;"> </span>Among these we have all heard at one point or
another -- hash collisions, data cross-contamination and reverse-engineering of
hash values to be made into a viewable data file.<span style="mso-spacerun: yes;"> </span>While we can Google these theories and
findings to death, their practical application in “everyday forensics” is reality-based,
not theoretical.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%; mso-no-proof: yes;"><!--[if gte vml 1]><v:shapetype
id="_x0000_t75" coordsize="21600,21600" o:spt="75" o:preferrelative="t"
path="m@4@5l@4@11@9@11@9@5xe" filled="f" stroked="f">
<v:stroke joinstyle="miter"/>
<v:formulas>
<v:f eqn="if lineDrawn pixelLineWidth 0"/>
<v:f eqn="sum @0 1 0"/>
<v:f eqn="sum 0 0 @1"/>
<v:f eqn="prod @2 1 2"/>
<v:f eqn="prod @3 21600 pixelWidth"/>
<v:f eqn="prod @3 21600 pixelHeight"/>
<v:f eqn="sum @0 0 1"/>
<v:f eqn="prod @6 1 2"/>
<v:f eqn="prod @7 21600 pixelWidth"/>
<v:f eqn="sum @8 21600 0"/>
<v:f eqn="prod @7 21600 pixelHeight"/>
<v:f eqn="sum @10 21600 0"/>
</v:formulas>
<v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"/>
<o:lock v:ext="edit" aspectratio="t"/>
</v:shapetype><v:shape id="Picture_x0020_6" o:spid="_x0000_i1027" type="#_x0000_t75"
alt="A person using a computer sitting on top of a table Description automatically generated"
style='width:468pt;height:311pt;visibility:visible;mso-wrap-style:square'>
<v:imagedata src="file:////Users/ProDigital/Library/Group%20Containers/UBF8T346G9.Office/TemporaryItems/msohtmlclip/clip_image001.png"
o:title="A person using a computer sitting on top of a table Description automatically generated"/>
</v:shape><![endif]--><!--[if !vml]--><!--[endif]--></span></u></b><b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;"><o:p></o:p></span></u></b></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhG6Hu25rvsngaAWCpf1IH7JQ-zUvopbqQXZ4QlvrLdAqs7uB3Y0ZGmX4kTbAZMmUHGJWXw12a2jDrVMmpL4oWXZRpAQgFiuIPQ_odNz4rn6cm5Il-8f-OqqXBznLH8gIH6kx1AfeKApti/s1600/Computer+Cell+Phone.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1063" data-original-width="1600" height="265" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhG6Hu25rvsngaAWCpf1IH7JQ-zUvopbqQXZ4QlvrLdAqs7uB3Y0ZGmX4kTbAZMmUHGJWXw12a2jDrVMmpL4oWXZRpAQgFiuIPQ_odNz4rn6cm5Il-8f-OqqXBznLH8gIH6kx1AfeKApti/s400/Computer+Cell+Phone.png" width="400" /></a></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Hash Collisions</span></u></b><b style="mso-bidi-font-weight: normal;"><span style="font-size: 14.0pt; line-height: 107%;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">The topic of hash collisions
generally comes up when working independent analysis in criminal defense
cases.<span style="mso-spacerun: yes;"> </span>This digital version of the “some
other dude did it” (or SODDI) defense is based upon the theory that two digital
files containing completely different data can be run through a hashing
algorithm and obtain the same result.<span style="mso-spacerun: yes;"> </span>Hash
calculation is a big part of forensics and particularly in cases dealing with
child exploitation images, the hash value is used to locate those sharing illicit
images on the peer-to-peer file-sharing networks.<span style="mso-spacerun: yes;"> </span>However, we also use hash values to validate
evidence files as identical to the original, to cancel out any irrelevant/system
files and to validate the authenticity of files across a system or multiple
pieces of evidence.<span style="mso-spacerun: yes;"> </span>Hashing algorithms
such as <a href="https://www.mscs.dal.ca/~selinger/md5collision/">MD5</a> and <a href="https://www.theregister.co.uk/2017/02/23/google_first_sha1_collision/">SHA-1</a>
have been “broken” for years, but are still in ubiquitous use in digital
forensics.<span style="mso-spacerun: yes;"> </span>Why?<span style="mso-spacerun: yes;"> </span>Because the practical application of these
collisions is so minimal, it is not even worth mentioning in a court of law. But
rest assured, it still gets mentioned!<span style="mso-spacerun: yes;"> </span>The
only <i>real</i> application these collisions have is to attempt to obfuscate
the facts and/or confuse the finder of fact in a legal proceeding.<span style="mso-spacerun: yes;"> </span>Simply put, there are no documented cases where
someone accused of downloading or sharing illicit images was falsely accused
because the images they downloaded/shared possessed the same hash value as some
innocuous files they were attempting to download/share.<span style="mso-spacerun: yes;"> </span>Consider the statistical likelihood that
someone downloaded/shared an innocuous file which happened to share the same
hash value as an illicit file and also was on a police watch list where a
search warrant was executed.<span style="mso-spacerun: yes;"> </span>All of
those factors being in place at once is very unlikely.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">While we are constantly testing, honing
and refining our knowledge in the field of digital forensics and we may even
work in a “lab”, the fact remains that at a practical level, none of us have
the ability to re-create these collisions, nor have we seen them “in the wild”,
so to speak.<span style="mso-spacerun: yes;"> </span>They are reserved for a theoretical
lab environment where the sole purpose is to find and publish the collision,
not to find and report the truth in the evidence.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Data Cross-Contamination</span></u></b><b style="mso-bidi-font-weight: normal;"><u><span style="font-size: 14.0pt; line-height: 107%;"><o:p></o:p></span></u></b></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Before I discuss the practicality of
data cross-contamination, I’ll insert a disclaimer that I understand that using
sterilized media to store forensic data and conduct analysis is mentioned as
potential best practices, as detailed in the <a href="https://www.swgde.org/documents/Current%20Documents/SWGDE%20Best%20Practices%20for%20Computer%20Forensic%20Acquisitions">Scientific
Working Group on Digital Evidence (SWDGE) Best Practices for Computer Forensic Acquisitions
(v. 1.0)</a>.<span style="mso-spacerun: yes;"> </span>One of the reasons for
this to avoid data cross-contamination.<span style="mso-spacerun: yes;">
</span>What is that?<span style="mso-spacerun: yes;"> </span>It is a theory that
if you have a piece of media upon which you store data to be analyzed in a
forensically-sound environment, that if you do not sterilize the media (i.e.,
wipe and validate prior to placing the data to be analyzed on the media) that
some data from a previous or unrelated case could become part of the current
case analysis data, thus potentially contaminating the results with un-related
data.<span style="mso-spacerun: yes;"> </span>This is a viable theory when
dealing with physical evidence such as DNA samples or fingerprints, but it has
very little, if any practical application in digital forensics.<span style="mso-spacerun: yes;"> </span>Consider that if you create a forensic data
file such as an .e01, raw or .zip file, what is the method and/or likelihood that
copying that file onto a piece of non-sterilized media will somehow mix or
comingle with pre-existing data?<span style="mso-spacerun: yes;"> </span>I’ve
heard one claim of data cross-contamination from another examiner, but anecdotes
are not data, nor was the claim ever validated.<span style="mso-spacerun: yes;">
</span>We sterilize the media, not because we’ve ever seen it affect any cases,
but to avoid questions about it when testifying.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<span style="font-size: 12.0pt; line-height: 107%; mso-no-proof: yes;"><!--[if gte vml 1]><v:shape id="Picture_x0020_7" o:spid="_x0000_i1026"
type="#_x0000_t75" alt="A person standing in a room Description automatically generated"
style='width:468pt;height:309pt;visibility:visible;mso-wrap-style:square'>
<v:imagedata src="file:////Users/ProDigital/Library/Group%20Containers/UBF8T346G9.Office/TemporaryItems/msohtmlclip/clip_image002.png"
o:title="A person standing in a room Description automatically generated"/>
</v:shape><![endif]--><!--[if !vml]--><!--[endif]--></span><span style="font-size: 12.0pt; line-height: 107%;"><o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg354Ash_UcHl3wZloAKStMp4ua-lgn-di5GJ8ioHOGb0LTVRYVdW47zF2ZKgJGFdwHtS041RESdQZfFEN25xHhWgu9PJghHq9yg4PH6tHoUAwjPMHgFAhxkYN20mvyvE65ClBT5lPiS8QF/s1600/Laboratory.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1056" data-original-width="1600" height="263" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg354Ash_UcHl3wZloAKStMp4ua-lgn-di5GJ8ioHOGb0LTVRYVdW47zF2ZKgJGFdwHtS041RESdQZfFEN25xHhWgu9PJghHq9yg4PH6tHoUAwjPMHgFAhxkYN20mvyvE65ClBT5lPiS8QF/s400/Laboratory.png" width="400" /></a></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;"><o:p><br /></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Hash Value Reverse-Engineering<o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Having obtained much of my initial
training in law enforcement and, as such, working a majority of cases involving
illicit images, I can recall being trained that catalogs of illicit image hash
values are law enforcement sensitive and not to be disseminated to independent
examiners or to the general public.<span style="mso-spacerun: yes;">
</span>Why?<span style="mso-spacerun: yes;"> </span>Because someone could
potentially and theoretically reverse-engineer the hash value to re-create the file,
which would be illegal.<span style="mso-spacerun: yes;"> </span>This came up again
in a case worked independently in 2019.<span style="mso-spacerun: yes;">
</span>I thought this theory and explanation was long gone, but it is not.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">The problem with the theory of reverse-engineering
a hash value is I’m not sure it’s ever been done, at least not at a practical
level.<span style="mso-spacerun: yes;"> </span>It is a theory.<span style="mso-spacerun: yes;"> </span>Scientists, academics and lab-rats may have
done it, but I don’t know anyone who actively practices digital forensics that
either 1) has the knowledge, skills and abilities to do it and/or 2) has the
desire to do it.<span style="mso-spacerun: yes;"> </span>So why is it still
mentioned as a consideration in cases?<span style="mso-spacerun: yes;"> </span>(Hint:
see the above note about obfuscation and confusion).<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Wrapping It Up<o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">I’m not an academic or a lab-rat.<span style="mso-spacerun: yes;"> </span>I’m just an old(ish) retired investigator with
some skillsets that can often be of benefit to parties involved in litigation.<span style="mso-spacerun: yes;"> </span>Because of that, I’m concerned with the
practicality of digital forensics – What is the best way to get the case
analyzed?<span style="mso-spacerun: yes;"> </span>What evidence is relevant?<span style="mso-spacerun: yes;"> </span>Where do I need to look for the
evidence?<span style="mso-spacerun: yes;"> </span>What am I missing that could
potentially answer important questions?<span style="mso-spacerun: yes;">
</span>Theoretical considerations like those mentioned here are not worthy of
much calorie-burning when trying to answer these questions.<span style="mso-spacerun: yes;"> </span>In the pragmatic world of digital forensics,
we have to consider what <i><u>is</u></i>, not what could be.<span style="mso-spacerun: yes;"> </span>Because the truth lies in the facts of the
case and the data which is part of the case, not on theory of what could or may
have happened… And likely did not!<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Author: <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Patrick J. Siewert<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Principal Consultant<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Professional Digital Forensic
Consulting, LLC <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Virginia DCJS #11-14869<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Based in Richmond, Virginia<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Available Wherever You Need Us!<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<i style="mso-bidi-font-style: normal;"><u><span style="color: #c00000; font-size: 22.0pt; line-height: 107%;">We Find the Truth for a
Living</span></u></i><i style="mso-bidi-font-style: normal;"><span style="color: #c00000; font-size: 22.0pt; line-height: 107%;">!<o:p></o:p></span></i></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<i style="mso-bidi-font-style: normal;"><span style="color: #c00000; font-size: 22.0pt; line-height: 107%;"><br /></span></i></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span class="MsoHyperlink"><span style="color: windowtext; font-size: 12.0pt; line-height: 107%; text-decoration: none; text-underline: none;">Computer Forensics -- Mobile Forensics
-- Specialized Investigation<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="MsoHyperlink"><span style="color: windowtext; font-size: 12.0pt; line-height: 107%; text-decoration: none; text-underline: none;">About
the Author:<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="MsoHyperlink"><span style="color: windowtext; font-size: 12.0pt; line-height: 107%; text-decoration: none; text-underline: none;">Patrick
Siewert is the Principal Consultant of Pro Digital Forensic Consulting, based
in Richmond, Virginia.<span style="mso-spacerun: yes;"> </span>In 15 years of
law enforcement, he investigated hundreds of high-tech crimes, incorporating
digital forensics into the investigations, and was responsible for
investigating some of the highest jury and plea bargain child exploitation
investigations in Virginia court history. <span style="mso-spacerun: yes;"> </span>Patrick is a graduate of SCERS, BCERT, the
Reid School of Interview & Interrogation and multiple online investigation
schools (among others).<span style="mso-spacerun: yes;"> </span>He is a
Cellebrite Certified Operator and Physical Analyst as well as certified in
cellular call detail analysis and mapping. <span style="mso-spacerun: yes;"> </span>He continues to hone his digital forensic
expertise in the private sector while growing his consulting &
investigation business marketed toward litigators, professional investigators
and corporations, while keeping in touch with the public safety community as a
Law Enforcement Instructor.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">Email:<span style="mso-spacerun: yes;"> </span><span class="MsoHyperlink">Inquiries@ProDigital4n6.com</span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">Web: </span><a href="https://www.blogger.com/null"><span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">www.ProDigital4n6.com</span></a><span class="MsoHyperlink"><span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span class="MsoHyperlink"><span lang="NL" style="color: windowtext; font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; text-decoration: none; text-underline: none;">Linked
In: </span></span><a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL;">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</span></a><span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; text-decoration: none; text-underline: none;"> <o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span class="MsoHyperlink"><span lang="NL" style="color: windowtext; font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; text-decoration: none; text-underline: none;">Twitter:
</span></span><a href="http://www.twitter.com/prodigital4n6"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL;">@ProDigital4n6</span></a><span class="MsoHyperlink"><span lang="NL" style="color: windowtext; font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; text-decoration: none; text-underline: none;"><o:p></o:p></span></span></div>
<!--EndFragment--><br />Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comVirginia, USA37.4315734 -78.65689420000001131.0306784 -88.9840427 43.832468399999996 -68.329745700000018tag:blogger.com,1999:blog-9015068036075853317.post-25826129945099873252019-12-09T11:43:00.000-05:002019-12-09T11:43:45.474-05:00Digital Forensics in Sexual Assault Cases
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]-->
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves>false</w:TrackMoves>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>ZH-CN</w:LidThemeAsian>
<w:LidThemeComplexScript>AR-SA</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:ApplyBreakingRules/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
DefSemiHidden="false" DefQFormat="false" DefPriority="99"
LatentStyleCount="377">
<w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 9"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="header"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footer"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index heading"/>
<w:LsdException Locked="false" Priority="35" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of figures"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope return"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="line number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="page number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of authorities"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="macro"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="toa heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 5"/>
<w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Closing"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Signature"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="true"
UnhideWhenUsed="true" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Message Header"/>
<w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Salutation"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Date"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Note Heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Block Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="FollowedHyperlink"/>
<w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Document Map"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Plain Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="E-mail Signature"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Top of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Bottom of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal (Web)"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Acronym"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Cite"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Code"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Definition"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Keyboard"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Preformatted"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Sample"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Typewriter"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Variable"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Table"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation subject"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="No List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Contemporary"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Elegant"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Professional"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Balloon Text"/>
<w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Theme"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" QFormat="true"
Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" QFormat="true"
Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" QFormat="true"
Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" QFormat="true"
Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" QFormat="true"
Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" QFormat="true"
Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" SemiHidden="true"
UnhideWhenUsed="true" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
<w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
<w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
<w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
<w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
<w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
<w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
<w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hashtag"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Unresolved Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Link"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Link Error"/>
</w:LatentStyles>
</xml><![endif]-->
<style>
<!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;
mso-font-charset:0;
mso-generic-font-family:roman;
mso-font-pitch:variable;
mso-font-signature:-536870145 1107305727 0 0 415 0;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;
mso-font-charset:0;
mso-generic-font-family:swiss;
mso-font-pitch:variable;
mso-font-signature:-536859905 -1073732485 9 0 511 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-parent:"";
margin-top:0in;
margin-right:0in;
margin-bottom:8.0pt;
margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoHeader, li.MsoHeader, div.MsoHeader
{mso-style-priority:99;
mso-style-link:"Header Char";
margin:0in;
margin-bottom:.0001pt;
mso-pagination:widow-orphan;
tab-stops:center 3.25in right 6.5in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
mso-themecolor:hyperlink;
text-decoration:underline;
text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-noshow:yes;
mso-style-priority:99;
color:#954F72;
mso-themecolor:followedhyperlink;
text-decoration:underline;
text-underline:single;}
span.HeaderChar
{mso-style-name:"Header Char";
mso-style-priority:99;
mso-style-unhide:no;
mso-style-locked:yes;
mso-style-link:Header;}
.MsoChpDefault
{mso-style-type:export-only;
mso-default-props:yes;
font-size:11.0pt;
mso-ansi-font-size:11.0pt;
mso-bidi-font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
.MsoPapDefault
{mso-style-type:export-only;
margin-bottom:8.0pt;
line-height:107%;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.WordSection1
{page:WordSection1;}
-->
</style>
<!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:8.0pt;
mso-para-margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<!--StartFragment-->
<br />
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">December 9, 2019<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<u><span style="color: #c00000; font-size: 18.0pt; line-height: 107%;">Digital Forensics in Sexual Assault Cases<o:p></o:p></span></u></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Any practicing litigators and digital
forensic analysts (as well as our regular readers) appreciate the value that
digital evidence can add to their cases. <span style="mso-spacerun: yes;"> </span>Civil, criminal and administrative matters can
all have a data component to them, for which forensic data acquisition, analysis
& reporting may be necessary and valuable.<span style="mso-spacerun: yes;">
</span>The challenge when putting together a case strategy is whether or not
the <i>cost</i> of digital forensic analysis is worthwhile to the overall
case.<span style="mso-spacerun: yes;"> </span>This particular approach in the
case strategy should always meet with a resounding “YES!” when working sexual
assault cases.<span style="mso-spacerun: yes;"> </span>It is reported that false
claims of sexual assault <a href="https://www.researchgate.net/publication/315728247_The_Prevalence_of_False_Allegations_of_Rape_in_the_United_States_from_2006-2010">are
five times as common as other types of crime</a>, and the incidents at the
heart of the claim are very often precipitated by text and/or picture messaging,
often to a high degree, which can serve to help reveal the truth of the claim.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">From One Side: The Accused</span></u></b><b style="mso-bidi-font-weight: normal;"><span style="font-size: 14.0pt; line-height: 107%;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">When an accusation of sexual assault
is made, there is frequently a “he said, she said” factor.<span style="mso-spacerun: yes;"> </span>But before the alleged assault took place,
there is often a build-up of text and/or picture messages in some form.<span style="mso-spacerun: yes;"> </span>In 2018 alone, <a href="https://www.nytimes.com/2019/12/05/technology/uber-sexual-assaults-murders-deaths-safety.html">Uber
reported over 3,000 sexual assaults</a>.<span style="mso-spacerun: yes;">
</span>All activity on Uber is facilitated via the app, including a messaging
component.<span style="mso-spacerun: yes;"> </span>Uber also frequently logs GPS
coordinate location while using the app.<span style="mso-spacerun: yes;">
</span>All of this is extremely valuable data when attempting to prove or
disprove if the alleged perpetrator was at or near the incident location and in
contact with the complaining witness and if any pre or post-assault messaging
took place.<span style="mso-spacerun: yes;"> </span>But Uber is just one example…<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Dating apps are another frequent data
medium where activity precipitating a claim of sexual assault can take
place.<span style="mso-spacerun: yes;"> </span>Apps like Tinder, Bumble, Hinge,
Match, etc. all serve to match potential dates and facilitate communication prior
to meeting and/or exchanging phone numbers.<span style="mso-spacerun: yes;">
</span>Several of these apps also have the ability to send picture
messages.<span style="mso-spacerun: yes;"> </span>In the events where messages
have been deleted in between the time of the contact and the alleged assault, a
forensic data acquisition is critical to any recovery of those messages and
should be performed as soon as possible after the report is made and legal
authority is obtained.<span style="mso-spacerun: yes;"> </span>Additionally,
these apps are all location-based, so there may be data within the app that is
not accessible to the user that may help prove or disprove the claim of sexual
assault.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<span style="font-size: 12.0pt; line-height: 107%; mso-no-proof: yes;"><!--[if gte vml 1]><v:shapetype id="_x0000_t75" coordsize="21600,21600"
o:spt="75" o:preferrelative="t" path="m@4@5l@4@11@9@11@9@5xe" filled="f"
stroked="f">
<v:stroke joinstyle="miter"/>
<v:formulas>
<v:f eqn="if lineDrawn pixelLineWidth 0"/>
<v:f eqn="sum @0 1 0"/>
<v:f eqn="sum 0 0 @1"/>
<v:f eqn="prod @2 1 2"/>
<v:f eqn="prod @3 21600 pixelWidth"/>
<v:f eqn="prod @3 21600 pixelHeight"/>
<v:f eqn="sum @0 0 1"/>
<v:f eqn="prod @6 1 2"/>
<v:f eqn="prod @7 21600 pixelWidth"/>
<v:f eqn="sum @8 21600 0"/>
<v:f eqn="prod @7 21600 pixelHeight"/>
<v:f eqn="sum @10 21600 0"/>
</v:formulas>
<v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"/>
<o:lock v:ext="edit" aspectratio="t"/>
</v:shapetype><v:shape id="Picture_x0020_1" o:spid="_x0000_i1028" type="#_x0000_t75"
style='width:468pt;height:309pt;visibility:visible;mso-wrap-style:square'>
<v:imagedata src="file:////Users/ProDigital/Library/Group%20Containers/UBF8T346G9.Office/TemporaryItems/msohtmlclip/clip_image001.png"
o:title=""/>
</v:shape><![endif]--><!--[if !vml]--><!--[endif]--></span><span style="font-size: 12.0pt; line-height: 107%;"><o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3UzN5LIrisOFHkg-S8VcH5YOQAvNEZ-PcOqbw-BeNC2H0O7DtK9fYctispOhzGnR9igO65Mdl6Wv8x0BVIaXR9T1JEgYM4S5zV0voB6pdzy5kcnG0BYq62lhlvNs_7jG29GlOJZlCb1sd/s1600/Cell+Phone+GPS+location.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1058" data-original-width="1600" height="263" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3UzN5LIrisOFHkg-S8VcH5YOQAvNEZ-PcOqbw-BeNC2H0O7DtK9fYctispOhzGnR9igO65Mdl6Wv8x0BVIaXR9T1JEgYM4S5zV0voB6pdzy5kcnG0BYq62lhlvNs_7jG29GlOJZlCb1sd/s400/Cell+Phone+GPS+location.png" width="400" /></a></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;"><o:p><br /></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">While app data is certainly valuable,
the data stored within the standard text or iMessage databases should not be
overlooked. <span style="mso-spacerun: yes;"> </span>Even in cases where
communication may have started on an application, very often users will
transition to standard text messaging once there is a certain level of comfort.<span style="mso-spacerun: yes;"> </span>In the past several years, we have worked
multiple sexual assault cases where the deleted and recovered text messaging data
led to the acquittal of criminal defendants.<span style="mso-spacerun: yes;">
</span>In every case, this was because a false claim was made and ultimately
proven to be false through acquisition, analysis and presentation of text
message data from one location or another on the device.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">As a brief note, certain app data may
not be available through the forensic process and depending on the application,
the recoverable artifacts can be more circumstantial than substantive (i.e.,
contact entries).<span style="mso-spacerun: yes;"> </span>Snapchat, WhatsApp
& Signal are all very challenging, depending on the device hardware and software
(iPhone vs. Android).<span style="mso-spacerun: yes;"> </span>Fortunately,
mobile forensic developers are constantly working on these issues, so data that
may not be available today could be available in the future.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">From The Other Side:<span style="mso-spacerun: yes;"> </span>The Complaining Witness</span></u></b></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Despite there being <i>five times as
many false claims of sexual assault</i> as other types of crime, there still
seems to be a mental block with regard to obtaining a forensic data extraction
of the device(s) belonging to the complaining witness.<span style="mso-spacerun: yes;"> </span>As alluded to in our <a href="https://prodigital4n6.com/dont-forget-the-victim-and-their-device/">May
2016 article</a>, obtaining the data from the complaining witness’ device as
soon as possible after the incident is reported should be part of standard
practice in any sexual assault claim.<span style="mso-spacerun: yes;"> </span>Why?<span style="mso-spacerun: yes;"> </span>Simply put, there are two sides to every story
and as trained investigators will undoubtedly agree, the truth usually lies
somewhere in the middle.</span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;"><span style="mso-spacerun: yes;"><br /></span></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTat9K5ABlI1Dc6EGsaU1w9ZdbifCMjzCGd3KBBcojzP5LZRhGPhuT1HZCMABsVpXgAMjeLS1q0B2vmWrhwtaaoUCREnkHzp6RW_CfAaGJC4ZaR0IPRapauwHFDHDZgZVwxdu4mAFQ99Jl/s1600/Text+Messaging+phones.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1065" data-original-width="1600" height="265" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTat9K5ABlI1Dc6EGsaU1w9ZdbifCMjzCGd3KBBcojzP5LZRhGPhuT1HZCMABsVpXgAMjeLS1q0B2vmWrhwtaaoUCREnkHzp6RW_CfAaGJC4ZaR0IPRapauwHFDHDZgZVwxdu4mAFQ99Jl/s400/Text+Messaging+phones.png" width="400" /></a></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;"><span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Aside from being able to confirm or
refute the veracity of the claim, one party or the other may have deleted some of
the pertinent data, which could prove invaluable in piecing the facts together.<span style="mso-spacerun: yes;"> </span>No matter which party’s device is analyzed, it
is absolutely vital to look in all potential areas for messages.<span style="mso-spacerun: yes;"> </span>As previously stated, the accused and the
complaining witness may have started communication on one medium and
transitioned to another, so cross-referencing phone numbers, user ID’s/monikers
and other personally identifiable information is crucial to finding and
reporting all of the relevant data.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">It bears noting that obtaining the data
from the complaining witness’ device has not been the normal practice in cases
we’ve seen.<span style="mso-spacerun: yes;"> </span>The rationale given for this
is that the investigating entity doesn’t want to “re-victimize” the complaining
witness.<span style="mso-spacerun: yes;"> </span>The job of an investigator and
a digital forensic examiner is to ultimately <b>find the truth</b>, no matter
where that leads.<span style="mso-spacerun: yes;"> </span>With only half of the
potential data and a claim of assault, we potentially only have half of the
story.<span style="mso-spacerun: yes;"> </span>This <b>“digital PERK kit”</b>
can and will add value to the overall investigation when so much is at stake
for <i>both</i> parties, so obtaining the data from the complaining witness’
device in the interest of truth and justice.<span style="mso-spacerun: yes;">
</span>This should also be done with a high level of discretion and with either
consent or search warrant to obtain the data.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">The Civil Side<o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">The numbers of reported sexual
assaults from Uber alone make it worth mentioning how vital this evidence can
be from both sides, even in civil matters.<span style="mso-spacerun: yes;">
</span>If a criminal claim of sexual assault is made involving a company or app-based
service provider, that claim will many times lead to a civil suit being filed
alongside or subsequent to the criminal investigation.<span style="mso-spacerun: yes;"> </span>While the freedom of the accused may not be
at stake in a civil claim, there may be millions of dollars involved in the claim
arising from alleged sexual assault.<span style="mso-spacerun: yes;"> </span>For
all of the reasons cited here, the forensic data should be acquired from both plaintiff
and defendant.<span style="mso-spacerun: yes;"> </span>If data has previously
been acquired by law enforcement in an accompanying criminal investigation, the
same data should be requested through discovery.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<span style="font-size: 12.0pt; line-height: 107%; mso-no-proof: yes;"><!--[if gte vml 1]><v:shape id="Picture_x0020_5" o:spid="_x0000_i1026"
type="#_x0000_t75" style='width:468pt;height:330pt;visibility:visible;
mso-wrap-style:square'>
<v:imagedata src="file:////Users/ProDigital/Library/Group%20Containers/UBF8T346G9.Office/TemporaryItems/msohtmlclip/clip_image003.jpg"
o:title=""/>
</v:shape><![endif]--><!--[if !vml]--><!--[endif]--></span><span style="font-size: 12.0pt; line-height: 107%;"><o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge0qXMaF-qfmq3YC8kCwxqZkxMufa-dIc8sSDL6D9BqMURv9QmNL7JsKHMDkQ2NHmMnlsK_oIn9XNoU3Q9pe3PWLA1PhyE6YEKCqhdGnBv1WGPX4cxrTYivuZFnXBvJLw2wJILCii8JuzK/s1600/Analysis.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="903" data-original-width="1280" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge0qXMaF-qfmq3YC8kCwxqZkxMufa-dIc8sSDL6D9BqMURv9QmNL7JsKHMDkQ2NHmMnlsK_oIn9XNoU3Q9pe3PWLA1PhyE6YEKCqhdGnBv1WGPX4cxrTYivuZFnXBvJLw2wJILCii8JuzK/s320/Analysis.jpg" width="320" /></a></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;"><o:p><br /></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Wrapping It Up<o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">In the era of the #metoo movement and
high-profile attention on sexual assaults in America, the value of forensic
data as it relates to these claims cannot be overstated.<span style="mso-spacerun: yes;"> </span>Proper collection, analysis, reporting and
effective testimony about the findings can often make or break a case.<span style="mso-spacerun: yes;"> </span>Ultimately, the truth is at the heart of the
matter.<span style="mso-spacerun: yes;"> </span>With a universal approach to
every sexual assault investigation – criminal or civil – the digital evidence
can help lead the finder of fact to the truth, which means justice will have
been served.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Author: <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Patrick J. Siewert<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Principal Consultant<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Professional Digital Forensic
Consulting, LLC <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Virginia DCJS #11-14869<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Based in Richmond, Virginia<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Available Wherever You Need Us!<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<i style="mso-bidi-font-style: normal;"><u><span style="color: #c00000; font-size: 22.0pt; line-height: 107%;">We Find the Truth for a
Living</span></u></i><i style="mso-bidi-font-style: normal;"><span style="color: #c00000; font-size: 22.0pt; line-height: 107%;">!<o:p></o:p></span></i></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span class="MsoHyperlink"><span style="color: windowtext; font-size: 12.0pt; line-height: 107%; text-decoration: none; text-underline: none;">Computer Forensics -- Mobile
Forensics -- Specialized Investigation<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="MsoHyperlink"><span style="color: windowtext; font-size: 12.0pt; line-height: 107%; text-decoration: none; text-underline: none;">About
the Author:<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="MsoHyperlink"><span style="color: windowtext; font-size: 12.0pt; line-height: 107%; text-decoration: none; text-underline: none;">Patrick
Siewert is the Principal Consultant of Pro Digital Forensic Consulting, based
in Richmond, Virginia.<span style="mso-spacerun: yes;"> </span>In 15 years of
law enforcement, he investigated hundreds of high-tech crimes, incorporating
digital forensics into the investigations, and was responsible for
investigating some of the highest jury and plea bargain child exploitation
investigations in Virginia court history. <span style="mso-spacerun: yes;"> </span>Patrick is a graduate of SCERS, BCERT, the
Reid School of Interview & Interrogation and multiple online investigation
schools (among others).<span style="mso-spacerun: yes;"> </span>He is a
Cellebrite Certified Operator and Physical Analyst as well as certified in
cellular call detail analysis and mapping. <span style="mso-spacerun: yes;"> </span>He continues to hone his digital forensic
expertise in the private sector while growing his consulting &
investigation business marketed toward litigators, professional investigators
and corporations, while keeping in touch with the public safety community as a
Law Enforcement Instructor.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">Email:<span style="mso-spacerun: yes;"> </span><span class="MsoHyperlink">Inquiries@ProDigital4n6.com</span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">Web: </span><a href="https://www.blogger.com/null"><span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">www.ProDigital4n6.com</span></a><span class="MsoHyperlink"><span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span class="MsoHyperlink"><span lang="NL" style="color: windowtext; font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; text-decoration: none; text-underline: none;">Linked
In: </span></span><a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL;">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</span></a><span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; text-decoration: none; text-underline: none;"> <o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span class="MsoHyperlink"><span lang="NL" style="color: windowtext; font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; text-decoration: none; text-underline: none;">Twitter:
</span></span><a href="http://www.twitter.com/prodigital4n6"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL;">@ProDigital4n6</span></a><span class="MsoHyperlink"><span lang="NL" style="color: windowtext; font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; text-decoration: none; text-underline: none;"><o:p></o:p></span></span></div>
<!--EndFragment--><br />Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comVirginia, USA37.4315734 -78.65689420000001131.0306784 -88.9840427 43.832468399999996 -68.329745700000018tag:blogger.com,1999:blog-9015068036075853317.post-68524484917961657032019-10-30T19:53:00.000-04:002019-10-31T12:39:30.413-04:00Three Reasons Why Call Detail Records Analysis Is Not “Junk Science”<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]-->
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves>false</w:TrackMoves>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>ZH-CN</w:LidThemeAsian>
<w:LidThemeComplexScript>AR-SA</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:ApplyBreakingRules/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
DefSemiHidden="false" DefQFormat="false" DefPriority="99"
LatentStyleCount="377">
<w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 9"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="header"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footer"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index heading"/>
<w:LsdException Locked="false" Priority="35" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of figures"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope return"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="line number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="page number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of authorities"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="macro"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="toa heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 5"/>
<w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Closing"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Signature"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="true"
UnhideWhenUsed="true" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Message Header"/>
<w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Salutation"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Date"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Note Heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Block Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="FollowedHyperlink"/>
<w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Document Map"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Plain Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="E-mail Signature"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Top of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Bottom of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal (Web)"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Acronym"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Cite"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Code"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Definition"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Keyboard"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Preformatted"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Sample"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Typewriter"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Variable"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Table"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation subject"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="No List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Contemporary"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Elegant"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Professional"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Balloon Text"/>
<w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Theme"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" QFormat="true"
Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" QFormat="true"
Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" QFormat="true"
Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" QFormat="true"
Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" QFormat="true"
Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" QFormat="true"
Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" SemiHidden="true"
UnhideWhenUsed="true" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
<w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
<w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
<w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
<w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
<w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
<w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
<w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hashtag"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Unresolved Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Link"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Link Error"/>
</w:LatentStyles>
</xml><![endif]-->
<style>
<!--
/* Font Definitions */
@font-face
{font-family:Wingdings;
panose-1:5 0 0 0 0 0 0 0 0 0;
mso-font-charset:2;
mso-generic-font-family:decorative;
mso-font-pitch:variable;
mso-font-signature:0 268435456 0 0 -2147483648 0;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;
mso-font-charset:0;
mso-generic-font-family:roman;
mso-font-pitch:variable;
mso-font-signature:3 0 0 0 1 0;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;
mso-font-charset:0;
mso-generic-font-family:swiss;
mso-font-pitch:variable;
mso-font-signature:-536859905 -1073732485 9 0 511 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-parent:"";
margin-top:0in;
margin-right:0in;
margin-bottom:8.0pt;
margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoHeader, li.MsoHeader, div.MsoHeader
{mso-style-priority:99;
mso-style-link:"Header Char";
margin:0in;
margin-bottom:.0001pt;
mso-pagination:widow-orphan;
tab-stops:center 3.25in right 6.5in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
mso-themecolor:hyperlink;
text-decoration:underline;
text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-noshow:yes;
mso-style-priority:99;
color:#954F72;
mso-themecolor:followedhyperlink;
text-decoration:underline;
text-underline:single;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
margin-top:0in;
margin-right:0in;
margin-bottom:8.0pt;
margin-left:.5in;
mso-add-space:auto;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoListParagraphCxSpFirst, li.MsoListParagraphCxSpFirst, div.MsoListParagraphCxSpFirst
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:0in;
margin-left:.5in;
margin-bottom:.0001pt;
mso-add-space:auto;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoListParagraphCxSpMiddle, li.MsoListParagraphCxSpMiddle, div.MsoListParagraphCxSpMiddle
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:0in;
margin-left:.5in;
margin-bottom:.0001pt;
mso-add-space:auto;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoListParagraphCxSpLast, li.MsoListParagraphCxSpLast, div.MsoListParagraphCxSpLast
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:8.0pt;
margin-left:.5in;
mso-add-space:auto;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
span.HeaderChar
{mso-style-name:"Header Char";
mso-style-priority:99;
mso-style-unhide:no;
mso-style-locked:yes;
mso-style-link:Header;}
.MsoChpDefault
{mso-style-type:export-only;
mso-default-props:yes;
font-size:11.0pt;
mso-ansi-font-size:11.0pt;
mso-bidi-font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
.MsoPapDefault
{mso-style-type:export-only;
margin-bottom:8.0pt;
line-height:107%;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:246966837;
mso-list-type:hybrid;
mso-list-template-ids:-1931417462 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l0:level3
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l0:level4
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level5
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l0:level6
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l0:level7
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level8
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l0:level9
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
ol
{margin-bottom:0in;}
ul
{margin-bottom:0in;}
-->
</style>
<!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:8.0pt;
mso-para-margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<!--StartFragment-->
<br />
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">October 31, 2019<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<u><span style="color: #c00000; font-size: 18.0pt; line-height: 107%;">Three Reasons Why Call Detail Records Analysis Is Not “Junk Science</span></u><span style="color: #c00000; font-size: 18.0pt; line-height: 107%;">”<u><o:p></o:p></u></span></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://www.blogger.com/blogger.g?blogID=9015068036075853317" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://www.blogger.com/blogger.g?blogID=9015068036075853317" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a></div>
<span style="font-size: 12.0pt; line-height: 107%;">Since introducing our private sector
clients to the impact that cellular call detail records (CDR) analysis &
mapping can have on their cases, we’ve had a lot of robust discussions with
litigators and clients about the veracity and value of this evidence.<span style="mso-spacerun: yes;"> </span>CDR analysis has been used for decades in law
enforcement to help prove or disprove the approximate location of criminal
defendants in major crimes.<span style="mso-spacerun: yes;"> </span>Only in the
past several years have civil litigators and insurance companies also been
introduced to the value that this evidence can have on their cases and/or
claims investigations.<span style="mso-spacerun: yes;"> </span>In the time we’ve
been conducting CDR analysis, we’ve worked varying types of cases from criminal
prosecution for smaller prosecutor’s offices to <a href="https://prodigital4n6.com/case-study-call-detail-records-analysis-in-civil-domestic-litigation/">domestic
litigation</a> to help prove/disprove cohabitation to <a href="https://prodigital4n6.com/using-cellular-records-analysis-in-insurance-claims/">high-dollar
insurance claims</a> to help determine if the claim and associated statements
made under oath are verifiable with regard to location.<span style="mso-spacerun: yes;"> </span>This specialty offshoot of digital forensics
requires constant knowledge updating with regard to carrier practices and
specialized training and tools to be able to perform these analyses
effectively.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6xwTgaESyT0O5bg_RsYeqj_pbBjHgNLnzda8r35jmd7PI11fU6_2fr9oXKTulP6z5RYLAoNJCHgvHnpWsq2vi_z095tp_pJwh-HEW_hsBP1w7uhwsb8ntQHBnozvpSB9fW05h19NMfvMs/s1600/Fingerprint.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1280" data-original-width="654" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6xwTgaESyT0O5bg_RsYeqj_pbBjHgNLnzda8r35jmd7PI11fU6_2fr9oXKTulP6z5RYLAoNJCHgvHnpWsq2vi_z095tp_pJwh-HEW_hsBP1w7uhwsb8ntQHBnozvpSB9fW05h19NMfvMs/s320/Fingerprint.png" width="163" /></a></div>
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">However mainly among the Criminal Defense
Bar, the notion has been put forth that CDR analysis may be “<a href="http://www.abajournal.com/magazine/article/prosecutors_use_of_mobile_phone_tracking_is_junk_science_critics_say">junk
science</a>” and therefore potentially unreliable as evidence in legal
proceedings.<span style="mso-spacerun: yes;"> </span>One such high-profile case
in which CDR analysis was used to obtain a conviction was the case of <a href="https://serialpodcast.org/season-one">State v. Adnan Syed, chronicled in
the <i>Serial Podcast</i></a>.<span style="mso-spacerun: yes;"> </span>However,
as we’ve seen <a href="https://lawprofessors.typepad.com/evidenceprof/2017/06/two-days-ago-the-court-of-special-appeals-of-maryland-issued-an-interesting-opinion-in-phillips-v-state-in-phillips-bashu.html">more
recent developments in that case unfold</a>, the “junk science” claim doesn’t
necessarily lie with the practice, rather with the potential practitioner.<span style="mso-spacerun: yes;"> </span>Indeed, even in computer forensics, certain vendors
of forensic tools like to claim their tool has been “validated in court”, when
in reality it is the examiner and their competence that needs to be validated
in court.<span style="mso-spacerun: yes;"> </span>The tool (or in this case, the
cellular records) is/are just a dataset that needs to be analyzed competently
to be introduced as evidence in a legal proceeding.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Toward the end of establishing that
CDR analysis is not “junk science”, here are three salient points that will
help debunk the myth that these records and their associated analysis is not
worthy of evidentiary status.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Reason # 1:<span style="mso-spacerun: yes;">
</span>Cellular Records Are “Pure” Evidence</span></u></b><b style="mso-bidi-font-weight: normal;"><span style="font-size: 14.0pt; line-height: 107%;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">What do we mean by “pure”
evidence?<span style="mso-spacerun: yes;"> </span>Consider for a moment other types
of digital evidence that are analyzed for use in court, such as the cell phone
itself or a computer system.<span style="mso-spacerun: yes;"> </span>These items
are generally affected by the user to a great degree and therefore can be open
to some scrutiny about the weight and value they hold.<span style="mso-spacerun: yes;"> </span>Cellular Records are <b><u>only</u></b> available
via court order or search warrant to the cellular provider.<span style="mso-spacerun: yes;"> </span>A Verizon Wireless customer cannot call
customer support and ask for their cellular call detail records with historical
cell site data.<span style="mso-spacerun: yes;"> </span>The provider will not provide
this data this absent legal process.<span style="mso-spacerun: yes;">
</span>This means the user has very limited (if any) ability to manipulate the
data, which makes the evidence about as pure as it gets.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Furthermore, the record-keeper has no
vested interest in altering the evidence.<span style="mso-spacerun: yes;">
</span>In fact, they have every reason to maintain better, more accurate records!<span style="mso-spacerun: yes;"> </span>It is a fact within the cellular industry
that CDRs were never meant to be used as evidence in legal proceedings.<span style="mso-spacerun: yes;"> </span>CDRs are kept by cellular providers so they
can log and analyze their own networks for efficiency and to increase overall
customer experience on the network.<span style="mso-spacerun: yes;">
</span>Simply put, the records are kept for customer service purposes and
cellular companies don’t make money by having poor customer service.<span style="mso-spacerun: yes;"> </span>It is a fortunate byproduct that these records
may be obtained via legal process and analyzed for potential use in legal
proceedings.<span style="mso-spacerun: yes;"> </span>This is why cellular
providers don’t maintain these records indefinitely, as detailed in our 2017
article <i><a href="https://prodigital4n6.com/cellular-provider-record-retention-periods/">Cellular
Provider Record Retention Periods</a></i>.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Name another type of digital evidence
that the user never touches and to which they generally don’t have access!<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Reason # 2:<span style="mso-spacerun: yes;">
</span>Automated Tools Have Greatly Decreased The Human Error Factor<span style="mso-spacerun: yes;"> </span></span></u></b><b style="mso-bidi-font-weight: normal;"><span style="font-size: 14.0pt; line-height: 107%;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Back in 2001 when the incident
detailed in <a href="https://serialpodcast.org/season-one">season 1 of the <i>Serial
Podcast</i></a>, there were few, if any, automated tools with which to conduct
CDR analysis.<span style="mso-spacerun: yes;"> </span>In modern casework, we
have many options for automated tools analysis, including <a href="http://www.hawkanalytics.com/features-of-cellhawk/">CellHawk</a>, <a href="https://zetx.com/">ZetX</a>, CASTviz, Map Link, Pen Link, as well as some
others.<span style="mso-spacerun: yes;"> </span>Use of automated tools can save
time and greatly reduce error, but they come with a few warnings:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Not all tools
are created equally.<span style="mso-spacerun: yes;"> </span>If you’re using a
tool that is free [to law enforcement], you’re generally getting what you pay
for.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Don’t rely on
the tool to do all of the work.<span style="mso-spacerun: yes;"> </span>Automated
tools are great, but they cannot tell you if someone likely shut their phone
off or sent a call to voicemail or left their phone in one location while
committing an offense somewhere else.<span style="mso-spacerun: yes;">
</span>Only manual analysis of the data and the behavior of the user can help
verify these conclusions.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto;">
<br /></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">VALIDATE!<span style="mso-spacerun: yes;"> </span>If an automated tool is telling you
something, make sure to <i>always</i> refer back to the original record for
validation.<span style="mso-spacerun: yes;"> </span>If an automated tool is
citing a GPS coordinate for location, make sure you <i>validate</i> there is
actually a cell site at that location.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Reason # 3:<span style="mso-spacerun: yes;">
</span>Trained, Experienced Analysts Don’t Deal in “Junk Science</span></u></b><b style="mso-bidi-font-weight: normal;"><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">”<u><o:p></o:p></u></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">One of the traps digital forensic
examiners of all ilk are susceptible to fall is the drawing of conclusions not
based on fact.<span style="mso-spacerun: yes;"> </span>While it’s true that a
trained, experienced professional may reach conclusions based upon device
activity, those same conclusions have to be rooted in some facts at some
point.<span style="mso-spacerun: yes;"> </span>The trap that sometimes rears its
ugly head is when we reach conclusions that are either outside of our expertise
or are not supported by the data.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">There are several traps documented in
litigation over the course of the life of CDR analysis in legal proceedings
that have led to the claim of “junk science”.<span style="mso-spacerun: yes;">
</span>Probably the biggest of these (and the one cited in the article linked
above and again <a href="http://www.abajournal.com/magazine/article/prosecutors_use_of_mobile_phone_tracking_is_junk_science_critics_say">here</a>)
are conclusions about cell site range.<span style="mso-spacerun: yes;">
</span>As analysts, we are not cellular engineers and we cannot be engaged in
speculation or discussion about the “range” of a particular cell site.<span style="mso-spacerun: yes;"> </span>This is why in most cases we approximate
location of the target device in the investigation and DO NOT get entwined in
discussions about cell site range.<span style="mso-spacerun: yes;"> </span>Even
if we were fortunate enough to have propagation maps from the cellular provider
which detail the effective/optimal range of a cell site, we still won’t draw
conclusions about range.<span style="mso-spacerun: yes;"> </span>It is not within
the expertise of most analysts to discuss range.<span style="mso-spacerun: yes;"> </span>That is for a cellular engineer to conclude,
not an analyst of cellular records.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUtI-HHAE29z6aNpNOXaACTs_Kgn1XqtNlnTCGI2GokpXUqegbGU5-gaQBL0C-CPebNgf0pw8-UXuEpV8Uu8OpxF9GvNVmgT517KAkceO_wLiF3gJGFt-G5xv58u3uhOjHNlCyd5uwQaUC/s1600/Cellular+Engineer.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="481" data-original-width="717" height="267" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUtI-HHAE29z6aNpNOXaACTs_Kgn1XqtNlnTCGI2GokpXUqegbGU5-gaQBL0C-CPebNgf0pw8-UXuEpV8Uu8OpxF9GvNVmgT517KAkceO_wLiF3gJGFt-G5xv58u3uhOjHNlCyd5uwQaUC/s400/Cellular+Engineer.jpg" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">There are behaviors and activity that
the records can tell us, however.<span style="mso-spacerun: yes;"> </span>A
trained analyst can usually tell of the phone was off or if a call was sent
straight to voice mail or if the phone was left in one location for a prolonged
period.<span style="mso-spacerun: yes;"> </span>At the heart of the records is
usage behavior.<span style="mso-spacerun: yes;"> </span>Is there a pattern of
behavior that is not adhered to during the time of the alleged incident?<span style="mso-spacerun: yes;"> </span>Is there link analysis that can be done to
confirm likely associates and/or accomplices?<span style="mso-spacerun: yes;">
</span>If there are alleged accomplices, does normally text and/or call
activity cease with that person during the time frame of the incident?<span style="mso-spacerun: yes;"> </span>All of these items and more can help lead a
trained, experienced analyst come to conclusions within a reasonable degree of
certainty, but with most of these items, we require a larger dataset to compare
the behavior at the time of incident with the behavior at other times.<span style="mso-spacerun: yes;"> </span>An analyst <b><u>cannot</u></b> identify
these behaviors with 24 or 48 hours worth of records.<span style="mso-spacerun: yes;"> </span>This is not enough data from which to draw
conclusions about behavior.<span style="mso-spacerun: yes;"> </span>This is also
why we highly advise obtaining at least 30 days of records on either end of the
incident, preferably more.<span style="mso-spacerun: yes;"> </span>More data is
better when it comes to CDR analysis.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<span style="font-size: 12.0pt; line-height: 107%; mso-no-proof: yes;"><!--[if gte vml 1]><v:shape id="Picture_x0020_7" o:spid="_x0000_i1026"
type="#_x0000_t75" style='width:371pt;height:123pt;visibility:visible;
mso-wrap-style:square'>
<v:imagedata src="file:////Users/ProDigital/Library/Group%20Containers/UBF8T346G9.Office/TemporaryItems/msohtmlclip/clip_image003.jpg"
o:title=""/>
</v:shape><![endif]--><!--[if !vml]--><!--[endif]--></span><span style="font-size: 12.0pt; line-height: 107%;"><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiow5kV_AU_nYj_bHacaakARw2g9dN19hbg-F6k2ZgQ3k90ysT1kMoojGfR-tEJXb7zeXaIuDpgwVttshRr0C8s8OoLzXkGsNUxsRGjWE7e67EWe_g-eMazdFhokjHmAx5h2hWw-NlS8TZ7/s1600/Cell+Phone+Link+Analysis.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="480" data-original-width="1442" height="132" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiow5kV_AU_nYj_bHacaakARw2g9dN19hbg-F6k2ZgQ3k90ysT1kMoojGfR-tEJXb7zeXaIuDpgwVttshRr0C8s8OoLzXkGsNUxsRGjWE7e67EWe_g-eMazdFhokjHmAx5h2hWw-NlS8TZ7/s400/Cell+Phone+Link+Analysis.jpg" width="400" /></a></div>
<br />
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">The ultimate test of whether or not the
conclusions based upon trained, experienced analysis of the records is “junk
science” lies with the competencies of the analyst.<span style="mso-spacerun: yes;"> </span>One who draws conclusions not based in fact
is what leads to an otherwise valid form of data analysis to be dubbed “junk
science”.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Wrapping It Up<o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">In any forensic discipline, there is
a possibility for human error or oversight.<span style="mso-spacerun: yes;">
</span>We’re not infallible, after all, and we can’t be expected to be perfect
all the time.<span style="mso-spacerun: yes;"> </span>But CDR analysis is the
only one in which the term “junk science” has been bandied about quite a
bit.<span style="mso-spacerun: yes;"> </span>Deeper inspection of the issues
involved in each case where this claim has been made can be lessons for current
and future analysts to read and take heed.<span style="mso-spacerun: yes;">
</span>It’s when our conclusions span beyond the breadth of our expertise and what
the data tells us that we get into trouble.<span style="mso-spacerun: yes;">
</span>Ultimately, everyone wants to see justice done.<span style="mso-spacerun: yes;"> </span>If we can use CDR analysis successfully in
litigation without reaching past our ability into conclusions that are open to
extreme scrutiny, justice will be served.<span style="mso-spacerun: yes;">
</span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Author: <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Patrick J. Siewert<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Principal Consultant<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Professional Digital Forensic
Consulting, LLC <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Virginia DCJS #11-14869<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Based in Richmond, Virginia<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Available Wherever You Need Us!<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<i style="mso-bidi-font-style: normal;"><u><span style="color: #c00000; font-size: 22.0pt; line-height: 107%;">We Find the Truth for a
Living</span></u></i><i style="mso-bidi-font-style: normal;"><span style="color: #c00000; font-size: 22.0pt; line-height: 107%;">!<o:p></o:p></span></i></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<i style="mso-bidi-font-style: normal;"><span style="color: #c00000; font-size: 22.0pt; line-height: 107%;"><br /></span></i></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span class="MsoHyperlink"><span style="color: windowtext; font-size: 12.0pt; line-height: 107%; text-decoration: none; text-underline: none;">Computer Forensics -- Mobile
Forensics -- Specialized Investigation<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="MsoHyperlink"><span style="color: windowtext; font-size: 12.0pt; line-height: 107%; text-decoration: none; text-underline: none;">About
the Author:<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="MsoHyperlink"><span style="color: windowtext; font-size: 12.0pt; line-height: 107%; text-decoration: none; text-underline: none;">Patrick
Siewert is the Principal Consultant of Pro Digital Forensic Consulting, based
in Richmond, Virginia.<span style="mso-spacerun: yes;"> </span>In 15 years of
law enforcement, he investigated hundreds of high-tech crimes, incorporating
digital forensics into the investigations, and was responsible for
investigating some of the highest jury and plea bargain child exploitation
investigations in Virginia court history. <span style="mso-spacerun: yes;"> </span>Patrick is a graduate of SCERS, BCERT, the
Reid School of Interview & Interrogation and multiple online investigation
