This page is a transcript from the cross-examination of a forensic expert named Flatley in Case 1:20-cr-00330-PAE (USA v. Ghislaine Maxwell). The testimony focuses on technical details of how computer file dates are auto-populated by the system clock and how forensic examiners access data via cloned images and forensic software to bypass operating system password protections.
| Name | Role | Context |
|---|---|---|
| Flatley | Witness / Forensic Examiner |
Subject of cross-examination regarding digital forensic procedures on a computer.
|
| Unidentified Attorney (Q) | Interrogator |
Female attorney (addressed as 'ma'am') conducting cross-examination.
|
| Name | Type | Context |
|---|---|---|
| Southern District Reporters, P.C. | ||
| DOJ |
Indicated by Bates stamp prefix DOJ-OGR
|
| Location | Context |
|---|---|
|
Jurisdiction of the court case (implied SDNY based on case number 1:20-cr-00330-PAE)
|
"Yes, it gets it from the system, from the clock in the computer."Source
"In the registry, it said that it was [password protected]."Source
"We don't actually get into the computer. We don't go through the operating system."Source
"The password and user name and all that only protects the computer when you're accessing it through its operating system."Source
"All through our forensic software."Source
Complete text extracted from the document (1,279 characters)
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein document