Presenting a live 90-minute webinar with interactive Q&A. Today s faculty features:

Size: px
Start display at page:

Download "Presenting a live 90-minute webinar with interactive Q&A. Today s faculty features:"

Transcription

1 Presenting a live 90-minute webinar with interactive Q&A Electronic Spying and Tracking Spouses in Divorce: Admissibility and Privacy Issues Navigating Evidentiary Issues With Spyware, GPS Trackers, Cell Phone Forensics, Wiretaps, Social Media and More TUESDAY, MAY 7, pm Eastern 12pm Central 11am Mountain 10am Pacific Today s faculty features: Henry S. Gornbein, Attorney, Henry S. Gornbein, Bloomfield Hills, Mich. Sharon D. Nelson, President, Sensei Enterprises, Fairfax, Va. John W. Simek, Vice President, Sensei Enterprises, Fairfax, Va. E.X. Martin, III, Law Offices of E.X. Martin, Dallas The audio portion of the conference may be accessed via the telephone or by using your computer's speakers. Please refer to the instructions ed to registrants for additional information. If you have any questions, please contact Customer Service at ext. 10.

2 Strafford Legal Webinars Cell Phone Forensics For Criminal Defense Attorneys & ipad For The Defense By E. X. Martin, III Attorney at Law 8828 Greenville Avenue Dallas, Texas Voice exmartin@airmail.net Introduction ipad & iphone For The Defense I am sixty six years old, married, and have one son. His name is Xerxes Martin, IV. Xerxes was an All State Pitcher in high school and later played baseball on the Baylor University Baseball team. He graduated from South Texas School of Law in May, 2011 and is now a practicing attorney in Dallas. Page - 1

3 I have learned a great deal about baseball and about people by watching my son's games and working with the players and coaches. His pitching coach, Mike Bacsik, gave me a book entitled The Mental Game of Baseball. At first, I thought this book would be dull and too sophisticated for me. I was wrong on both counts. It is more than a baseball book. Its focus and application relates to baseball but it also has suggestions that can be applied to the practice of law. I have been speaking to attorneys throughout the United States about using computer technology to increase their professional competence, to improve their productivity, and to help their clients with their legal problems. Chapter Eight of The Mental Game of Baseball contains these suggestions regarding learning that I think attorneys will find to be stimulating and inspiring especially with respect to using new technology in their law practices. Intentional Learning What to Want We want to look for better ways of doing "our thing" and have an open mind. We want to experiment with these new approaches. We never want to be satisfied with our knowledge or our skill. We want to recognize that new ways are not immediately comfortable. We want to give these new approaches a fair test of time - and effort. We want to think and talk about the solution, not the problem. We want to use our minds and control our emotions. We want to keep what works and discard what doesn't. We want to be persistent. We want to remember that mistakes are first steps to learning and should not be labeled as "failures." We want to remember that many people avoid learning new ways of doing things because, in addition to not wanting to feel uncomfortable, they "don't want to look bad." We want to remember that good learners "risk" doing things badly, in order to find out how to do things well. We want to remember that had we waited until we could have walked perfectly before we made our attempts, we never would have attempted. We want to recognize there is always a need to learn. Page - 2

4 Page - 3

5 Part I Cell Phone Forensics For Criminal Defense Attorneys I read a marketing article recently which stated that there are more than 7 billion people on the planet. 5.1 billion of them own a cell phone, but only 4.2 billion own a toothbrush. Cell phone use has increased tremendously over the last decade. Additionally, the utility and capabilities of cell phones and / or smart phones has increased beyond almost anyone s expectations. I frequently refer to my cell phone as a phone with a computer wrapped around it that has much more ability than just making phone calls. I also tell young attorneys that all they need to start their law practice is a law degree and a smart phone. Today a smart phone can assist attorneys with calendar and contact management, marketing, legal research, credit card payment processing, document access and scanning, internet access, and texting, power point or key note presentations, remote access to another computer, internet document backup, file access and transferring through cloud computing, and photographic, video, and audio recording capability. While cell phones are both useful and helpful to ordinary people, unfortunately they are also used directly or indirectly in the commission of criminal offenses. Law enforcement uses technology to combat crime, just as criminals use it for their purposes. The widespread use of cell phones has resulted in the development of forensic extraction devices and their software that law enforcement can use to examine a suspect s mobile phone for incriminating evidence. Cell phones today hold immense amounts of personal information in which arrestees conceivably have significant privacy interests. Cell phones equipped with GPS navigation generate geo-locational information (GEO tags) that can be located and extracted to determine the location of the cell phone or even produce a location tracking map of specific cell phones. This information or evidence may also determine the types of activities a person engages Page - 4

6 in at a particular location. Most people do not realize that, when they move about or travel with a cell phone, they may well be creating a detailed record of their whereabouts. Law enforcement is well aware of value of geo-locational data with respect to criminal cases. Law enforcement can subpoena tracking records from cell phone companies when investigating a particular individual or criminal offense. An article in The New York Times on July 12, 2012, stated that cell phone carriers reported that they responded to a startling 1.3 million demands last year from law enforcement agencies for cell phone subscriber information seeking text messages, caller locations, and other information in the course of investigations. Furthermore, law enforcement officers are now routinely conducting forensic examinations or cell phone dumps on cell phones seized subsequent to an arrest or search. The evidence obtained from a person s cell phone can be used to corroborate evidence obtained from cell phone carriers or vice versa. Generally the examinations are conducted using the popular and powerful Cellebrite device shown below. The Cellebrite is a very advanced smart phone forensic analysis tool. It allows the user to extract call activity, contact lists, calendar information, voice mails, text messages, photographs, videos, software applications (apps), passwords, geo-locational data gained from cellphone towers, Wi-Fi hotspots, and more. The device can also download copies of an smart phone s existing, hidden, and deleted phone data, including call history, text messages, contacts, images, and geotags in a short time span. The Cellebrite device allows the user to conduct quick, easy phone searches and this device is wide acceptance with all law enforcement agencies. The Cellebrite s abilitythat makes it easy for law enforcement officers to conduct these intrusive cell phone searches is a hot button issue with the ACLU and other individual privacy watchdogs. Page - 5