schools (among others).<span style="mso-spacerun: yes;"> </span>He is a
Cellebrite Certified Operator and Physical Analyst as well as certified in
cellular call detail analysis and mapping. <span style="mso-spacerun: yes;"> </span>He continues to hone his digital forensic expertise
in the private sector while growing his consulting & investigation business
marketed toward litigators, professional investigators and corporations, while
keeping in touch with the public safety community as a Law Enforcement
Instructor.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">Email:<span style="mso-spacerun: yes;"> </span><span class="MsoHyperlink">Inquiries@ProDigital4n6.com</span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">Web: </span><a href="https://www.blogger.com/null"><span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">www.ProDigital4n6.com</span></a><span class="MsoHyperlink"><span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span class="MsoHyperlink"><span lang="NL" style="color: windowtext; font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; text-decoration: none; text-underline: none;">Linked
In: </span></span><a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL;">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</span></a><span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; text-decoration: none; text-underline: none;"> <o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span class="MsoHyperlink"><span lang="NL" style="color: windowtext; font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; text-decoration: none; text-underline: none;">Twitter:
</span></span><a href="http://www.twitter.com/prodigital4n6"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL;">@ProDigital4n6</span></a><span class="MsoHyperlink"><span lang="NL" style="color: windowtext; font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; text-decoration: none; text-underline: none;"><o:p></o:p></span></span></div>
<!--EndFragment--><br />Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comVirginia, USA37.4315734 -78.65689420000001131.0306784 -88.9840427 43.832468399999996 -68.329745700000018tag:blogger.com,1999:blog-9015068036075853317.post-35268041531729241012019-06-01T11:30:00.000-04:002019-06-01T11:30:29.029-04:00Four Tips for Effective Forensic Report Writing
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]-->
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves>false</w:TrackMoves>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>ZH-CN</w:LidThemeAsian>
<w:LidThemeComplexScript>AR-SA</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:ApplyBreakingRules/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
DefSemiHidden="false" DefQFormat="false" DefPriority="99"
LatentStyleCount="375">
<w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 9"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="header"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footer"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index heading"/>
<w:LsdException Locked="false" Priority="35" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of figures"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope return"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="line number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="page number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of authorities"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="macro"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="toa heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 5"/>
<w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Closing"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Signature"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="true"
UnhideWhenUsed="true" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Message Header"/>
<w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Salutation"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Date"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Note Heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Block Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="FollowedHyperlink"/>
<w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Document Map"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Plain Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="E-mail Signature"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Top of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Bottom of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal (Web)"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Acronym"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Cite"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Code"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Definition"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Keyboard"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Preformatted"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Sample"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Typewriter"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Variable"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Table"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation subject"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="No List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Contemporary"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Elegant"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Professional"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Balloon Text"/>
<w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Theme"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" QFormat="true"
Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" QFormat="true"
Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" QFormat="true"
Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" QFormat="true"
Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" QFormat="true"
Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" QFormat="true"
Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" SemiHidden="true"
UnhideWhenUsed="true" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
<w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
<w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
<w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
<w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
<w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
<w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
<w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hashtag"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Unresolved Mention"/>
</w:LatentStyles>
</xml><![endif]-->
<style>
<!--
/* Font Definitions */
@font-face
{font-family:Wingdings;
panose-1:5 0 0 0 0 0 0 0 0 0;
mso-font-charset:2;
mso-generic-font-family:decorative;
mso-font-pitch:variable;
mso-font-signature:0 268435456 0 0 -2147483648 0;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;
mso-font-charset:0;
mso-generic-font-family:roman;
mso-font-pitch:variable;
mso-font-signature:3 0 0 0 1 0;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;
mso-font-charset:0;
mso-generic-font-family:swiss;
mso-font-pitch:variable;
mso-font-signature:-536859905 -1073732485 9 0 511 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-parent:"";
margin-top:0in;
margin-right:0in;
margin-bottom:8.0pt;
margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoHeader, li.MsoHeader, div.MsoHeader
{mso-style-priority:99;
mso-style-link:"Header Char";
margin:0in;
margin-bottom:.0001pt;
mso-pagination:widow-orphan;
tab-stops:center 3.25in right 6.5in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
mso-themecolor:hyperlink;
text-decoration:underline;
text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-noshow:yes;
mso-style-priority:99;
color:#954F72;
mso-themecolor:followedhyperlink;
text-decoration:underline;
text-underline:single;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
margin-top:0in;
margin-right:0in;
margin-bottom:8.0pt;
margin-left:.5in;
mso-add-space:auto;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoListParagraphCxSpFirst, li.MsoListParagraphCxSpFirst, div.MsoListParagraphCxSpFirst
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:0in;
margin-left:.5in;
margin-bottom:.0001pt;
mso-add-space:auto;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoListParagraphCxSpMiddle, li.MsoListParagraphCxSpMiddle, div.MsoListParagraphCxSpMiddle
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:0in;
margin-left:.5in;
margin-bottom:.0001pt;
mso-add-space:auto;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoListParagraphCxSpLast, li.MsoListParagraphCxSpLast, div.MsoListParagraphCxSpLast
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:8.0pt;
margin-left:.5in;
mso-add-space:auto;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
span.HeaderChar
{mso-style-name:"Header Char";
mso-style-priority:99;
mso-style-unhide:no;
mso-style-locked:yes;
mso-style-link:Header;}
.MsoChpDefault
{mso-style-type:export-only;
mso-default-props:yes;
font-size:11.0pt;
mso-ansi-font-size:11.0pt;
mso-bidi-font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
.MsoPapDefault
{mso-style-type:export-only;
margin-bottom:8.0pt;
line-height:107%;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:591160623;
mso-list-type:hybrid;
mso-list-template-ids:412964 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l0:level3
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l0:level4
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level5
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l0:level6
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l0:level7
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level8
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l0:level9
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
ol
{margin-bottom:0in;}
ul
{margin-bottom:0in;}
-->
</style>
<!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:8.0pt;
mso-para-margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<!--StartFragment-->
<br />
<div class="MsoNormal">
<span style="font-size: 12pt;">June 1, 2019</span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<u><span style="color: #c00000; font-size: 18.0pt; line-height: 107%;">Four Tips for Effective Forensic Report Writing<o:p></o:p></span></u></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Digital forensics is a complicated
field.<span style="mso-spacerun: yes;"> </span>As mentioned in previous
articles, much of what we do as forensic practitioners is break down very
complicated & technical matters to basic concepts that stake-holders in our
cases can easily understand.<span style="mso-spacerun: yes;"> </span>In fact, if
you ever take any of the Mac Forensics courses taught by <a href="http://sumuri.com/">Sumuri</a>, Instructor Steve Whalen starts out by
asking “what is digital forensics?”<span style="mso-spacerun: yes;"> </span>You’d
be astonished how many people in the room who are digital forensic
practitioners cannot answer the question.<span style="mso-spacerun: yes;">
</span>Is this because they never (or rarely) have to present their findings in
court?<span style="mso-spacerun: yes;"> </span>Perhaps.<span style="mso-spacerun: yes;"> </span>But even before the case gets to court, there
has to be effective documentation of the steps undertaken to reach findings and
conclusions. <span style="mso-spacerun: yes;"> </span>Without this documentation,
it makes it very hard to justify or affirm the conclusions.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Recently, we worked a criminal
defense case where the law enforcement digital forensic examiners report was
frankly abysmal. <span style="mso-spacerun: yes;"> </span>This is not good for
law enforcement, public safety or the digital forensic community overall. <span style="mso-spacerun: yes;"> </span>We will not call out the examiner or his
agency.<span style="mso-spacerun: yes;"> </span>That’s unprofessional.<span style="mso-spacerun: yes;"> </span>But in this article, we’ll relay some steps
that can help make your forensic reports much more <i>effective</i>.<span style="mso-spacerun: yes;"> </span>Whether the case is a criminal defense matter
or a civil litigation domestic dispute, the report is your voice as an examiner
and analyst and it’s extremely difficult, if not impossible, to do a “take-back”.<span style="mso-spacerun: yes;"> </span>After all, when people’s lives and/or livelihood
are on the line, don’t we all owe it to everyone involved to be thorough and
accurate?<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiklGy7Z7EqaCJ13TtUpXH0V_r755bj48CJ6sawJRiuuPByZYNexFuG7UsCpQwf7jaGi9S7qJ5-EBYk3hv3ysL3WMN-twquXQRDQCKxiWR2emjT3-2pkd77h1HCmdjVA9gl5UEiO8JqSX_d/s1600/writing+on+computer.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="853" data-original-width="1280" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiklGy7Z7EqaCJ13TtUpXH0V_r755bj48CJ6sawJRiuuPByZYNexFuG7UsCpQwf7jaGi9S7qJ5-EBYk3hv3ysL3WMN-twquXQRDQCKxiWR2emjT3-2pkd77h1HCmdjVA9gl5UEiO8JqSX_d/s400/writing+on+computer.jpg" width="400" /></a></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<span style="font-size: 12.0pt; line-height: 107%; mso-no-proof: yes;"><!--[if gte vml 1]><v:shapetype id="_x0000_t75" coordsize="21600,21600"
o:spt="75" o:preferrelative="t" path="m@4@5l@4@11@9@11@9@5xe" filled="f"
stroked="f">
<v:stroke joinstyle="miter"/>
<v:formulas>
<v:f eqn="if lineDrawn pixelLineWidth 0"/>
<v:f eqn="sum @0 1 0"/>
<v:f eqn="sum 0 0 @1"/>
<v:f eqn="prod @2 1 2"/>
<v:f eqn="prod @3 21600 pixelWidth"/>
<v:f eqn="prod @3 21600 pixelHeight"/>
<v:f eqn="sum @0 0 1"/>
<v:f eqn="prod @6 1 2"/>
<v:f eqn="prod @7 21600 pixelWidth"/>
<v:f eqn="sum @8 21600 0"/>
<v:f eqn="prod @7 21600 pixelHeight"/>
<v:f eqn="sum @10 21600 0"/>
</v:formulas>
<v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"/>
<o:lock v:ext="edit" aspectratio="t"/>
</v:shapetype><v:shape id="Picture_x0020_1" o:spid="_x0000_i1027" type="#_x0000_t75"
style='width:468pt;height:311pt;visibility:visible;mso-wrap-style:square'>
<v:imagedata src="file:////Users/ProDigital/Library/Group%20Containers/UBF8T346G9.Office/TemporaryItems/msohtmlclip/clip_image001.jpg"
o:title=""/>
</v:shape><![endif]--><!--[if !vml]--><!--[endif]--></span><span style="font-size: 12.0pt; line-height: 107%;"><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Tip # 1:<span style="mso-spacerun: yes;">
</span>Know the Different Types of Reports</span></u></b><b style="mso-bidi-font-weight: normal;"><span style="font-size: 14.0pt; line-height: 107%;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">This seems basic, but it can often be
confused by examiners, Counsel, judges and juries.<span style="mso-spacerun: yes;"> </span>When explaining the different types of
reports, we generally break it down like this:<span style="mso-spacerun: yes;">
</span>There is the examiner’s narrative of the steps he took and a summary of
the evidence and any conclusions.<span style="mso-spacerun: yes;"> </span>This
is the “Summary Report”(or narrative report).<span style="mso-spacerun: yes;">
</span>The summary report refers to the forensic reports, which are generated by
whichever forensic tools you’ve used in the case.<span style="mso-spacerun: yes;"> </span>As most anyone who has been doing digital
forensics for a while will attest, some forensic reports can be hundreds or
thousands of pages long, depending on the type of case, the number of items
analyzed, the amount of data and other factors.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Furthermore, it’s important that the
distinction between the two reports is clear.<span style="mso-spacerun: yes;">
</span>When we receive a narrative with no heading, no dates, no details about
basic case items and no real format to it, it is automatically confusing.<span style="mso-spacerun: yes;"> </span>Even more so when this type of “report” is
not accompanied by any forensic report generated by a forensic tool.<span style="mso-spacerun: yes;"> </span>We have to be clear and concise.<span style="mso-spacerun: yes;"> </span>Confusion is the enemy in digital
forensics.<span style="mso-spacerun: yes;"> </span>While this may be a tactic
used by some to overload or misdirect the opposing party, that too is
unprofessional.<span style="mso-spacerun: yes;"> </span>If your methods and
findings are solid, why should there be a need to purposely confuse, confound
or misdirect the other side?<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Tip # 2:<span style="mso-spacerun: yes;">
</span>Be Accurate</span></u></b><b style="mso-bidi-font-weight: normal;"><span style="font-size: 14.0pt; line-height: 107%;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">In the case mentioned above, we
received a narrative that didn’t detail basic items about the system and tool(s)
used in question.<span style="mso-spacerun: yes;"> </span>These include:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 12.0pt; line-height: 107%; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Pictures of the examined
item<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 12.0pt; line-height: 107%; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Verification of
system time<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 12.0pt; line-height: 107%; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Operating system
in use on the item<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 12.0pt; line-height: 107%; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Version of
forensic tool used to conduct the analysis<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 12.0pt; line-height: 107%; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Detailed methods
used for creating the forensic image<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">The last point proved to be rather
important.<span style="mso-spacerun: yes;"> </span>The forensic image of the Mac
system was created in the .E01 format.<span style="mso-spacerun: yes;">
</span>Normally, .E01 images are segmented into parts during the imaging
process.<span style="mso-spacerun: yes;"> </span>This one was not.<span style="mso-spacerun: yes;"> </span>It was one large 265 GB .E01 file.<span style="mso-spacerun: yes;"> </span>This was odd, but in and of itself not a big
deal.<span style="mso-spacerun: yes;"> </span>However, upon hashing the .E01
image that was provided, the hashes did not match the hash values in the log
generated during the imaging process.<span style="mso-spacerun: yes;"> </span>We
still have no explanation for this, but there <i>was</i> missing data -- very
important missing data.<span style="mso-spacerun: yes;"> </span>One of the most
frustrating things as an examiner is to have questions like this and no
answers.<span style="mso-spacerun: yes;"> </span>They can be huge or they can be
inconsequential.<span style="mso-spacerun: yes;"> </span>The problem is, we just
don’t know because there is no accurate documentation.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">In the narrative/summary report, it
was stated that no activity was present on the system for the date in question (paraphrased),
therefore it must have been wiped by CCleaner (see further on that below).<span style="mso-spacerun: yes;"> </span>However, a timeline analysis of the system
indicated there was a <i>great deal of activity </i>on the system on date in
question.<span style="mso-spacerun: yes;"> </span>At trial, the law enforcement
examiner’s testimony and statement was updated to say that “no files were
created” on the system on that date, not that there was no <i><u>activity</u></i>.<span style="mso-spacerun: yes;"> </span>There’s a big difference.<span style="mso-spacerun: yes;"> </span><b>Accuracy is important!<o:p></o:p></b></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi10cyYJtv2dDebNOMRojzTqAjxKHyOIemNyehXuc493i8QrlzoMKTw4ea183ULBBunAghaL_btTv8Gu3GPfl972EZ22YdxaHWzwAmoBwobsn6AzKSnDnBM61MBoC87k5u1SKHmTKxvWP2Y/s1600/5Ws.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="929" data-original-width="1280" height="290" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi10cyYJtv2dDebNOMRojzTqAjxKHyOIemNyehXuc493i8QrlzoMKTw4ea183ULBBunAghaL_btTv8Gu3GPfl972EZ22YdxaHWzwAmoBwobsn6AzKSnDnBM61MBoC87k5u1SKHmTKxvWP2Y/s400/5Ws.jpg" width="400" /></a></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Tip # 3:<span style="mso-spacerun: yes;">
</span>Be Thorough<o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-weight: bold;">In the
cited case, there were allegedly illicit images downloaded from the defendant
by the police, but no images were found anywhere on the computer system.<span style="mso-spacerun: yes;"> </span>That in itself is intriguing from a forensic
perspective and we were excited to see what the evidence showed.<span style="mso-spacerun: yes;"> </span>One of our steps was to conduct a key word
search for unique items in the file name of the main image charged (there were
only two downloads, none of which were on the system).<span style="mso-spacerun: yes;"> </span>We found several hits in a database for “PTHC”
which is a frequent term in file names of illicit images and was in the file
name of the main charged image.<span style="mso-spacerun: yes;"> </span>We
documented this for Counsel and were prepared to testify about it (despite the
fact it did not help the defendant).<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-weight: bold;">The law
enforcement examiner also conducted a key word search for the same key word and
the forensic report (which we obtained <u>2 days</u> before trial – also unprofessional)
simply stated 5 hits in 5 files.<span style="mso-spacerun: yes;"> </span>No
additional detail about what the hits were and where they were found was
contained either in the summary/narrative report or the forensic report.<span style="mso-spacerun: yes;"> </span>Did they find the same things we found?<span style="mso-spacerun: yes;"> </span>Did they even look beyond the hits? <span style="mso-spacerun: yes;"> </span>Did they index the system prior to conducting
the key word search? To be clear, we received dozens of hits for that string of
letters after indexing and conducting our search, but as often happens, the false
positives needed to be checked and weeded-out and the relevant ones documented.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-weight: bold;">The point
about all of this is, we had no idea what we were dealing with in regards to
the “5 hits in 5 files”.<span style="mso-spacerun: yes;"> </span>Further, the
issue of validation of these hits was outstanding.<span style="mso-spacerun: yes;"> </span>We found 5 key word hits, but they were in 2
files, not 5.<span style="mso-spacerun: yes;"> </span>The work was half done… or
at least half documented.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Tip # 4:<span style="mso-spacerun: yes;">
</span>Your Conclusions Have to Make Sense</span></u></b><b style="mso-bidi-font-weight: normal;"><span style="font-size: 14.0pt; line-height: 107%;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">At issue in the cited case was the
fact that no images were found on the suspect/defendant drive and CCleaner was
also present on the system.<span style="mso-spacerun: yes;"> </span>The law enforcement
examiner’s narrative stated “No images were found and CCleaner was installed on
the system, therefore the image(s) must have been wiped by the user using
CCleaner” (paraphrased).<span style="mso-spacerun: yes;"> </span>This conclusion
was not supported by any evidence other than 1) no images found 2) CCleaner
found.<span style="mso-spacerun: yes;"> </span>That’s it.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">This conclusion is at least
potentially erroneous and is not backed by any other facts, analysis, evidence
or documentation.<span style="mso-spacerun: yes;"> </span>It is a digital
forensic leap to say that just because a disk cleaning utility exists on a
system and little or no evidence relevant to the charges were found, that a disk
cleaning utility must have been used to wipe the data.<span style="mso-spacerun: yes;"> </span>Such an important <b><i>hypothesis</i></b> like
this should be documented with logs, metadata, etc. to attempt to prove or disprove
whether or not it is true.<span style="mso-spacerun: yes;"> </span>Aside from
that, it is conjecture and quite possibly coincidence.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Wrapping It Up<o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Our goal in this article is not to
bash any one examiner or set of examiners.<span style="mso-spacerun: yes;">
</span>We all make mistakes and while the examples cited here have been seen sporadically
through the years, they are fortunately <i>not</i> the norm in digital
forensics.<span style="mso-spacerun: yes;"> </span>The goal is to help avoid complacency,
inaccuracy and sloppy report writing in the future.<span style="mso-spacerun: yes;"> </span>We’re all in this to find the truth, wherever
that may lead and to whom ever benefit or detriment.<span style="mso-spacerun: yes;"> </span>There’s an old saying that is drilled into
police recruits heads in law enforcement basic training – <b>IF YOU DIDN’T
WRITE IT DOWN, IT DIDN’T HAPPEN!</b><span style="mso-spacerun: yes;">
</span>This is a great rule to live by when it comes to everything from note-taking
to writing your final summary/narrative reports.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">What we do is important.<span style="mso-spacerun: yes;"> </span>Many times, the methods we undertake and the
conclusions at which we arrive can mean a long prison sentence for some or a
loss of a great deal of money or custody of their children for others.<span style="mso-spacerun: yes;"> </span>We owe it to the stake-holders in the case
and to the digital forensic community to adhere to a high standard when issuing
our findings.<span style="mso-spacerun: yes;"> </span>It’s the best way to
ensure that justice is served, no matter the case.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Author: <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Patrick J. Siewert<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Principal Consultant<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Professional Digital Forensic
Consulting, LLC <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Virginia DCJS #11-14869<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Based in Richmond, Virginia<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Available Wherever You Need Us!<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<i style="mso-bidi-font-style: normal;"><u><span style="color: #c00000; font-size: 22.0pt; line-height: 107%;">We Find the Truth for a
Living</span></u></i><i style="mso-bidi-font-style: normal;"><span style="color: #c00000; font-size: 22.0pt; line-height: 107%;">!<o:p></o:p></span></i></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<i style="mso-bidi-font-style: normal;"><span style="color: #c00000; font-size: 22.0pt; line-height: 107%;"><br /></span></i></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span class="MsoHyperlink"><span style="font-size: 12.0pt; line-height: 107%; mso-color-alt: windowtext; text-decoration: none; text-underline: none;">Computer Forensics --
Mobile Forensics -- Specialized Investigation<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="MsoHyperlink"><span style="font-size: 12.0pt; line-height: 107%; mso-color-alt: windowtext; text-decoration: none; text-underline: none;">About the Author:<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="MsoHyperlink"><span style="font-size: 12.0pt; line-height: 107%; mso-color-alt: windowtext; text-decoration: none; text-underline: none;">Patrick Siewert is the Principal Consultant of Pro Digital Forensic
Consulting, based in Richmond, Virginia.<span style="mso-spacerun: yes;">
</span>In 15 years of law enforcement, he investigated hundreds of high-tech
crimes, incorporating digital forensics into the investigations, and was
responsible for investigating some of the highest jury and plea bargain child exploitation
investigations in Virginia court history. <span style="mso-spacerun: yes;"> </span>Patrick is a graduate of SCERS, BCERT, the
Reid School of Interview & Interrogation and multiple online investigation
schools (among others).<span style="mso-spacerun: yes;"> </span>He is a
Cellebrite Certified Operator and Physical Analyst as well as certified in
cellular call detail analysis and mapping. <span style="mso-spacerun: yes;"> </span>He continues to hone his digital forensic
expertise in the private sector while growing his consulting &
investigation business marketed toward litigators, professional investigators
and corporations, while keeping in touch with the public safety community as a
Law Enforcement Instructor.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">Email:<span style="mso-spacerun: yes;"> </span><span class="MsoHyperlink">Inquiries@ProDigital4n6.com</span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">Web: <span class="MsoHyperlink"><a href="https://www.blogger.com/null">www.ProDigital4n6.com</a><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; mso-color-alt: windowtext; text-decoration: none; text-underline: none;">Linked In: </span></span><span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL;"><a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</a></span></span><span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; text-decoration: none; text-underline: none;"> <o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; mso-color-alt: windowtext; text-decoration: none; text-underline: none;">Twitter: </span></span><span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL;"><a href="http://www.twitter.com/prodigital4n6">@ProDigital4n6</a></span></span><span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; mso-color-alt: windowtext; text-decoration: none; text-underline: none;"><o:p></o:p></span></span></div>
<!--EndFragment--><br />Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comRichmond, VA, USA37.5407246 -77.436048137.339233099999994 -77.758771599999989 37.7422161 -77.1133246tag:blogger.com,1999:blog-9015068036075853317.post-21928085411849463102019-04-10T14:08:00.000-04:002019-04-11T09:55:11.393-04:00Mobile Virtual Network Operators (MVNOs) in the U.S.<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]-->
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves>false</w:TrackMoves>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>ZH-CN</w:LidThemeAsian>
<w:LidThemeComplexScript>AR-SA</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:ApplyBreakingRules/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
DefSemiHidden="false" DefQFormat="false" DefPriority="99"
LatentStyleCount="375">
<w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 9"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="header"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footer"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index heading"/>
<w:LsdException Locked="false" Priority="35" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of figures"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope return"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="line number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="page number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of authorities"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="macro"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="toa heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 5"/>
<w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Closing"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Signature"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="true"
UnhideWhenUsed="true" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Message Header"/>
<w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Salutation"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Date"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Note Heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Block Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="FollowedHyperlink"/>
<w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Document Map"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Plain Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="E-mail Signature"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Top of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Bottom of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal (Web)"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Acronym"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Cite"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Code"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Definition"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Keyboard"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Preformatted"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Sample"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Typewriter"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Variable"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Table"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation subject"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="No List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Contemporary"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Elegant"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Professional"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Balloon Text"/>
<w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Theme"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" QFormat="true"
Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" QFormat="true"
Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" QFormat="true"
Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" QFormat="true"
Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" QFormat="true"
Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" QFormat="true"
Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" SemiHidden="true"
UnhideWhenUsed="true" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
<w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
<w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
<w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
<w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
<w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
<w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
<w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hashtag"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Unresolved Mention"/>
</w:LatentStyles>
</xml><![endif]-->
<style>
<!--
/* Font Definitions */
@font-face
{font-family:Wingdings;
panose-1:5 0 0 0 0 0 0 0 0 0;
mso-font-charset:2;
mso-generic-font-family:decorative;
mso-font-pitch:variable;
mso-font-signature:0 268435456 0 0 -2147483648 0;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;
mso-font-charset:0;
mso-generic-font-family:roman;
mso-font-pitch:variable;
mso-font-signature:3 0 0 0 1 0;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;
mso-font-charset:0;
mso-generic-font-family:swiss;
mso-font-pitch:variable;
mso-font-signature:-536859905 -1073697537 9 0 511 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-parent:"";
margin-top:0in;
margin-right:0in;
margin-bottom:8.0pt;
margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoHeader, li.MsoHeader, div.MsoHeader
{mso-style-priority:99;
mso-style-link:"Header Char";
margin:0in;
margin-bottom:.0001pt;
mso-pagination:widow-orphan;
tab-stops:center 3.25in right 6.5in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
mso-themecolor:hyperlink;
text-decoration:underline;
text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-noshow:yes;
mso-style-priority:99;
color:#954F72;
mso-themecolor:followedhyperlink;
text-decoration:underline;
text-underline:single;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
margin-top:0in;
margin-right:0in;
margin-bottom:8.0pt;
margin-left:.5in;
mso-add-space:auto;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoListParagraphCxSpFirst, li.MsoListParagraphCxSpFirst, div.MsoListParagraphCxSpFirst
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:0in;
margin-left:.5in;
margin-bottom:.0001pt;
mso-add-space:auto;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoListParagraphCxSpMiddle, li.MsoListParagraphCxSpMiddle, div.MsoListParagraphCxSpMiddle
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:0in;
margin-left:.5in;
margin-bottom:.0001pt;
mso-add-space:auto;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoListParagraphCxSpLast, li.MsoListParagraphCxSpLast, div.MsoListParagraphCxSpLast
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:8.0pt;
margin-left:.5in;
mso-add-space:auto;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
span.HeaderChar
{mso-style-name:"Header Char";
mso-style-priority:99;
mso-style-unhide:no;
mso-style-locked:yes;
mso-style-link:Header;}
.MsoChpDefault
{mso-style-type:export-only;
mso-default-props:yes;
font-size:11.0pt;
mso-ansi-font-size:11.0pt;
mso-bidi-font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
.MsoPapDefault
{mso-style-type:export-only;
margin-bottom:8.0pt;
line-height:107%;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:320547177;
mso-list-type:hybrid;
mso-list-template-ids:-1151585168 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l0:level3
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l0:level4
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level5
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l0:level6
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l0:level7
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level8
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l0:level9
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l1
{mso-list-id:344986334;
mso-list-type:hybrid;
mso-list-template-ids:-555606010 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l1:level1
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l1:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l1:level3
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l1:level4
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l1:level5
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l1:level6
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l1:level7
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l1:level8
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l1:level9
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l2
{mso-list-id:539786147;
mso-list-type:hybrid;
mso-list-template-ids:62535456 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l2:level1
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l2:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l2:level3
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l2:level4
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l2:level5
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l2:level6
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l2:level7
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l2:level8
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l2:level9
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l3
{mso-list-id:745146513;
mso-list-type:hybrid;
mso-list-template-ids:-1682798800 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l3:level1
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l3:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l3:level3
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l3:level4
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l3:level5
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l3:level6
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l3:level7
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l3:level8
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l3:level9
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l4
{mso-list-id:1876117543;
mso-list-type:hybrid;
mso-list-template-ids:-1979821264 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l4:level1
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l4:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l4:level3
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l4:level4
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l4:level5
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l4:level6
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l4:level7
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l4:level8
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l4:level9
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
ol
{margin-bottom:0in;}
ul
{margin-bottom:0in;}
-->
</style>
<!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:8.0pt;
mso-para-margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<!--StartFragment-->
<br />
<div class="MsoNormal">
<o:p> </o:p><span style="font-size: 12pt;">April 10, 2019</span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<u><span style="color: #c00000; font-size: 18.0pt; line-height: 107%;">Mobile Virtual Network Operators (MVNOs) in the U.S.<o:p></o:p></span></u></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Increasingly, cellular records and
their associated location information is being used in civil litigation, as
where previously it was considered to be a “law enforcement only” tool.<span style="mso-spacerun: yes;"> </span>But in the age when users carry at least one
smart phone with them at all times, the location data with regard to calls/texts/data
usage can be crucial evidence in certain cases.<span style="mso-spacerun: yes;">
</span>These include insurance fraud investigations, domestic/custody/cohabitation
matters and personal injury cases.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<span style="font-size: 12.0pt; line-height: 107%; mso-no-proof: yes;"><!--[if gte vml 1]><v:shapetype id="_x0000_t75" coordsize="21600,21600"
o:spt="75" o:preferrelative="t" path="m@4@5l@4@11@9@11@9@5xe" filled="f"
stroked="f">
<v:stroke joinstyle="miter"/>
<v:formulas>
<v:f eqn="if lineDrawn pixelLineWidth 0"/>
<v:f eqn="sum @0 1 0"/>
<v:f eqn="sum 0 0 @1"/>
<v:f eqn="prod @2 1 2"/>
<v:f eqn="prod @3 21600 pixelWidth"/>
<v:f eqn="prod @3 21600 pixelHeight"/>
<v:f eqn="sum @0 0 1"/>
<v:f eqn="prod @6 1 2"/>
<v:f eqn="prod @7 21600 pixelWidth"/>
<v:f eqn="sum @8 21600 0"/>
<v:f eqn="prod @7 21600 pixelHeight"/>
<v:f eqn="sum @10 21600 0"/>
</v:formulas>
<v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"/>
<o:lock v:ext="edit" aspectratio="t"/>
</v:shapetype><v:shape id="Picture_x0020_5" o:spid="_x0000_i1027" type="#_x0000_t75"
style='width:329pt;height:337pt;visibility:visible;mso-wrap-style:square'>
<v:imagedata src="file:////Users/ProDigital/Library/Group%20Containers/UBF8T346G9.Office/TemporaryItems/msohtmlclip/clip_image001.png"
o:title=""/>
</v:shape><![endif]--><!--[if !vml]--><!--[endif]--></span><span style="font-size: 12.0pt; line-height: 107%;"><o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTd8ZoZtWWulYbHy-QNRy0LUnecjxlF9Q9ry6BtA3m806IM2ISrIZVLpSb4t2bQ3oW9qSR4ySaDyvORm_UAaMW4D-tErrb8La_PL_DL25-l_Yz61e_KjC2gxyS2jIl3AMsAQ0pc3Ijw9E5/s1600/Screen+Shot+2019-04-10+at+1.46.00+PM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1068" data-original-width="1044" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTd8ZoZtWWulYbHy-QNRy0LUnecjxlF9Q9ry6BtA3m806IM2ISrIZVLpSb4t2bQ3oW9qSR4ySaDyvORm_UAaMW4D-tErrb8La_PL_DL25-l_Yz61e_KjC2gxyS2jIl3AMsAQ0pc3Ijw9E5/s400/Screen+Shot+2019-04-10+at+1.46.00+PM.png" width="390" /></a></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;"><o:p><br /></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">As we’ve detailed in previous
articles, there are five main US-based cellular carriers:<span style="mso-spacerun: yes;"> </span>Verizon Wireless, AT&T, Sprint, T-Mobile
& U.S. Cellular.<span style="mso-spacerun: yes;"> </span>But what about
those not on the list of five?<span style="mso-spacerun: yes;"> </span>What
about Boost or Straight Talk or Virgin Mobile or Cricket or Tracfone or… the
list goes on and on.<span style="mso-spacerun: yes;"> </span>Well, these carriers
are all what are known as <b>mobile virtual network operators</b> or
MVNOs.<span style="mso-spacerun: yes;"> </span><a href="https://prodigital4n6.com/cellular-record-retention-periods/">Check out our
article detailing the record retention periods for each provider</a>.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Essentially how MVNOs operate is by “leasing”
the use of one of the five main cellular carriers, or sometimes more than one,
to increase subscribership and allow of use of multiple devices on their plans,
many of which are pre-paid or pay-as-you-go. Some MVNOs operate on strictly
