Hello Flavio,

without being a professional in the area here are my 5 reals. :)

You task is to prove that the guy is innocent and not to perform an investigation, correct. I'm also assuming that in Brazil the person is innocent until proven otherwise.

Even if it is proven that the email has originated from S's computer is the prosecution able to prove that S sent the email? This is crucial because computer and human are two different things. You said there are 12 other people in the apartment, it could be anybody (and btw. you do not need to find which of the other people did it, you just have to prove it was not S).

You mentioned S works a lot and studies a lot. If the email was received in certain time by the recipient and their mail system registered the incoming mail. Where was S at that time? (It is possible to argue that the email was delayed during the relay BUT it is the OTHER party's responsibility to prove so ( i.e. they have to go and find the logs). If they do so you can then ask the question again where was the person when they sent the email.

If they are able to get to any logs and especially to the logs from hotmail then they should be able to also trace [EMAIL PROTECTED] account. They ALSO have to prove that this account is fake (or used by S). This again means that they have to tie time of logins to this account to the time the person is working on his computer (at home because until that point it is assumed that he sent the email from there).

So see it is really important for the PROSECUTION to prove he was sitting in front of the computer. Also it is not needed any of the other people to be an IT wiz so break in to his computer and send the email. All it takes is to call in a buddy that can do that.

Also another avenue (already mentioned in the thread) is trojans/viruses, even crosssite scripting...


From a forensic point of view. It is true that you cannot trust the clock of a computer but you can trust causality. How are the timestamps of those two files relating to the timestamps of other files that were positioned (physically on the disk) around them? Windows tends to write files sequentially and unless somebody run some disc defragmenting software (and even in this case you may be lucky) most likely you can find if the timestamp was altered and approximately when the files were really created. This can really easily make S innocent (or bury them deeper). Just see if the files were created before or after the reception of the email.

The two files can be explained by the word processing software making a temporary copy (or autosave). Btw. are the files identical or are there missing things from one of them? Maybe S indeed sent the email and did some editing?

Last thing you can do to tie S to the message is language analysis. There is a lot of research done regarding English (and I hope the message is in English or the techniques are applicable to Portuguese) but you can compare files the person really wrote (and admits it) to the text that was sent. I think if possible this is the best way to do it.

Last but not least. Who was the forensic expert working for? I.e. who signs his paycheck? If it is not the police or some other government organizations (or other trusted source) you can easily argue that the chain of custody of the evidence was broken and as a result the forensic analisys (or for that matter any further forensics based on that data) are not admissible in court. In simple words. If I was the expert and you ware paying me for the right amount I can craft ANYTHING on his HDD :)

I hope this helps or at least brings ideas that can help you swing either way. And don't be partial. You never know what happened. If could have been S that sent the email with a gun pointed to his head by the CEO of the company, right? :)

Krassi

At 10:32 AM 5/31/2007, Roland Dobbins wrote:

On May 29, 2007, at 6:42 PM, Flavio Silva wrote:

It sounds like you can also challenge the credentials of the
expert, but
that might be a problem if they were appointed by the judge.  An
indictment
of this technician will essentially be an indictment of the judge.

IANAL, and I've no knowledge of or interests in the particulars of
this case.  That being said:

There's also the possibility of MITM (via routing or ARP or proxying
or what-have-you), and then there's the issue of tracing an email
back to a particular -computer system- does not equate to tracing it
back to a particular -person- (i.e., did anyone else have physical
access to the computer, was the computer trojanned/botted so that
others could remotely control the computer and send email without the
owner's knowledge, etc.).

Nonrepudiation simply isn't a property of the vast majority of
ordinary, consumer-grade Internet email systems (assuming that's what
you're dealing with, in this instance).  This should be quite easy to
demonstrate in everyday language which a nontechnical person can
understand.

------------------------------------------------------------------------
Roland Dobbins <[EMAIL PROTECTED]> // 408.527.6376 voice

You may not be interested in strategy, but strategy is interested in
you.

                      -- Leon Trotsky

Reply via email to