7 Current Search Issues Regarding Cell Phones State Appellate Courts Are Split On Weather Search Of Cell Phone Requires A Warrant Supreme Court Of California It certainly appears to me that our state and federal courts are generally upholding searches of cell phones subsequent to an arrest with or without a warrant. On January 3, 2011, the Supreme Court of California in The People v. Gregory Diaz, 119 Cal.Rptr.3d 105, upheld a warrantless search of a cell phone that was taken from the defendant s person subsequent to his warrantless arrest for a felony drug offense. A text message retrieved from the cell phone s text message folder was consistent with the defendant having knowledge of drug transactions. The defense moved to suppress the fruits of the cell phone search the text message arguing that the warrantless search of the cell phone violated the Fourth Amendment. The trial court upheld the search and the case was ultimately appealed to the Supreme Court of California. The California Supreme Court relied on United States v. Robinson (1973), 414 U.S. 218, 94 S.Ct. 467, 38 L.Ed.2d 427, which established the exception to the Fourth Amendment s warrant requirement of a search incident to lawful arrest. This exception has traditionally been justified by the reasonableness of searching for weapons, instruments of escape, and evidence of crime when a person is taken into official custody and Page - 6

8 lawfully detained. The California Supreme Court cited United States v. Edwards (1974), 415 U.S. 800, 94 S.Ct. 1234, 39 L.Ed.2d 771, in which the high court explained: When a custodial arrest is made, there is always some danger that the person arrested may seek to use a weapon, or that evidence may be concealed or destroyed. To safeguard himself and others, and to prevent the loss of evidence, it has been held reasonable for the arresting officer to conduct a prompt, warrantless search of the arrestee s person and the area within his immediate control Such searches may be conducted without a warrant, and they may also be made whether or not there is probable cause to believe that the person arrested may have a weapon or is about to destroy evidence. The potential dangers lurking in all custodial arrests make warrantless searches of items within the immediate control area reasonable without requiring the arresting officer to calculate the probability that weapons or destructible evidence may be involved. See also: United States v. Chadwick (1977), 433 U.S. 1, 97 S.Ct. 2476, 53 L.Ed.2d 538. In conclusion, the majority of the California Supreme Court held that the police may, without obtaining a warrant, view or listen to information electronically stored on a cell phone that the defendant was carrying when lawfully arrested. Supreme Court Of Ohio The Supreme Court of Ohio in State v. Smith, 920 N.E.2d 949 decided December 15, 2009, was asked to determine whether the Fourth Amendment to the United States Constitution prohibits the warrantless search of data with a cell phone when the phone is lawfully seized incident to an arrest. The defense based his case on the Fourth Amendment to the United States Constitution, which provides protection against unreasonable searches and seizures and argued that it is well established that searches conducted without a warrant are per se unreasonable, subject to certain jealously and carefully drawn exceptions. The prosecution relied on the exception of a search incident to arrest, which allows officers to conduct a search that includes an arrestee s person and the area within the arrestee s immediate control. Chimel v. California (1969), 395 U.S. 752, , 89 S.Ct. 2034, 23 L.Ed This exception derives from interests in officer safety and evidence preservation that are typically implicated in arrest situations. Arizona v. Gant (2009), 556 U.S., 129 S.Ct. 1710, 1716, 173 L.Ed.2d 485. The prosecution also argued that the cell phone was analogous to a closed container that was found on the defendant s person and thus may be searched. See United States v. Finley (C.A.5, 2007), 477 F.3d 250. The prosecution further argued that the Ohio Supreme Court should follow Finley and affirm the conviction because the trial court was correct in its conclusion that a cell phone is akin to a closed container and thus subject to search subsequent to a lawful arrest. The Ohio Supreme Court did not agree with this comparison reasoning that objects following under the banner of closed container have traditionally been physical objects capable of holding other physical objects. Indeed, the United States Supreme Court has stated that in this situation, container means any object capable of holding another object. New York v. Belton (1981), 453 U.S. 454, 460, 101 S.Ct. 2860, 69 L.Ed.2d 768. The Ohio Supreme Court further noted the U.S. Supreme Court s definition of container in Belton, which implies that the container must actually have a physical object within it and thus held that a cell phone is not a closed container for purposes of a Fourth Amendment analysis. The Court further opined that modern understandings of the Fourth Amendment recognize that it serves to protect an individual s subjective expectation of privacy if that expectation is reasonable and justifiable. The Court held that the ability of cell phones to store large amounts of private data gives their users a reasonable and justifiable expectation of a higher level of privacy in the information they contain. Additionally, once the cell phone is in police custody, the state has satisfied its immediate interest in collecting and preserving evidence and can take preventive steps to ensure that the data found on the phone are neither lost nor erased. But because Page - 7

9 a person has a high expectation of privacy in a cell phone s contents, police must then obtain a warrant before intruding into the phone s contents. The Ohio Supreme Court concluded that the warrantless search of data within a cell phone seized incident to a lawful arrest is prohibited by the Fourth Amendment when the search is unnecessary for the safety of law-enforcement officers and there are no exigent circumstances, Furthermore, because the prosecution failed to show that either of these exceptions to the warrant requirement applied, the search of the defendant s cell phone was improper, and the trial court was required to exclude from evidence the call records and phone numbers taken from the cell phone. Additionally, various types of digital evidence (text messages, photographs, geo-locational data, etc.) extracted from cell phones is being used in the prosecution of criminal cases. For this reason it is important for criminal defense attorneys to be familiar with what can be obtained from a forensic examination of a cell phone by a Cellebrite or similar device. Law enforcement recognizes that cell phones hold enormous amounts of data and thus they have become attractive targets for their evidentiary value. Just as cell phones and smart phones have increased their processing power and utility, devices that are capable of forensically examining these devices have also become much more sophisticated. One such device is the Cellebrite UFED Touch. This device is made specifically to extract, decode, and analyze data from mobile devices. It performs physical, logical, file system and password extraction of all data (even if deleted) from smartphones, portable GPS devices, tablets and phones manufactured with Chinese chipsets. The Cellebrite allows law enforcement officials to crack suspects mobile phones in what is now called a cell phone dump and mine them for incriminating information. The Cellebrite also allows private forensic examiners to examine the data to find information that is helpful to the citizen accused. Page - 8

10 Part II Forensic Examinations Of Cell Phones Cellebrite UFED Touch Device Cellphone forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. It can also relate to any digital device that has both internal memory and communication ability, including PDA devices, GPS devices, thumb drive, and tablet computers. The use of phones in crime was widely recognized for some years, but the forensic study of mobile devices is a relatively new field, dating from the early 2000s. The widespread use of cellphones (particularly smartphones) on the consumer market caused a demand for forensic examination of the devices, which could not be met by existing computer forensics techniques. Today, smart phones can be used to save several types of personal information such as contacts, photos, calendars and notes, SMS and MMS messages. Smartphones may additionally contain video, , web browsing information, location information, and social networking messages and contacts. As mobile device technology advances, the amount and types of data that can be found on a mobile device is constantly increasing. Evidence that can be potentially recovered from a mobile phone may come from several different sources, including handset memory, SIM card, and attached memory cards such as SD cards. This data or information can have evidentiary value in a criminal case. Traditionally mobile phone forensics has been associated with recovering SMS and MMS messaging, as well as call logs, contact lists and phone IMEI/ESN information. However, newer generations of smartphones also include wider varieties of information; from web browsing, Wireless network settings, geolocation information (including geotags contained within image metadata), and other forms of rich internet media, including important data -- such as social networking service posts and contacts -- now retained on smartphone 'apps'. Page - 9

11 Data Acquisition Types Cellphone data extraction is commonly classified according to which extraction methods are more technical and forensically sound. The completeness of the cellphone data extraction can depend on the sophistication of the software used for the examination. A thoroughly sound forensic examination of a cellphone can be timely. Manual Analysis Of Cellphone Data The forensic examiner utilizes the cellphone s user interface to investigate the content of the phone's memory. Therefore the device is used as normal, with the examiner taking pictures of each screen's contents. This method has an advantage in that the operating system makes it unnecessary to use specialized tools or equipment to transform raw data into human interpretable information. In practice this method is applied to cell phones, PDAs and navigation systems. Disadvantages are that only data visible to the operating system can be recovered; that all data are only available in form of pictures; and the process itself is time-consuming. Logical Analysis Logical acquisition implies a bit-by-bit copy of logical storage objects (e.g., directories and files) that reside on a logical store (e.g., a file system partition). Logical acquisition has the advantage that system data structures are easier for a tool to extract and organize. Logical extraction acquires information from the device using the original equipment manufacturer application programming interface for synchronizing the phone's contents with a personal computer. A logical extraction is generally easier to work with as it does not produce a large binary blob. However, a skilled forensic examiner will be able to extract far more information from a physical extraction. Physical Analysis Physical acquisition implies a bit-for-bit copy of an entire physical store (e.g. flash memory); therefore, it is the method most similar to the examination of a personal computer. A physical acquisition has the advantage of allowing deleted files and data remnants to be examined. Physical extraction acquires information from the device by direct access to the flash memories. Generally this is harder to achieve because the device original equipment manufacturer needs to secure against arbitrary reading of memory; therefore, a device may be locked to a certain operator. To get around this security, mobile forensics tool vendors often develop their own boot loaders, enabling the forensic tool to access the memory (and often, also to bypass user passcodes or pattern locks). Generally the physical extraction is split into two steps, the dumping phase and the decoding phase. A physical analysis may well allow the recovery of additional evidence. I recently participated in a case where the law enforcement agency did a logical analysis of the seized smartphone. I had my forensic expert conduct a Physical Analysis and we recovered additional evidence including: 1. 15, 000 additional images additional videos audio files 4. 12,000+ locations MMS messages Page - 10

12 text files I have worked with friend and computer expert, Lance Sloves, on several cases involving electronically stored information that has been obtained from a defendant s smart phone. Recently I had Lance do a cell phone dump of my iphone 5 for this paper and I was able to make some computer screen snap shots which I believe demonstrate the Cellebrite s extraction and analyzing capabilities. I am reproducing the screen snap shots that I made because I believe they will be helpful to the defense bar in understanding what can be obtained by the Cellebrite device. The photographs below show the Cellebrite kit containing various cables and connectors than can be used to extract data and information from a variety of mobile devices including older legacy phones and smartphones such as the iphone, Android, BlackBerry, Nokia, Windows Mobile, and Palm. Page - 11

13 The next photograph shows the iphone 5 connected to the Cellebrite UFED Touch at the start of the cell phone dump of this device. The following photograph is of the desktop computer that was used in conjunction with the Cellebrite device during the examination of the iphone 5 in this particular example. The Cellebrite is connected to a desktop or laptop computer using a USB cable to transfer the extracted data. The Cellebrite Physical Analyzer software runs on the desktop computer and will expose every segment of a device s memory data and export this data into an easy to use software program that helps one organize, analyze, and understand the extracted data and information. The following screen snapshots were taken from the monitor of this computer and are reproduced here to help one understand the extraction process and also how the extracted data is organized in a manner that helps you drill down to, organize, and understand the information that is important to your client in a particular case. Page - 12