CDMA or GSM networks and some operate on both.<span style="mso-spacerun: yes;">
</span>Some MVNOs may be nationwide and some may be regional, as was the circumstance
we dealt with recently regarding an MVNO that was based in the Tennessee Valley.<span style="mso-spacerun: yes;"> </span>The fact is, MVNOs far outnumber their
host-networks in sheer numbers.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">The first step is to determine which
carrier the target of your investigation subscribes to, or which carrier owns
the service for that number.<span style="mso-spacerun: yes;"> </span>For this,
the simplest resource is the <a href="https://support.hawkanalytics.com/">Hawk
Analytics Support site</a>, which is free with a registration. The support site
also has articles, sample wording for process, best practice documentation and
more.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="background-color: white; color: #191e23; font-family: "Noto Serif"; font-size: 16px; white-space: pre-wrap;">When you identify the carrier you need to submit legal process to is an MVNO, one of several things may happen upon submission, depending on what type of information you’re seeking and with which MVNO the account you’re interested in is associated. For example, Boost or Virgin Mobile will refer you to Sprint’s legal compliance center for all types of requests, but Tracfone will not provide records for cell site listing and GPS location information. Those requests will be referred to the parent network. It really just depends on the MVNO you’re dealing with. Remember, even if the account is a pre-paid “drop/burner phone” and the subscriber didn’t have to give a name or ID when initiating the account, there can still be great investigative data contained in the records.</span><br />
<span style="background-color: white; color: #191e23; font-family: "Noto Serif"; font-size: 16px; white-space: pre-wrap;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">And remember, <b><i>only Verizon
Wireless stores standard text message (SMS) content</i></b> for a minimum of 3
and a maximum of 10 days.<span style="mso-spacerun: yes;"> </span>After that,
the information is purged.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">As a quick reference, we’ve decided
to compile a list of major MVNOs that you may run across in your investigations.<span style="mso-spacerun: yes;"> </span>All of the addresses for service of legal
process to the respective MVNOs may be found on the ISP listing under the “Resources”
tab on <a href="http://www.search.org/">search.org</a>. <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Verizon Wireless-Only MVNOs</span></u></b><b style="mso-bidi-font-weight: normal;"><span style="font-size: 14.0pt; line-height: 107%;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l3 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Xfinity Mobile (Comcast)<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l3 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Affinity
Cellular<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l3 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Spectrum Mobile<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l3 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Total Wireless<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l3 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">GreatCall<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">AT&T-Only MVNOs</span></u></b><b style="mso-bidi-font-weight: normal;"><span style="font-size: 14.0pt; line-height: 107%;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l0 level1 lfo2; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Black Wireless<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l0 level1 lfo2; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Cricket Wireless<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l0 level1 lfo2; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">EasyGO Wireless<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l0 level1 lfo2; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">FreeUP Mobile<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l0 level1 lfo2; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Jolt Mobile<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l0 level1 lfo2; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Pure Talk USA<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l0 level1 lfo2; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">RuraLTE<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l0 level1 lfo2; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">ZillaTalk<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGO4Wxtcq6gDLD7rPzfTzgfP0Z3eaW4gT6sh2XiuUYsRmHVXLFQwSyHXpMfpODFZt2YbeCHQpbJg0Ubaw1JvrCi5Wql76aNv6cvzizKwg5PsvghifEWCCgjxAGFiCfDAXIOZeViDc-vwqY/s1600/Screen+Shot+2019-04-10+at+11.41.50+AM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="926" data-original-width="1600" height="370" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGO4Wxtcq6gDLD7rPzfTzgfP0Z3eaW4gT6sh2XiuUYsRmHVXLFQwSyHXpMfpODFZt2YbeCHQpbJg0Ubaw1JvrCi5Wql76aNv6cvzizKwg5PsvghifEWCCgjxAGFiCfDAXIOZeViDc-vwqY/s640/Screen+Shot+2019-04-10+at+11.41.50+AM.png" width="640" /></a></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Sprint-Only MVNOs</span></u></b><b style="mso-bidi-font-weight: normal;"><span style="font-size: 14.0pt; line-height: 107%;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l2 level1 lfo3; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Boost Mobile<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l2 level1 lfo3; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Chit Chat Mobile<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l2 level1 lfo3; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Kroger
i-wireless<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l2 level1 lfo3; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Patriot Mobile<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l2 level1 lfo3; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Ready Mobile<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l2 level1 lfo3; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Tello US<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l2 level1 lfo3; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Scratch Wireless<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l2 level1 lfo3; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Virgin Mobile
USA<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">T-Mobile-Only MVNOs</span></u></b><b style="mso-bidi-font-weight: normal;"><span style="font-size: 14.0pt; line-height: 107%;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l1 level1 lfo4; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">China Telecom
Americas (CTExcel)<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l1 level1 lfo4; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">GoSmart Mobile<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l1 level1 lfo4; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">KidsConnect<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l1 level1 lfo4; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Liberty Wireless<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l1 level1 lfo4; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Mint Mobile<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l1 level1 lfo4; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Roam Mobility<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l1 level1 lfo4; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">SeaWolf Wireless<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l1 level1 lfo4; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Simple Mobile<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l1 level1 lfo4; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Ultra Mobile<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l1 level1 lfo4; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Value Wireless<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l1 level1 lfo4; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span dir="LTR"></span><span style="font-size: 12.0pt; line-height: 107%;">Walmart Family
Mobile<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">As previously stated, some MVNOs use multiple
networks for their service.<span style="mso-spacerun: yes;"> </span>Which
network is utilized can depend on where the device is purchased (i.e, Walmart, Target,
etc.) and/or what type of device is selected for use.<span style="mso-spacerun: yes;"> </span>This naturally Allows for the MVNO to cast a
wider net and attract more customers, but it can make things confusing for
investigators who are trying to figure out where to submit legal process.<span style="mso-spacerun: yes;"> </span>Here are some of the more common cross-carrier
MVNOs:<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l4 level1 lfo5; text-indent: -.25in;">
<span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;"><span style="mso-list: Ignore;"><span style="font: 7.0pt "Times New Roman";"> </span></span></span><span style="font-size: 12pt; text-indent: -0.25in;"> </span><br />
<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]-->
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>ZH-CN</w:LidThemeAsian>
<w:LidThemeComplexScript>AR-SA</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:ApplyBreakingRules/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
DefSemiHidden="false" DefQFormat="false" DefPriority="99"
LatentStyleCount="375">
<w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 9"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="header"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footer"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index heading"/>
<w:LsdException Locked="false" Priority="35" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of figures"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope return"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="line number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="page number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of authorities"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="macro"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="toa heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 5"/>
<w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Closing"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Signature"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="true"
UnhideWhenUsed="true" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Message Header"/>
<w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Salutation"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Date"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Note Heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Block Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="FollowedHyperlink"/>
<w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Document Map"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Plain Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="E-mail Signature"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Top of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Bottom of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal (Web)"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Acronym"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Cite"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Code"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Definition"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Keyboard"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Preformatted"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Sample"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Typewriter"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Variable"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Table"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation subject"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="No List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Contemporary"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Elegant"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Professional"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Balloon Text"/>
<w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Theme"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" QFormat="true"
Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" QFormat="true"
Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" QFormat="true"
Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" QFormat="true"
Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" QFormat="true"
Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" QFormat="true"
Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" SemiHidden="true"
UnhideWhenUsed="true" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
<w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
<w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
<w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
<w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
<w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
<w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
<w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hashtag"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Unresolved Mention"/>
</w:LatentStyles>
</xml><![endif]-->
<style>
<!--
/* Font Definitions */
@font-face
{font-family:Wingdings;
panose-1:5 0 0 0 0 0 0 0 0 0;
mso-font-charset:2;
mso-generic-font-family:decorative;
mso-font-pitch:variable;
mso-font-signature:0 268435456 0 0 -2147483648 0;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;
mso-font-charset:0;
mso-generic-font-family:roman;
mso-font-pitch:variable;
mso-font-signature:3 0 0 0 1 0;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;
mso-font-charset:0;
mso-generic-font-family:swiss;
mso-font-pitch:variable;
mso-font-signature:-536859905 -1073697537 9 0 511 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-parent:"";
margin-top:0in;
margin-right:0in;
margin-bottom:8.0pt;
margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
margin-top:0in;
margin-right:0in;
margin-bottom:8.0pt;
margin-left:.5in;
mso-add-space:auto;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoListParagraphCxSpFirst, li.MsoListParagraphCxSpFirst, div.MsoListParagraphCxSpFirst
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:0in;
margin-left:.5in;
margin-bottom:.0001pt;
mso-add-space:auto;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoListParagraphCxSpMiddle, li.MsoListParagraphCxSpMiddle, div.MsoListParagraphCxSpMiddle
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:0in;
margin-left:.5in;
margin-bottom:.0001pt;
mso-add-space:auto;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoListParagraphCxSpLast, li.MsoListParagraphCxSpLast, div.MsoListParagraphCxSpLast
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:8.0pt;
margin-left:.5in;
mso-add-space:auto;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
.MsoChpDefault
{mso-style-type:export-only;
mso-default-props:yes;
font-size:11.0pt;
mso-ansi-font-size:11.0pt;
mso-bidi-font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
.MsoPapDefault
{mso-style-type:export-only;
margin-bottom:8.0pt;
line-height:107%;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:1876117543;
mso-list-type:hybrid;
mso-list-template-ids:-1979821264 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l0:level3
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l0:level4
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level5
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l0:level6
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l0:level7
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level8
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l0:level9
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
ol
{margin-bottom:0in;}
ul
{margin-bottom:0in;}
-->
</style>
<!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:8.0pt;
mso-para-margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<!--StartFragment-->
<br />
<div class="MsoListParagraphCxSpFirst" style="text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span dir="LTR"></span><b><span style="font-size: 12.0pt; line-height: 107%;">FreedomPop</span></b><span style="font-size: 12.0pt; line-height: 107%;">:
AT&T, Sprint<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;">
<!--[if !supportLists]--><span lang="FR" style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><span dir="LTR"></span><b><span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">Consumer
Cellular</span></b><span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">: AT&T, T-Mobile
(GSM)<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span dir="LTR"></span><b><span style="font-size: 12.0pt; line-height: 107%;">Republic
Wireless</span></b><span style="font-size: 12.0pt; line-height: 107%;">: Sprint, T-Mobile<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;">
<!--[if !supportLists]--><span lang="FR" style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><span dir="LTR"></span><b><span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">Flash Wireless</span></b><span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">: Sprint, Verizon<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;">
<!--[if !supportLists]--><span lang="FR" style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><span dir="LTR"></span><b><span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">Expo Mobile</span></b><span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">: Sprint, Verizon<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;">
<!--[if !supportLists]--><span lang="FR" style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><span dir="LTR"></span><b><span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">EcoMobile</span></b><span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">: Sprint, T-Mobile, Verizon<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;">
<!--[if !supportLists]--><span lang="FR" style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><span dir="LTR"></span><b><span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">Red Stick
Wireless</span></b><span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">: </span><span lang="NO-BOK" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NO-BOK;">Sprint,
T-Mobile, Verizon</span><span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;"><o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;">
<!--[if !supportLists]--><span lang="NO-BOK" style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><span dir="LTR"></span><b><span lang="NO-BOK" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NO-BOK;">Best
Cellular</span></b><span lang="NO-BOK" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NO-BOK;">: AT&T,
Sprint, T-Mobile, Verizon<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;">
<!--[if !supportLists]--><span lang="NO-BOK" style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><span dir="LTR"></span><b><span lang="NO-BOK" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NO-BOK;">Red Pocket
Mobile</span></b><span lang="NO-BOK" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NO-BOK;">: AT&T,
Sprint, T-Mobile, Verizon<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span dir="LTR"></span><b><span style="font-size: 12.0pt; line-height: 107%;">Straight Talk</span></b><span style="font-size: 12.0pt; line-height: 107%;">:
AT&T, Sprint, T-Mobile, Verizon<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span dir="LTR"></span><b><span style="font-size: 12.0pt; line-height: 107%;">Net10
Wireless</span></b><span style="font-size: 12.0pt; line-height: 107%;">: </span><span lang="NO-BOK" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NO-BOK;">AT&T, Sprint, T-Mobile,
Verizon, US Cellular</span><span style="font-size: 12.0pt; line-height: 107%;"><o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span dir="LTR"></span><b><span style="font-size: 12.0pt; line-height: 107%;">Boom Mobile</span></b><span style="font-size: 12.0pt; line-height: 107%;">:
</span><span lang="NO-BOK" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NO-BOK;">AT&T, Sprint, Verizon</span><span style="font-size: 12.0pt; line-height: 107%;"><o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span dir="LTR"></span><b><span style="font-size: 12.0pt; line-height: 107%;">TracFone</span></b><span style="font-size: 12.0pt; line-height: 107%;">:
</span><span lang="NO-BOK" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NO-BOK;">AT&T, Sprint, T-Mobile, Verizon, US Cellular (feature
phones only)</span><span style="font-size: 12.0pt; line-height: 107%;"><o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 12.0pt; line-height: 107%;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span dir="LTR"></span><b><span style="font-size: 12.0pt; line-height: 107%;">Google Fi</span></b><span style="font-size: 12.0pt; line-height: 107%;">:
</span><span lang="NO-BOK" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NO-BOK;">Sprint, T-Mobile, US Cellular</span><span style="font-size: 12.0pt; line-height: 107%;"><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<!--EndFragment--></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">A complete and up-to-date list of
MVNOs, their networks and some features about the available plans can be found
at this Wikipedia page:<span style="mso-spacerun: yes;"> </span><a href="https://en.wikipedia.org/wiki/List_of_United_States_mobile_virtual_network_operators">https://en.wikipedia.org/wiki/List_of_United_States_mobile_virtual_network_operators</a><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Wrapping It Up<o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">MVNOs are a fact of life when looking
to use cellular location data conducting investigations.<span style="mso-spacerun: yes;"> </span>By arming yourself with the knowledge of which
MVNO operates on which parent network and which information is available from
