DOJ-OGR-00018675.jpg

525 KB

Extraction Summary

2
People
2
Organizations
1
Locations
1
Events
1
Relationships
5
Quotes

Document Information

Type: Court transcript (cross-examination)
File Size: 525 KB
Summary

This page is a transcript from the cross-examination of a forensic expert named Flatley in Case 1:20-cr-00330-PAE (USA v. Ghislaine Maxwell). The testimony focuses on technical details of how computer file dates are auto-populated by the system clock and how forensic examiners access data via cloned images and forensic software to bypass operating system password protections.

People (2)

Name Role Context
Flatley Witness / Forensic Examiner
Subject of cross-examination regarding digital forensic procedures on a computer.
Unidentified Attorney (Q) Interrogator
Female attorney (addressed as 'ma'am') conducting cross-examination.

Organizations (2)

Name Type Context
Southern District Reporters, P.C.
DOJ
Indicated by Bates stamp prefix DOJ-OGR

Timeline (1 events)

2022-08-10
Cross-examination of witness Flatley regarding forensic analysis of a computer hard drive, specifically discussing metadata dates and bypassing password protection via forensic imaging.
Courtroom
Flatley Defense Counsel

Locations (1)

Location Context
Jurisdiction of the court case (implied SDNY based on case number 1:20-cr-00330-PAE)

Relationships (1)

Flatley Adversarial/Legal Unidentified Attorney
Q&A format in court transcript

Key Quotes (5)

"Yes, it gets it from the system, from the clock in the computer."
Source
DOJ-OGR-00018675.jpg
Quote #1
"In the registry, it said that it was [password protected]."
Source
DOJ-OGR-00018675.jpg
Quote #2
"We don't actually get into the computer. We don't go through the operating system."
Source
DOJ-OGR-00018675.jpg
Quote #3
"The password and user name and all that only protects the computer when you're accessing it through its operating system."
Source
DOJ-OGR-00018675.jpg
Quote #4
"All through our forensic software."
Source
DOJ-OGR-00018675.jpg
Quote #5

Full Extracted Text

Complete text extracted from the document (1,279 characters)

Case 1:20-cr-00330-PAE Document 753 Filed 08/10/22 Page 77 of 264 1503
LC7Cmax2 Flatley - cross
1 A. That's correct.
2 Q. It just auto populates it from Word; right?
3 A. Yes, that is correct.
4 Q. And it auto populates the created date or the modified date
5 and the other dates you talked about; right?
6 A. Yes, ma'am.
7 Q. That's not a person inputting a created date, it just comes
8 from the program; right?
9 A. Yes, it gets it from the system, from the clock in the
10 computer.
11 Q. So you didn't specify whether this particular computer was
12 password protected; right?
13 A. That's correct.
14 Q. You don't have any information that this computer was
15 password protected; right?
16 A. In the registry, it said that it was.
17 Q. You were able to get into the computer no problem; right?
18 A. We don't actually get into the computer. We don't go
19 through the operating system. We just take the information
20 that's on the drive and categorize it. The password and user
21 name and all that only protects the computer when you're
22 accessing it through its operating system.
23 Q. And you were accessing it through a hard drive copied
24 cloned image?
25 A. All through our forensic software.
SOUTHERN DISTRICT REPORTERS, P.C.
(212) 805-0300
DOJ-OGR-00018675

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document