14 The following graphic image is the Cellebrite Physical Analyzer & Extraction Summary window. Well Formatted Report The previous graphic should give you a pretty good idea of the type of information that you can extract from a smart phone. The column on the left side of the graphic under the Analyzed Data tab lists Bluetooth Devices, Calendar, Call Log, Chats, s, Installed Applications, IP Connections, Locations (10,344), Maps, Passwords, Searched Items, SMS Messages, User Accounts, Wireless Networks (44). Under Data files you have images (47,8007), Videos (48), Audio (911), Text (713), Databases, Configurations, and Applications. At the bottom of the previous graphic and the cut out graphic below you can see the icon buttons that can be used to access specific data by touching the icon. Page - 13

15 I find this next graphic image particularly interesting. It is an extraction summary of calls made from the iphone and received in both spreadsheet format and graphically. The spreadsheet highlights calls to and from and missed from my friend Justice Jim Moseley. Seven calls are listed and bar graph shows one incoming call, four outgoing, and two missed calls. You can also see the list of phone numbers, related name, total for each individual both incoming, outgoing, and missed. It is easy to see how helpful this information could be in a particular case. The following graphic displays various text messages received on the iphone. I consider this image particularly important because text messages are being used is some manner in trial in almost every criminal case. This graphic should give you some idea of how a forensic exam of a cell phone could help you find the text message you need and pinpoint it as to time and place. Page - 14

16 This next graphic image pertains to location information gathered from various sources such as cell towers, media locations which can be photographs with embedded geo-locational information, and Wifi networks. When I was reviewing some of the data pertaining to the iphone 5 accessing wireless networks, I notice that one wireless connection was from the Westin Beach Resort in Fort Lauderdale, Florida. On February 17, 2012, I spoke at an NACDL seminar in Fort Lauderdale and stayed at the Westin Beach Resort and had in fact accessed the hotel s wireless network with the iphone. The extracted data confirmed my presence or at least the presence of my specific phone at the Westin Beach Resort in Fort Lauderdale. It is easy to say how such information could be used to prove a point in a trial. It is possible to export this data into a KML file that can then be opened in Google maps. It is easy to see how helpful this type of evidence could be if you are trying to show the tracking of an individual or a mobile device. Page - 15

17 Page - 16

18 Part III How A Cellular Network Operates A cellular network or mobile network is a radio network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station. In a cellular network, each cell uses a different set of frequencies from neighboring cells, to avoid interference and provide guaranteed bandwidth within each cell. When joined together these cells provide radio coverage over a wide geographic area. This enables a large number of portable transceivers (e.g., mobile phones, pagers, etc.) to communicate with each other and with fixed transceivers and telephones anywhere in the network, via base stations, even if some of the transceivers are moving through more than one cell during transmission. Cellular Site Data Evidence Offered In A Criminal Case To Track The Location Of A Cellular Phone Prosecutors are increasing using cellular site data obtained from cellular service providers to corroborate other evidence placing the defendant at or near the crime scene. The law enforcement agents and prosecutors are subpoenaing a defendant s cell phone records relating to the date and time of the alleged offense. Cell Service Provider Business Records The prosecution will probably begin by moving to admit into evidence at trial the cell phone service provider call data records under the business record exception to the hearsay rule as provided in Fed. R. Evid. 803(6). A properly introduced, authenticated business record that meets the standards of the Federal Rules of Evidence ordinarily is nontestimonial and will not violate the Confrontation Clause. Assuming the proper foundation is laid, these records are likely admissible. See United States v. Graham, 846 F. Supp. 2d 384, 389 Page - 17

19 (D.Md. 2012) which stated that historical cell site location records are created by cellular providers in the ordinary course of business. When a cell phone is in idle mode, it regularly communicates with cell towers in its network. Using radio frequency waves, the phone tries to determine which cell tower has the strongest signal. In urban areas, cell towers are often located on top of buildings or water towers. A cell tower emits radio frequency waves in all directions, providing cell phone coverage in a 360 degree radius around the tower. Three antennas typically comprise each tower; each antenna covers a 120 degree area. When a cell phone places a call, it typically connects to the tower in its network with the strongest signal. This is usually the tower nearest to the phone, although a variety of factors including physical obstructions and topography can determine which tower services a particular phone. Once the call reaches the tower, this interaction is recorded by the network provider. The call then proceeds to a mobile switching center, which may choose to reroute the call to a different tower based on network traffic. The call may also be rerouted to a different tower if the caller changes location during the duration of the call. These data are recorded by the network and maintained as call data records. To determine the location of a cell phone, law enforcements agents or their experts generally identify (1) the physical location of the cell sites used by the phone during the relevant time period; (2) the specific antenna used at each cell site; and (3) the direction of the antenna s coverage. Then they estimate the range of each antenna s coverage based on the proximity of the tower to other towers in the area. This is the area in which the cell phone could connect with the tower given the angle of the antenna and the strength of its signal. They try and determine where the coverage area of one tower will overlap with the coverage of another. These facts are then used to estimate then general location of a cell phone within a specific time period. Admissibility Of Testimony Concerning How Cellular Networks Operate Whenever a person makes a call with a cell phone, the call routed through a cell tower located at a fixed geographic location. Cell service providers keep records of which cell tower processed a call. This is the information that prosecutors attempt to use the establish the location of the cell phone and its user. It is easy to see and understand how this type of evidence can be used by the prosecution to place the defendant at the place and time of the offense charged. The accuracy and precision of this evidence varies on a case by case basis. Generally the admission of this type of evidence interpreting cell site geolocational data requires expert testimony. However, some courts have allowed law enforcement officers to provide lay opinion testimony as to Page - 18