whom, you can save valuable time, money and heartache.<span style="mso-spacerun: yes;"> </span>Happy hunting! <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Author: <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Patrick J. Siewert<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Principal Consultant<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Professional Digital Forensic
Consulting, LLC <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Virginia DCJS #11-14869<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Based in Richmond, Virginia<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Available Wherever You Need Us!<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<i style="mso-bidi-font-style: normal;"><u><span style="color: #c00000; font-size: 22.0pt; line-height: 107%;">We Find the Truth for a
Living</span></u></i><i style="mso-bidi-font-style: normal;"><span style="color: #c00000; font-size: 22.0pt; line-height: 107%;">!<o:p></o:p></span></i></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span class="MsoHyperlink"><span style="font-size: 12.0pt; line-height: 107%; mso-color-alt: windowtext; text-decoration: none; text-underline: none;">Computer Forensics --
Mobile Forensics -- Specialized Investigation<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="MsoHyperlink"><span style="font-size: 12.0pt; line-height: 107%; mso-color-alt: windowtext; text-decoration: none; text-underline: none;">About the Author:<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="MsoHyperlink"><span style="font-size: 12.0pt; line-height: 107%; mso-color-alt: windowtext; text-decoration: none; text-underline: none;">Patrick Siewert is the Principal Consultant of Pro Digital Forensic
Consulting, based in Richmond, Virginia.<span style="mso-spacerun: yes;">
</span>In 15 years of law enforcement, he investigated hundreds of high-tech
crimes, incorporating digital forensics into the investigations, and was
responsible for investigating some of the highest jury and plea bargain child
exploitation investigations in Virginia court history. <span style="mso-spacerun: yes;"> </span>Patrick is a graduate of SCERS, BCERT, the
Reid School of Interview & Interrogation and multiple online investigation
schools (among others).<span style="mso-spacerun: yes;"> </span>He is a
Cellebrite Certified Operator and Physical Analyst as well as certified in
cellular call detail analysis and mapping. <span style="mso-spacerun: yes;"> </span>He continues to hone his digital forensic
expertise in the private sector while growing his consulting &
investigation business marketed toward litigators, professional investigators
and corporations, while keeping in touch with the public safety community as a
Law Enforcement Instructor.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">Email:<span style="mso-spacerun: yes;"> </span><span class="MsoHyperlink">Inquiries@ProDigital4n6.com</span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">Web: <span class="MsoHyperlink"><a href="https://www.blogger.com/null">www.ProDigital4n6.com</a><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; mso-color-alt: windowtext; text-decoration: none; text-underline: none;">Linked In: </span></span><span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL;"><a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</a></span></span><span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; text-decoration: none; text-underline: none;"> <o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; mso-color-alt: windowtext; text-decoration: none; text-underline: none;">Twitter: </span></span><span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL;"><a href="http://www.twitter.com/prodigital4n6">@ProDigital4n6</a></span></span><span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; mso-color-alt: windowtext; text-decoration: none; text-underline: none;"><o:p></o:p></span></span></div>
<!--EndFragment--><br />Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comRichmond, VA, USA37.5407246 -77.436048137.339233099999994 -77.758771599999989 37.7422161 -77.1133246tag:blogger.com,1999:blog-9015068036075853317.post-56157543331584956832018-12-18T15:33:00.000-05:002018-12-18T15:33:04.702-05:00Using Cellular Records Analysis in Insurance Claims
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]-->
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves>false</w:TrackMoves>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>ZH-CN</w:LidThemeAsian>
<w:LidThemeComplexScript>AR-SA</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:ApplyBreakingRules/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
DefSemiHidden="false" DefQFormat="false" DefPriority="99"
LatentStyleCount="375">
<w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 9"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="header"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footer"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index heading"/>
<w:LsdException Locked="false" Priority="35" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of figures"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope return"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="line number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="page number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of authorities"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="macro"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="toa heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 5"/>
<w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Closing"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Signature"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="true"
UnhideWhenUsed="true" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Message Header"/>
<w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Salutation"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Date"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Note Heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Block Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="FollowedHyperlink"/>
<w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Document Map"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Plain Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="E-mail Signature"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Top of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Bottom of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal (Web)"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Acronym"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Cite"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Code"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Definition"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Keyboard"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Preformatted"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Sample"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Typewriter"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Variable"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Table"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation subject"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="No List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Contemporary"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Elegant"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Professional"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Balloon Text"/>
<w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Theme"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" QFormat="true"
Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" QFormat="true"
Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" QFormat="true"
Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" QFormat="true"
Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" QFormat="true"
Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" QFormat="true"
Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" SemiHidden="true"
UnhideWhenUsed="true" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
<w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
<w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
<w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
<w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
<w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
<w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
<w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hashtag"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Unresolved Mention"/>
</w:LatentStyles>
</xml><![endif]-->
<style>
<!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;
mso-font-charset:0;
mso-generic-font-family:roman;
mso-font-pitch:variable;
mso-font-signature:3 0 0 0 1 0;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;
mso-font-charset:0;
mso-generic-font-family:swiss;
mso-font-pitch:variable;
mso-font-signature:-536859905 -1073697537 9 0 511 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-parent:"";
margin-top:0in;
margin-right:0in;
margin-bottom:8.0pt;
margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
p.MsoHeader, li.MsoHeader, div.MsoHeader
{mso-style-priority:99;
mso-style-link:"Header Char";
margin:0in;
margin-bottom:.0001pt;
mso-pagination:widow-orphan;
tab-stops:center 3.25in right 6.5in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
mso-themecolor:hyperlink;
text-decoration:underline;
text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-noshow:yes;
mso-style-priority:99;
color:#954F72;
mso-themecolor:followedhyperlink;
text-decoration:underline;
text-underline:single;}
span.HeaderChar
{mso-style-name:"Header Char";
mso-style-priority:99;
mso-style-unhide:no;
mso-style-locked:yes;
mso-style-link:Header;}
.MsoChpDefault
{mso-style-type:export-only;
mso-default-props:yes;
font-size:11.0pt;
mso-ansi-font-size:11.0pt;
mso-bidi-font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
.MsoPapDefault
{mso-style-type:export-only;
margin-bottom:8.0pt;
line-height:107%;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.WordSection1
{page:WordSection1;}
-->
</style>
<!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:8.0pt;
mso-para-margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<!--StartFragment-->
<br />
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">December 18, 2018<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<u><span style="color: #c00000; font-size: 18.0pt; line-height: 107%;">Using Cellular Records Analysis in Insurance Claims<o:p></o:p></span></u></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
Since
getting trained and certified several years ago in the proper acquisition,
interpretation, analysis and mapping of cellular call detail records, we’ve
worked numerous types of cases.<span style="mso-spacerun: yes;"> </span>We’ve also
tried out several tools for this type of analysis and have settled on one that
is widely used primarily by law enforcement.<span style="mso-spacerun: yes;">
</span>While the use of these records to help prove or disprove a criminal
defendant’s location is very well known in criminal investigation, our goal has
been to try and inform civil litigators about the value and power of these records.<span style="mso-spacerun: yes;"> </span>Civil case applications range from custody
and support disputes in domestic litigation to personal injury cases where
distracted driving may have been a factor in a motor vehicle accident.<span style="mso-spacerun: yes;"> </span>But of all of the calls we get and cases we
work involving analysis and mapping of these records, insurance loss claims
prove to be the most compelling.<span style="mso-spacerun: yes;"> </span><o:p></o:p></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<o:p><br /></o:p></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFs1D0nNjJ1yBm6HIj5wg-3tvRcyq4ID_FO1Z4MjRZcuMZPzKbLDAQmG5G2VXKorGYD_j2CjNobVQttkHNCewHYMpD8GA4uqKA9oCbq3l_91hH4Kt7fTDMvgqtyiiwu6vYstiuP_Lx-Ek5/s1600/cell-towers.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="500" data-original-width="1000" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFs1D0nNjJ1yBm6HIj5wg-3tvRcyq4ID_FO1Z4MjRZcuMZPzKbLDAQmG5G2VXKorGYD_j2CjNobVQttkHNCewHYMpD8GA4uqKA9oCbq3l_91hH4Kt7fTDMvgqtyiiwu6vYstiuP_Lx-Ek5/s640/cell-towers.jpg" width="640" /></a></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="mso-no-proof: yes;"><!--[if gte vml 1]><v:shapetype id="_x0000_t75"
coordsize="21600,21600" o:spt="75" o:preferrelative="t" path="m@4@5l@4@11@9@11@9@5xe"
filled="f" stroked="f">
<v:stroke joinstyle="miter"/>
<v:formulas>
<v:f eqn="if lineDrawn pixelLineWidth 0"/>
<v:f eqn="sum @0 1 0"/>
<v:f eqn="sum 0 0 @1"/>
<v:f eqn="prod @2 1 2"/>
<v:f eqn="prod @3 21600 pixelWidth"/>
<v:f eqn="prod @3 21600 pixelHeight"/>
<v:f eqn="sum @0 0 1"/>
<v:f eqn="prod @6 1 2"/>
<v:f eqn="prod @7 21600 pixelWidth"/>
<v:f eqn="sum @8 21600 0"/>
<v:f eqn="prod @7 21600 pixelHeight"/>
<v:f eqn="sum @10 21600 0"/>
</v:formulas>
<v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"/>
<o:lock v:ext="edit" aspectratio="t"/>
</v:shapetype><v:shape id="Picture_x0020_4" o:spid="_x0000_i1028" type="#_x0000_t75"
style='width:468pt;height:234pt;visibility:visible;mso-wrap-style:square'>
<v:imagedata src="file:////Users/ProDigital/Library/Group%20Containers/UBF8T346G9.Office/TemporaryItems/msohtmlclip/clip_image001.jpg"
o:title=""/>
</v:shape><![endif]--><!--[if !vml]--><!--[endif]--></span><o:p></o:p></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
From arson
fires at businesses or homes, to claims made for motor vehicle theft of
high-dollar items, the use of cellular records to help prove or disprove the
claimant’s statements have proven and will continue to prove extremely valuable.<span style="mso-spacerun: yes;"> </span>This article will use real world examples to
help illustrate how these records have helped out civil investigation and
litigation claims and investigations we’ve worked over the past several years.<o:p></o:p></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Thumbnail Case Studies</span></u></b><b style="mso-bidi-font-weight: normal;"><span style="font-size: 14.0pt; line-height: 107%;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<u>Case Study
#1</u>:<span style="mso-spacerun: yes;"> </span><o:p></o:p></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="mso-spacerun: yes;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
A restaurant
in the Northeast burns down shortly before Christmas time.<span style="mso-spacerun: yes;"> </span>The owner files a claim with the insurance
company to receive a payout of over $1 million on the insurance policy,
claiming the fire was an accident.<span style="mso-spacerun: yes;">
</span>Through the investigative process of the claim, the owner is deposed,
making statements under oath that they traveled from the mostly rural area
where the restaurant was located to a major metropolitan area on the day of the
fire, using their phone multiple times. <span style="mso-spacerun: yes;"> </span>The insurance company highly suspects that the
claimant burned down their own restaurant. <span style="mso-spacerun: yes;"> </span>The law firm representing the insurance
company issues a subpoena to the claimant’s cellular provider for records
surrounding the date of the incident and retains Pro Digital to conduct analysis,
mapping and reporting of the cellular records.<span style="mso-spacerun: yes;">
</span>The analysis of the records as compared to the sworn testimony of the
claimant disprove their story, thus not only invalidating the claim, but
potentially subjecting the claimant to criminal charges.<o:p></o:p></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<u>Case
Study #2</u>:<o:p></o:p></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
An owner of
a $100,000 sports car in a Southern state wakes up one morning after spending
the night at a hotel in an adjacent state to find their very expensive car allegedly
stolen and files a police report and subsequent insurance claim to that effect.<span style="mso-spacerun: yes;"> </span>While the owner lives about 50 miles away from
the hotel and incident site, under deposition they claimed to have traveled
much farther to the west along the Gulf coast prior to stopping at the hotel
for the night due to fatigue, all the while using their cell phone.<span style="mso-spacerun: yes;"> </span>The law firm representing the insurance company
subpoenas the owner/claimant’s cellular records to help prove or disprove their
statements made under oath and retains Pro Digital to conduct the
analysis.<span style="mso-spacerun: yes;"> </span>As you could probably imagine,
the statements about travel to the west leading up to the alleged car theft are
refuted by the cellular records, when compared to the deposition
testimony.<span style="mso-spacerun: yes;"> </span>The claimant is now potentially
facing not only a denied claim for their expensive car, but criminal charges
for filing a false police report.<span style="mso-spacerun: yes;"> </span>Also,
where’s the car?<span style="mso-spacerun: yes;"> </span>Further criminal
investigation by law enforcement will likely ensue as well.<o:p></o:p></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
These are
just two examples of how these records are used to help prove or disprove not
only the statements made under oath, but the overall claim itself.<span style="mso-spacerun: yes;"> </span>Fraudulent claims are big business and they
affect every insurance carrier, regardless if you ever file a claim.<span style="mso-spacerun: yes;"> </span><o:p></o:p></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Obtaining Cellular Records<o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">So how does this all work?<span style="mso-spacerun: yes;"> </span>As we presented to a group of civil
litigators in Virginia earlier this year, you can set yourself up for success
by taking some steps on the front-end of claims, so as the ball gets moving
along in the investigative process, the cellular records can be used to help
your case.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">The first step is to ascertain the
phone number of the claimant issue a preservation letter as soon as possible to
the cellular provider.<span style="mso-spacerun: yes;"> </span>This can be done
pre-litigation.<span style="mso-spacerun: yes;"> </span>If you don’t know who
the cellular provider is, there are online resources who can tell you, or you
may contact Pro Digital to get this information.<span style="mso-spacerun: yes;"> </span>Why do we issue a preservation letter?<span style="mso-spacerun: yes;"> </span>As detailed in our <a href="https://prodigital4n6.com/cellular-record-retention-periods/">article
about Cellular Provider Retention Periods</a>, each of the 5 major cellular
carriers only retains these records for a finite period of time. <span style="mso-spacerun: yes;"> </span>Why is that? <span style="mso-spacerun: yes;"> </span>It’s helpful to realize that these records
were <b>never</b> meant for use in any sort of civil or criminal
proceeding.<span style="mso-spacerun: yes;"> </span>They are used by the
cellular providers to help optimize the user experience on the network over
time.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%; mso-no-proof: yes;"><!--[if gte vml 1]><v:shape
id="Picture_x0020_5" o:spid="_x0000_i1027" type="#_x0000_t75" style='width:468pt;
height:293pt;visibility:visible;mso-wrap-style:square'>
<v:imagedata src="file:////Users/ProDigital/Library/Group%20Containers/UBF8T346G9.Office/TemporaryItems/msohtmlclip/clip_image002.jpg"
o:title=""/>
</v:shape><![endif]--><!--[if !vml]--><!--[endif]--></span><span style="font-size: 12.0pt; line-height: 107%;"><o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiD26ATf8fbpuSbJ9mqfGY8z_hfD4MlpBJz6aCe7jqgMVyEFriy0JCUx3FNbghhZ3INy0C6TmH0MmU20l9P28UYiPLq10hr51qOM7cD7gXsQxAdeoE1QNukkvZJ-MzWttmX9lQptzEa3Sck/s1600/All+cell+carriers+in+one.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="811" data-original-width="1294" height="250" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiD26ATf8fbpuSbJ9mqfGY8z_hfD4MlpBJz6aCe7jqgMVyEFriy0JCUx3FNbghhZ3INy0C6TmH0MmU20l9P28UYiPLq10hr51qOM7cD7gXsQxAdeoE1QNukkvZJ-MzWttmX9lQptzEa3Sck/s400/All+cell+carriers+in+one.JPG" width="400" /></a></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;"><o:p><br /></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">All of that being said, the next step
is probably the most vital and where we see more mistakes than any other area…<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">After litigation has been put into
place, you may now petition the court for a subpoena to obtain the cellular
call detail records with location data of the claimant or target of the
investigation.<span style="mso-spacerun: yes;"> </span>If accomplices are
suspected, you may also want to subpoena their records as well.<span style="mso-spacerun: yes;"> </span>The proper wording of these requests is
absolutely crucial.<span style="mso-spacerun: yes;"> </span>Cellular carriers
will only give you exactly what you request and no more.<span style="mso-spacerun: yes;"> </span>We strongly advocate getting all available
data, whether it’s relevant to your case or not.<span style="mso-spacerun: yes;"> </span>For instance, some cases only deal with link
analysis – the graphing and tracking of how many times the target(s) of an
investigation contacted known associates of interest or accomplices.<span style="mso-spacerun: yes;"> </span>In cases like this, you may think location
data isn’t relevant, but we would advocate asking for it anyway.<span style="mso-spacerun: yes;"> </span>You never know what you might need down the
road and it’s always better in these cases to get more data than not enough
data.<span style="mso-spacerun: yes;"> </span>Along those lines, we also highly
recommend asking for at least 30 days worth of records on either end of your
incident date.<span style="mso-spacerun: yes;"> </span>This is because usage and
pattern analysis is sometimes relevant.<span style="mso-spacerun: yes;">
</span>For example, in case study #2, the claimant had a block of time of 7
hours in the middle of the day immediately after the alleged theft where they
did not use their phone.<span style="mso-spacerun: yes;"> </span>Is this
relevant?<span style="mso-spacerun: yes;"> </span>It depends on the case, but
most people will use their phone at least a few times for texts, calls or data