20 how cellular networks operate or the use of call data records to determine the location of a cell phone. United States v. Feliciano, 300 F.App x 795, 801 (11 th Cir. 2008). The defense should request a hearing under Federal Rule of Evidence 702 and Daubert to determine whether the prosecution s proposed evidence and analysis are admissible. The prosecution must show that their expert is qualified to testify about how cellular networks operate and the accuracy of geolocational data offered to link the accused to the crime. Legal Standard The admission of lay witness testimony is governed by Federal Rule of Evidence 701, which limits lay opinion testimony to that which is (1) rationally based on the witness s perception; (2) helpful to clearly understanding the witness s testimony or to determining a fact in issue; and (3) not based on scientific, technical, or other specialized knowledge within the scope of Rule 702. Fed. R. Evid The admission of expert opinion testimony is governed by Federal Rule of Evidence 702 and Daubert. See Bielskis v. Louisville Ladder, Inc., 663 F.3d 887, 893 (7th Cir. 2011). Rule 702 states that a witness who is qualified as an expert by knowledge, skill experience, training or education may testify in the form of opinion or otherwise provided that (1) the expert s scientific, technical, or other specialized knowledge will help the trier of fact to understand the evidence or to determine a fact in issue; (2) the testimony is based on sufficient facts or data; (3) the testimony is the product of reliable principles and methods; and (4) the expert has reliably applied the principles and methods to the facts of the case. Fed. R.Evid To admit expert testimony under this rule, the court must determine that (1) the witness is qualified; (2) the expert s methodology is scientifically reliable; and (3) the testimony will assist the trier of fact to understand the evidence or to determine a fact in issue. Myers v. Ill. Cent. R.R. Co., 629 F.3d 639, 644 (7th Cir. 2010). In Daubert the United States Supreme Court set out four factors the court may consider when assessing the reliability of an expert s methodology, including (1) whether the theory is based on scientific or other specialized knowledge that has been or can be tested; (2) whether the theory has been subjected to peer review; (3) the known or potential rate of error and the existence of standards controlling the theory s operation; and (4) the extent to which the theory is generally accepted in the relevant community. Daubert, 509 U.S. at ; see also Kumho Tire Co. v. Carmichael, 526 U.S. 137, 151, 119 S. Ct. 1167, 143 L. Ed. 2d 238 (1999). The Rule 702 inquiry is a flexible one. Daubert, 509 U.S. at 594. As such, [d]eterminations on admissibility should not supplant the adversarial process; shaky expert testimony may be admissible, assailable by its opponents through cross-examination. Gayton v. McCoy, 593 F.3d 610, 616 (7th Cir. 2010). The proponent of the testimony bears the burden of proving that the proffered testimony meets these requirements, and the Seventh Circuit grants the district court wide latitude in performing its gate-keeping function. Bielskis, 663 F.3d at 894 (internal quotation marks and citation omitted). Page - 19

Welcome to the Quick Start Guide for TrialPad 2.0, the leading trial presentation and legal file management app for the ipad!

Welcome to the Quick Start Guide for TrialPad 2.0, the leading trial presentation and legal file management app for the ipad! trialpad.com facebook.com/trialpad twitter.com/trialpad Welcome to the Quick Start Guide for TrialPad 2.0, the leading trial presentation and legal file management app for the ipad! We re very excited

More information

Case Study: Mobile Device Forensics in Texting and Driving Cases

Case Study: Mobile Device Forensics in Texting and Driving Cases Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge

More information

ORDER GRANTING DEFENDANT'S MOTION TO SUPPRESS EVIDENCE

ORDER GRANTING DEFENDANT'S MOTION TO SUPPRESS EVIDENCE STATE OF FLORIDA, Plaintiff, v. RICARDO H. GLASCO, Defendant. Circuit Court, 18th Judicial Circuit in and for Brevard County. Case No. 05-2010-CF-021349-AXXX-XX. February 24, 2011. John M. Harris, Judge.

More information

Case Study: Smart Phone Deleted Data Recovery

Case Study: Smart Phone Deleted Data Recovery Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics

More information

PDF Expert Enterprise User guide

PDF Expert Enterprise User guide PDF Expert Enterprise User guide 2012 Readdle Inc. 2 INTRODUCTION 3 CHAPTER 1: DOCUMENT VIEWING AND MANAGING IN PDF EXPERT ENTERPRISE 4 Reading and working with PDF documents 4 Managing files and folders

More information

xtra redit A Classroom Study of a Supreme Court of Ohio Case

xtra redit A Classroom Study of a Supreme Court of Ohio Case xtra redit A Classroom Study of a Supreme Court of Ohio Case CELL PHONES: SEARCH AND SEIZURE Analyzing a Case Introduction The Supreme Court of Ohio in December 2009 ruled that the U.S. Constitution s

More information

Sharing your ipad Stuff

Sharing your ipad Stuff Sharing your ipad Stuff 2013 John Larkin. Do not use without permission. Please acknowledge use. http://www.larkin.net.au Introduction John Larkin Sharing on an ipad, Page 1 Sharing and exporting files

More information

PDF Expert for ipad User guide

PDF Expert for ipad User guide PDF Expert for ipad User guide 2011 Readdle Inc. 2 Contents Introduction Chapter 1: Copying documents to PDF Expert USB file transfer using itunes File Sharing Saving attachments from Mail and other ipad

More information

Frequently Asked Questions for the USA TODAY e-newspaper

Frequently Asked Questions for the USA TODAY e-newspaper Frequently Asked Questions for the USA TODAY e-newspaper Navigating the USA TODAY e-newspaper A look at the toolbar Toolbar Functions, Buttons, and Descriptions The tab marked Contents will take the e-reader

More information

On the Trail of the Craigslist Killer: A Case Study in Digital Forensics

On the Trail of the Craigslist Killer: A Case Study in Digital Forensics On the Trail of the Craigslist Killer: A Case Study in Digital Forensics Presenters: Sharon Nelson and John Simek President and Vice President, Sensei Enterprises www.senseient.com snelson@senseient.com;

More information

Digital Evidence Collection and Use. CS 585 Fall 2009

Digital Evidence Collection and Use. CS 585 Fall 2009 Digital Evidence Collection and Use CS 585 Fall 2009 Outline I. II. III. IV. Disclaimers Crime Scene Processing Legal considerations in Processing Digital Evidence A Question for Discussion Disclaimers

More information

PDF MAPS FOR SMARTPHONES AND TABLETS

PDF MAPS FOR SMARTPHONES AND TABLETS INTRODUCTION Incident mapping often utilizes PDF documents of maps to be created for printing, archiving, and now for the ability to use these products in the field. With the release of Adobe Acrobat 9

More information

www.scdivorcelaw.com

www.scdivorcelaw.com VALUABLE APPS FOR FAMILY LAW ATTORNEYS Melissa F. Brown 145 King St., Ste. 405 Charleston, SC 29401 melissa@melissa-brown.com www.scdivorcelaw.com 843-722-8900 843-722-8922 NOTE TAKING APPS Office2 HD:

More information

ipad for Attorneys 366 South Oyster Bay Road Hicksville, NY 11801 Phone: (516) 762-0155 Fax: (516) 977-3174 Email: solutions@glassertech.

ipad for Attorneys 366 South Oyster Bay Road Hicksville, NY 11801 Phone: (516) 762-0155 Fax: (516) 977-3174 Email: solutions@glassertech. 1. Using the IPad and Browsing the Web a. Hardware Controls i. On/Off Button To turn the ipad on, just press and hold the on/off button. To turn it off, press the on/off button until the red slide to power

More information

Cellebrite UFED Physical Pro Cell Phone Extraction Guide

Cellebrite UFED Physical Pro Cell Phone Extraction Guide Cellebrite UFED Physical Pro Cell Phone Extraction Guide By Colby Lahaie Patrick Leahy Center for Digital Investigation Champlain College May 16, 2012 Table of Contents 1 Introduction... 2 1.1 Research

More information

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used? TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to

More information

Digital Forensics for Attorneys Overview of Digital Forensics

Digital Forensics for Attorneys Overview of Digital Forensics Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence

More information

ShareLink 200 Setup Guide

ShareLink 200 Setup Guide ShareLink 00 Setup Guide This guide provides instructions for installing and connecting the Extron ShareLink 00. The ShareLink USB 00 Wireless Collaboration Gateway allows anyone to present content from

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Federal Criminal Court

Federal Criminal Court No person... shall be compelled in any criminal case to be a witness against himself nor be deprived of life, liberty or property without due process of law. Amendment V. Defendant may not be compelled

More information

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal

More information

MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT

MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT The Fourth Amendment Guarantees a Right to Privacy and Protects Against Unreasonable Searches and Seizures; If Your Fourth

More information

Pryvate App User Manual

Pryvate App User Manual Pryvate App User Manual 2.0 Powered by Criptyque Pryvate is the most secure voice, email & chat app for business people & individuals that require a high level of communications encryption to protect their

More information

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0 User Manual 350 East Plumeria Drive San Jose, CA 95134 USA August 2012 202-10933-04 v1.0 Support Thank you for choosing NETGEAR. To register your product, get the latest product updates, get support online,

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

A Federal Criminal Case Timeline

A Federal Criminal Case Timeline A Federal Criminal Case Timeline The following timeline is a very broad overview of the progress of a federal felony case. Many variables can change the speed or course of the case, including settlement

More information

PREPARING FOR TRIAL IN THE CLOUD. Law Office Management Interchange Virginia Trial Lawyers Association, Annual Convention

PREPARING FOR TRIAL IN THE CLOUD. Law Office Management Interchange Virginia Trial Lawyers Association, Annual Convention PREPARING FOR TRIAL IN THE CLOUD Event: Date: Presenter: Law Office Management Interchange Virginia Trial Lawyers Association, Annual Convention Friday, March 28, 2014, 7:15 a.m. Robert Dean Gentry Locke

More information

1. How to Set or Change your ipad Password. Contents

1. How to Set or Change your ipad Password. Contents Contents 1. How to Set or Change your ipad Password... 1 2. Setting your ipad Password Options... 2 3. Setting the Required Time for Your ipad Passcode... 2 4. How to Back-Up/Restore ipad from Back-Up...

More information

How To Solve A Violent Home Invasion With A United Force

How To Solve A Violent Home Invasion With A United Force Use Case SOLVING VIOLENT CRIMES WITH A UNIFIED WORKFLOW In a Violent Home Invasion Investigation, the UFED Series Seamlessly Unifies Workflows from Field to Lab A series of violent home invasions has everyone

More information

THE STATE OF OHIO, APPELLEE,

THE STATE OF OHIO, APPELLEE, [Cite as State v. Smith, 124 Ohio St.3d 163, 2009-Ohio-6426.] THE STATE OF OHIO, APPELLEE, v. SMITH, APPELLANT. [Cite as State v. Smith, 124 Ohio St.3d 163, 2009-Ohio-6426.] Search and seizure Search incident

More information

ADOBE ACROBAT CONNECT PRO MOBILE VISUAL QUICK START GUIDE

ADOBE ACROBAT CONNECT PRO MOBILE VISUAL QUICK START GUIDE ADOBE ACROBAT CONNECT PRO MOBILE VISUAL QUICK START GUIDE GETTING STARTED WITH ADOBE ACROBAT CONNECT PRO MOBILE FOR IPHONE AND IPOD TOUCH Overview Attend Acrobat Connect Pro meetings using your iphone

More information

RESCO MOBILE CRM USER GUIDE. Access your CRM data on any mobile platform ipad, iphone, Android, Windows Phone or Win XP/Vista/7/8

RESCO MOBILE CRM USER GUIDE. Access your CRM data on any mobile platform ipad, iphone, Android, Windows Phone or Win XP/Vista/7/8 RESCO MOBILE CRM USER GUIDE Access your CRM data on any mobile platform ipad, iphone, Android, Windows Phone or Win XP/Vista/7/8 Contents Synchronization... 1 1.1. How to synchronize your device... 1 1.2.