during the hours of noon to 7 PM.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">If you require assistance or an
example of appropriate wording for your subpoenas, please contact us and we’ll
be happy to provide it.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">The Analysis</span></u></b><b style="mso-bidi-font-weight: normal;"><span style="font-size: 14.0pt; line-height: 107%;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">After the records have been obtained,
you must get a qualified expert to review them.<span style="mso-spacerun: yes;">
</span>Yes, this statement is self-serving, but your IT guy cannot do
this.<span style="mso-spacerun: yes;"> </span>Moreover, your IT guy can’t
testify to the findings in an adequate manner.<span style="mso-spacerun: yes;">
</span>While the records may look straight-forward on their face, the devil is
truly in the details.<span style="mso-spacerun: yes;"> </span>Time zones may
varying within the same record and each carrier has their own way to present
the information, full of quirks and nuances.<span style="mso-spacerun: yes;">
</span>Some records are in one large combined record.<span style="mso-spacerun: yes;"> </span>Others are a series of spreadsheets, each
with the call detail referring to a third cell site listing.<span style="mso-spacerun: yes;"> </span>The analysis can be quite complex and as the
old adage goes, if you think it’s expensive to hire an expert, try hiring an
amateur!<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">A final note about the record return
itself:<span style="mso-spacerun: yes;"> </span>You will be provided the return
in electronic format.<span style="mso-spacerun: yes;"> </span>Keep the original
and provide that to your records analyst/expert.<span style="mso-spacerun: yes;"> </span>DO NOT alter, pare down or edit the record in
any way.<span style="mso-spacerun: yes;"> </span>If you do, make a working copy,
label it as such and keep the original that was provided by the carrier.<span style="mso-spacerun: yes;"> </span>Ultimately, the original record is evidence
and evidence must be maintained in its purest form.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%; mso-no-proof: yes;"><!--[if gte vml 1]><v:shape
id="Picture_x0020_6" o:spid="_x0000_i1026" type="#_x0000_t75" style='width:468pt;
height:365pt;visibility:visible;mso-wrap-style:square'>
<v:imagedata src="file:////Users/ProDigital/Library/Group%20Containers/UBF8T346G9.Office/TemporaryItems/msohtmlclip/clip_image003.png"
o:title=""/>
</v:shape><![endif]--><!--[if !vml]--><!--[endif]--></span><span style="font-size: 12.0pt; line-height: 107%;"><o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgz23j0iakCrRwQeWdO-Y1czyYgWvY5Lg3mbnZInprRceMVuQznx4nkjlbDmzbUYPkC-mLDMgkS4Gm4KJsx9brrXf1MO9QtaHttDahyphenhyphenQKT1RgFakbehjBVuDebm0WU7dp3tAKxBSA4jIbXw/s1600/CDR+Mapping+Example.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1138" data-original-width="1458" height="498" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgz23j0iakCrRwQeWdO-Y1czyYgWvY5Lg3mbnZInprRceMVuQznx4nkjlbDmzbUYPkC-mLDMgkS4Gm4KJsx9brrXf1MO9QtaHttDahyphenhyphenQKT1RgFakbehjBVuDebm0WU7dp3tAKxBSA4jIbXw/s640/CDR+Mapping+Example.png" width="640" /></a></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;"><o:p><br /></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Effective presentation of the final
product is also very important.<span style="mso-spacerun: yes;"> </span>If the
report or demonstrative exhibits are hard to understand, the effectiveness of
the analysis and ultimate findings and conclusions is lost to some degree (or
perhaps entirely).<span style="mso-spacerun: yes;"> </span>We produce a slide
deck with brief, concise explanations of what will be shown in the deck and a
step-by-step breakdown of each call and its associated location data.<span style="mso-spacerun: yes;"> </span>We also provide animations in the slide deck
to illustrate where the device was leading up to, during and after the time of
the incident.<span style="mso-spacerun: yes;"> </span>As appropriate, we will provide
concise conclusions, utilizing the record and the available testimony of the
claimant.<span style="mso-spacerun: yes;"> </span>This proves extremely
effective in presenting the findings of the analysis to judges, juries and/or
opposing counsel.<span style="mso-spacerun: yes;"> </span>We’re proud to say
that one Virginia Prosecutor recently referred to our final product in his case
(yes, we also work for the prosecution) as “<b>the Gold Standard</b>” after
having retained Pro Digital for a serious felony case, and subsequently using
both state and federal resources for other cases.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<b style="mso-bidi-font-weight: normal;"><u><span style="color: #c00000; font-size: 14.0pt; line-height: 107%;">Wrapping It Up<o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">The effective use of cellular records
analysis and mapping in civil insurance claims and investigations is simply
building a better mousetrap.<span style="mso-spacerun: yes;"> </span>Sometimes
in these cases, hundreds or thousands of man-hours go into investigation and
proving or disproving the claimant’s statements and ultimately, the claim itself.<span style="mso-spacerun: yes;"> </span>By taking the proper steps to preserve,
request, analyze and present these records and the conclusions they help lead
us to, we save time and money.<span style="mso-spacerun: yes;"> </span>The best
part about these records is the account-holder and claimant doesn’t have access
to them.<span style="mso-spacerun: yes;"> </span>They are pure evidence,
directly from the cellular provider and only available through subpoena.<span style="mso-spacerun: yes;"> </span>How often do you get evidence to that level
of purity in your cases?<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Author: <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Patrick J. Siewert<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Principal Consultant<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Professional Digital Forensic
Consulting, LLC <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Virginia DCJS #11-14869<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Based in Richmond, Virginia<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-size: 12.0pt; line-height: 107%;">Available Wherever You Need Us!<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<i style="mso-bidi-font-style: normal;"><u><span style="color: #c00000; font-size: 22.0pt; line-height: 107%;">We Find the Truth for a
Living</span></u></i><i style="mso-bidi-font-style: normal;"><span style="color: #c00000; font-size: 22.0pt; line-height: 107%;">!<o:p></o:p></span></i></div>
<div align="center" class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<br /></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span class="MsoHyperlink"><span style="font-size: 12.0pt; line-height: 107%; mso-color-alt: windowtext; text-decoration: none; text-underline: none;">Computer Forensics --
Mobile Forensics -- Specialized Investigation<o:p></o:p></span></span></div>
<br />
<div class="MsoNormal">
<span class="MsoHyperlink"><span style="font-size: 12.0pt; line-height: 107%; mso-color-alt: windowtext; text-decoration: none; text-underline: none;">About the Author:<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: left;">
<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]-->
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>ZH-CN</w:LidThemeAsian>
<w:LidThemeComplexScript>AR-SA</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:ApplyBreakingRules/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
DefSemiHidden="false" DefQFormat="false" DefPriority="99"
LatentStyleCount="375">
<w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 9"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="header"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footer"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index heading"/>
<w:LsdException Locked="false" Priority="35" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of figures"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope return"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="line number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="page number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of authorities"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="macro"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="toa heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 5"/>
<w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Closing"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Signature"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="true"
UnhideWhenUsed="true" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Message Header"/>
<w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Salutation"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Date"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Note Heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Block Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="FollowedHyperlink"/>
<w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Document Map"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Plain Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="E-mail Signature"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Top of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Bottom of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal (Web)"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Acronym"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Cite"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Code"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Definition"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Keyboard"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Preformatted"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Sample"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Typewriter"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Variable"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Table"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation subject"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="No List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Contemporary"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Elegant"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Professional"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Balloon Text"/>
<w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Theme"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" QFormat="true"
Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" QFormat="true"
Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" QFormat="true"
Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" QFormat="true"
Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" QFormat="true"
Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" QFormat="true"
Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" SemiHidden="true"
UnhideWhenUsed="true" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
<w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
<w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
<w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
<w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
<w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
<w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
<w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hashtag"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Unresolved Mention"/>
</w:LatentStyles>
</xml><![endif]-->
<style>
<!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;
mso-font-charset:0;
mso-generic-font-family:roman;
mso-font-pitch:variable;
mso-font-signature:3 0 0 0 1 0;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;
mso-font-charset:0;
mso-generic-font-family:swiss;
mso-font-pitch:variable;
mso-font-signature:-536859905 -1073697537 9 0 511 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-parent:"";
margin-top:0in;
margin-right:0in;
margin-bottom:8.0pt;
margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
mso-themecolor:hyperlink;
text-decoration:underline;
text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-noshow:yes;
mso-style-priority:99;
color:#954F72;
mso-themecolor:followedhyperlink;
text-decoration:underline;
text-underline:single;}
.MsoChpDefault
{mso-style-type:export-only;
mso-default-props:yes;
font-size:11.0pt;
mso-ansi-font-size:11.0pt;
mso-bidi-font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
.MsoPapDefault
{mso-style-type:export-only;
margin-bottom:8.0pt;
line-height:107%;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.WordSection1
{page:WordSection1;}
-->
</style>
<!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:8.0pt;
mso-para-margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<!--StartFragment-->
<span class="MsoHyperlink"><span style="font-size: 12pt; line-height: 107%; text-decoration-line: none;">Patrick Siewert is the Principal
Consultant of Pro Digital Forensic Consulting, based in Richmond,
Virginia. In 15 years of law
enforcement, he investigated hundreds of high-tech crimes, incorporating
digital forensics into the investigations, and was responsible for
investigating some of the highest jury and plea bargain child exploitation
investigations in Virginia court history. Patrick is a graduate of SCERS, BCERT, the
Reid School of Interview & Interrogation and multiple online investigation
schools (among others). He is a
Cellebrite Certified Operator and Physical Analyst as well as certified in
cellular call detail analysis and mapping. He continues to hone his digital forensic
expertise in the private sector while growing his consulting &
investigation business marketed toward litigators, professional investigators
and corporations, while keeping in touch with the public safety community as a
Law Enforcement Instructor.</span></span><!--EndFragment-->
</div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: left;">
<span class="MsoHyperlink"><span style="font-size: 12pt; line-height: 107%; text-decoration-line: none;"><br /></span></span></div>
<br />
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;">Web: </span><span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL;"><a href="https://www.blogger.com/null"><span lang="FR" style="mso-ansi-language: FR;">www.ProDigital4n6.com</span></a></span></span><span class="MsoHyperlink"><span lang="FR" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: FR;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; mso-color-alt: windowtext; text-decoration: none; text-underline: none;">Linked In: </span></span><span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL;"><a href="https://www.linkedin.com/company/professional-digital-forensic-consulting-llc">https://www.linkedin.com/company/professional-digital-forensic-consulting-llc</a></span></span><span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; text-decoration: none; text-underline: none;"> <o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; mso-color-alt: windowtext; text-decoration: none; text-underline: none;">Twitter: </span></span><span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL;"><a href="http://www.twitter.com/prodigital4n6">@ProDigital4n6</a></span></span><span class="MsoHyperlink"><span lang="NL" style="font-size: 12.0pt; line-height: 107%; mso-ansi-language: NL; mso-color-alt: windowtext; text-decoration: none; text-underline: none;"><o:p></o:p></span></span></div>
<!--EndFragment--><br /><br />
<style>
<!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;
mso-font-charset:0;
mso-generic-font-family:roman;
mso-font-pitch:variable;
mso-font-signature:3 0 0 0 1 0;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;
mso-font-charset:0;
mso-generic-font-family:swiss;
mso-font-pitch:variable;
mso-font-signature:-536859905 -1073697537 9 0 511 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-parent:"";
margin-top:0in;
margin-right:0in;
margin-bottom:8.0pt;
margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
mso-themecolor:hyperlink;
text-decoration:underline;
text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-noshow:yes;
mso-style-priority:99;
color:#954F72;
mso-themecolor:followedhyperlink;
text-decoration:underline;
text-underline:single;}
.MsoChpDefault
{mso-style-type:export-only;
mso-default-props:yes;
font-size:11.0pt;
mso-ansi-font-size:11.0pt;
mso-bidi-font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
.MsoPapDefault
{mso-style-type:export-only;
margin-bottom:8.0pt;
line-height:107%;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.WordSection1
{page:WordSection1;}
-->
</style>Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comRichmond, VA, USA37.5407246 -77.436048137.339233099999994 -77.758771599999989 37.7422161 -77.1133246tag:blogger.com,1999:blog-9015068036075853317.post-19202663281106315142018-11-03T16:51:00.001-04:002018-11-05T09:17:08.051-05:00FAQ Video Series: Mobile ForensicsWhat is mobile forensics and how can you use it for your case? In this edition of our Frequently Asked Questions videos, we provide an overview and answers questions about deleted and recovered text messages and more.
Apple and Android are different and it's important that your mobile forensic analyst knows the proper approach to the specific device(s) in your case.<br />
<br />
<iframe allowfullscreen="" frameborder="0" height="360" mozallowfullscreen="" src="https://player.vimeo.com/video/280242697" webkitallowfullscreen="" width="640"></iframe><br />
<br />
For more information, visit prodigital4n6.com, call 804-588-9877 or email: inquiries@prodigital4n6.comPro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comRichmond, VA, USA37.5407246 -77.436048137.339233099999994 -77.758771599999989 37.7422161 -77.1133246tag:blogger.com,1999:blog-9015068036075853317.post-23952516129895522822018-11-03T16:13:00.001-04:002018-11-05T09:17:31.555-05:00FAQ Video Series: Cellular Call Detail Records - Analysis and MappingIn this video, Pro Digital Principal Consultant Patrick Siewert talks about cellular provider call detail records analysis and mapping. He describes what it is, how the records are obtained, which types of cases can utilize the records, examples of what may be shown in court, and what's required to obtain the information. This type of data can commonly be used in Insurance Fraud investigations, divorce cases/custody disputes and validation of an opposing analysts findings in criminal or civil litigation.<br />
<br />
Pro Digital also offers these services to prosecutors offices working major crimes who may not have access to analysts with the expertise to interpret and map these records.<br />
<br />
<br />
<iframe allowfullscreen="" frameborder="0" height="360" mozallowfullscreen="" src="https://player.vimeo.com/video/294195351" webkitallowfullscreen="" width="640"></iframe><br />
<br />
Cellular Provider Record Retention Periods: prodigital4n6.com/cellular-record-retention-periods/
For more information, visit prodigital4n6.com, call us at 804-588-9877 or email: inquiries@prodigital4n6.comPro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comRichmond, VA, USA37.5407246 -77.436048137.339233099999994 -77.758771599999989 37.7422161 -77.1133246tag:blogger.com,1999:blog-9015068036075853317.post-70419087122924100942018-10-08T22:27:00.001-04:002018-11-05T09:17:42.796-05:00FAQ Video Series: PC/Windows Computer Forensics<span style="font-family: inherit;"><br /></span>
<br />
<div class="MsoNormal">
<span lang="DA" style="font-family: inherit; mso-ansi-language: DA;">October 8, 2018<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="DA" style="font-family: inherit; mso-ansi-language: DA;"><br /></span></div>
<div class="MsoNormal">
<span lang="DA" style="font-family: inherit; mso-ansi-language: DA;">FAQ Video:
PC/Windows Computer Forensics<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="DA" style="font-family: inherit; mso-ansi-language: DA;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;">In this video, we cover some over our FAQ about
Windows-based computer forensics, including Metadata.<span style="mso-spacerun: yes;"> </span>Simply put, metadata is data about data, such
as authorship/ownership, dates & times of file creation/modification/access
and a plethora of other valuable information. </span><br />
<span style="font-family: inherit;"><iframe allowfullscreen="" frameborder="0" height="360" mozallowfullscreen="" src="https://player.vimeo.com/video/286586014" webkitallowfullscreen="" width="550"></iframe></span><br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<span style="font-family: inherit; text-align: center;">A majority of our computer forensic cases are for
Windows-based PCs and certain processes are different for PCs than for Mac
(Apple) computer.</span><span style="font-family: inherit; text-align: center;"> </span><span style="font-family: inherit; text-align: center;">When researching a
forensic examiner, be sure to ask the questions to determine which analyst
possesses the right knowledge, experience, training and tools for your specific
needs.</span><span style="font-family: inherit; text-align: center;"> </span><span style="font-family: inherit; text-align: center;">There nuances that affect every
case which relate to the specific hardware and software involved.</span></div>
<div class="MsoNormal">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;">Do you have a case that might be helped by a digital forensic
analysis?<span style="mso-spacerun: yes;"> </span>Visit our website, call or
email for a free consultation: <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: inherit;">Pro Digital
Forensic Consulting<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: inherit;"><span class="MsoHyperlink"><a href="mailto:inquiries@prodigital4n6.com">inquiries@prodigital4n6.com</a></span><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: inherit;">804-588-9877</span><span style="font-size: 12pt;"><o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="mso-spacerun: yes;"> </span><o:p></o:p></div>
<br />Pro Digital Forensic Consultinghttp://www.blogger.com/profile/12672335377906521152noreply@blogger.comRichmond, VA, USA37.5407246 -77.436048137.339233099999994 -77.758771599999989 37.7422161 -77.1133246