More information

BlackBerry Link for Windows. Version: 1.2.3. User Guide

BlackBerry Link for Windows. Version: 1.2.3. User Guide BlackBerry Link for Windows Version: 1.2.3 User Guide Published: 2014-01-20 SWD-20140120093847797 Contents Related resources...5 Getting started...6 About BlackBerry Link... 6 Getting to know BlackBerry

More information

INTRODUCTION DO YOU NEED A LAWYER?

INTRODUCTION DO YOU NEED A LAWYER? INTRODUCTION The purpose of this handbook is to provide answers to some very basic questions that inmates or inmates families might have regarding the processes of the criminal justice system. In no way

More information

Cell Phone Forensics For Legal Professionals

Cell Phone Forensics For Legal Professionals 1 Cell Phone Forensics For Legal Professionals Lars E. Daniel, EnCE, ACE, AME, CTNS, SCE, SCCM, SCA Digital Forensics Examiner Cell Phone Acquisition and Examination Collection and Acquiring Cell Phones

More information

A White Paper from AccessData Group. The Future of Mobile E-Discovery

A White Paper from AccessData Group. The Future of Mobile E-Discovery A White Paper from AccessData Group The Future of Mobile E-Discovery Contents 1. The changing landscape of e-discovery 2. New expectations in the courtroom 3. Mobile discovery within corporations 4. MPE+

More information

C RIMINAL LAW O V E RVIEW OF T H E T E XAS C RIMINAL J USTICE P ROCESS

C RIMINAL LAW O V E RVIEW OF T H E T E XAS C RIMINAL J USTICE P ROCESS T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S C RIMINAL LAW 1 0 1 : O V E RVIEW OF T H E T E XAS C RIMINAL J USTICE P ROCESS A C RIMINAL LAW 1 0 1 Prepared

More information

A White Paper from AccessData Group. The Future of Mobile E-Discovery

A White Paper from AccessData Group. The Future of Mobile E-Discovery A White Paper from AccessData Group The Future of Mobile E-Discovery Contents 1. The changing landscape of e-discovery 2. New expectations in the courtroom 3. Mobile discovery within corporations 4. MPE+

More information

Hello. Quick Start Guide

Hello. Quick Start Guide Hello. Quick Start Guide Welcome to your new Mac mini. Let us show you around. This guide shows you what s on your Mac, helps you set it up, and gets you up and running with tips for the apps you ll use

More information

INTRODUCTION TO CLOUD STORAGE

INTRODUCTION TO CLOUD STORAGE University of North Carolina at Chapel Hill Libraries Carrboro Cybrary Chapel Hill Public Library Durham County Public Library INTRODUCTION TO CLOUD STORAGE GETTING STARTED PAGE 02 Class Overview What

More information

MOBILITY FOR iphone USER GUIDE

MOBILITY FOR iphone USER GUIDE MOBILITY FOR iphone USER GUIDE VERSION 20.0.2 401 Market Street, First Floor Philadelphia, PA 19106 877.258.3722 www.alteva.com Table of Contentsl 1. About Alteva Mobility for iphone... 3 2. Installation...

More information

AGENDA ELECTRONIC ADVANCES AND THE LAW. Tangipahoa Case Study and Cell Phone Basics. The U.S. Supreme Court and Cell Phone Searches.

AGENDA ELECTRONIC ADVANCES AND THE LAW. Tangipahoa Case Study and Cell Phone Basics. The U.S. Supreme Court and Cell Phone Searches. Leland Corky Dwight, Investigator Louisiana State Police ELECTRONIC ADVANCES AND THE LAW J. J. Williams, Jr., Staff Attorney Louisiana District Attorneys Association JJ@LDAA.ORG AGENDA Tangipahoa Case

More information

Back, start, and search key... 3. Lock the keys and screen... 6. Unlock the keys and screen... 7. Set the keys and screen to lock automatically...

Back, start, and search key... 3. Lock the keys and screen... 6. Unlock the keys and screen... 7. Set the keys and screen to lock automatically... Userguide Nokia Lumia 620 Table of Contents Keys and parts... 3 Back, start, and search key... 3 How to Insert a SIM card... 4 First start-up... 6 Switching Phone ON and OFF... 6 Switch the phone on...

More information

Mobility with Eye-Fi Scanning Guide

Mobility with Eye-Fi Scanning Guide Mobility with Eye-Fi Scanning Guide Scan and Transfer Images Wirelessly with Eye-Fi This document is to be used in addition to the scanner s user guide located on the installation disc. The instructions

More information

GETTING THROUGH THE CRIMINAL JUSTICE SYSTEM

GETTING THROUGH THE CRIMINAL JUSTICE SYSTEM GETTING THROUGH THE CRIMINAL JUSTICE SYSTEM ARREST An ARREST starts the criminal justice process. It is called an arrest whether the police officer hands you a summons or puts handcuffs on you and takes

More information

BlackBerry Desktop Software User Guide

BlackBerry Desktop Software User Guide BlackBerry Desktop Software User Guide Version: 2.4 SWD-1905381-0426093716-001 Contents Basics... 3 About the BlackBerry Desktop Software... 3 Set up your smartphone with the BlackBerry Desktop Software...

More information

Ricoh HotSpot. Printing App. User s Guide. HotSpot Printing App supports:

Ricoh HotSpot. Printing App. User s Guide. HotSpot Printing App supports: Ricoh HotSpot Printing App Mobile Printing Solution HotSpot Printing App supports: HSPA_UQR_April192013_V1 - Apple ios devices - Android devices - BlackBerry smartphone - BlackBerry PlayBook Printing App

More information

What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes

What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes Table of Contents UFED Basics...3 Extraction Types...4 Logical extraction...5 Logical extractions of ios devices...5

More information

CinePlay 1.1.2. User Manual

CinePlay 1.1.2. User Manual CinePlay User Manual 1 CinePlay 1.1.2 User Manual CinePlay is a professional ios video player complete with timecode overlays, markers, masking, safe areas and much more. It is ideal for dailies, portfolios,

More information

Store & Share Quick Start

Store & Share Quick Start Store & Share Quick Start What is Store & Share? Store & Share is a service that allows you to upload all of your content (documents, music, video, executable files) into a centralized cloud storage. You

More information

About Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics

About Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics Larry E. Daniel, EnCE, DFCP, BCE Digital Forensic Examiner Digital Forensics for Attorneys An Overview of Digital Forensics About Your Presenter EnCase Certified Examiner (EnCE) Digital Forensics Certified

More information

Nevada Supreme Court Training Sessions

Nevada Supreme Court Training Sessions Nevada Supreme Court Training Sessions Overview of System Features Web-based electronic filing system Allows electronic filing of documents 24/7 Provides electronic notification of case activity via email

More information

ios Mobile Dialer Application Manual Make low cost Internet calls from your iphone, ipad and ipod touch

ios Mobile Dialer Application Manual Make low cost Internet calls from your iphone, ipad and ipod touch ios Mobile Dialer Application Manual Make low cost Internet calls from your iphone, ipad and ipod touch ios Mobile Dialer Application 1. Introduction... 2 2. Signup... 3 3. Download & Setup... 5 4. Calling

More information

Boulder Municipal Court Boulder County Justice Center P.O. Box 8015 1777 6 th Street Boulder, CO 80306-8015 www.bouldercolorado.

Boulder Municipal Court Boulder County Justice Center P.O. Box 8015 1777 6 th Street Boulder, CO 80306-8015 www.bouldercolorado. Boulder Municipal Court Boulder County Justice Center P.O. Box 8015 1777 6 th Street Boulder, CO 80306-8015 www.bouldercolorado.gov/court JURY READINESS CONFERENCE INSTRUCTIONS You have set your case for

More information

for Android Windows Desktop and Conduit Quick Start Guide

for Android Windows Desktop and Conduit Quick Start Guide for Android Windows Desktop and Conduit Quick Start Guide HanDBase is a Registered Trademark of DDH Software, Inc. All information contained in this manual and all software applications mentioned in this

More information

Welcome to XO WorkTime

Welcome to XO WorkTime Quick Start Guide End User s Quick Start Guide (for Smartphones) Welcome to XO WorkTime for IP Flex, IP Flex with VPN, Enterprise SIP, and SIP Services Go mobile with your office telephone numbers and

More information

10 Magni Tablet User Guide

10 Magni Tablet User Guide 10 Magni Tablet User Guide MODEL NUMBER: Wireless Mobile Internet Tablet Powered by SYTAB10ST Top View Front View Bottom View Side View SYTAB10ST Getting to Know Your New Tablet: MINI Micro SD Micro SD

More information

Seagate Dashboard User Guide

Seagate Dashboard User Guide Seagate Dashboard User Guide Seagate Dashboard User Guide 2013 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks

More information

HOW DOES A CRIMINAL CASE GET DISMISSED WITHOUT A TRIAL? Many criminal cases are resolved without a trial. Some with straight forward dismissals.

HOW DOES A CRIMINAL CASE GET DISMISSED WITHOUT A TRIAL? Many criminal cases are resolved without a trial. Some with straight forward dismissals. HOW DOES A CRIMINAL CASE GET DISMISSED WITHOUT A TRIAL? Many criminal cases are resolved without a trial. Some with straight forward dismissals. In some cases the prosecution can be misinformed by the

More information

Foxit MobilePDF for ios Quick Guide

Foxit MobilePDF for ios Quick Guide for ios 1 Contents Chapter 1 Description... 3 Chapter 2 Main Menu... 5 Chapter 3 File Management... 7 Chapter 4 Viewing PDF Files... 8 Chapter 5 Annotation... 13 Chapter 6 Signatures... 18 Chapter 7 Text

More information

The Swivl Solution. Uses. Swivl User Guide. Swivl is more than just video capture, it is a 3-part solution.

The Swivl Solution. Uses. Swivl User Guide. Swivl is more than just video capture, it is a 3-part solution. The Swivl Solution Swivl is more than just video capture, it is a 3-part solution. Swivl Robot Swivl Capture App Swivl Cloud The Swivl Robot works with any tablet device and follows the movement of the

More information

BlackBerry Link for Windows. Version: 1.1.1. User Guide

BlackBerry Link for Windows. Version: 1.1.1. User Guide BlackBerry Link for Windows Version: 1.1.1 User Guide Published: 2013-07-22 SWD-20130722144723525 Contents Getting started...5 About BlackBerry Link... 5 Getting to know BlackBerry Link...5 Connecting

More information

Getting Started with Microsoft Office Live Meeting. Published October 2007

Getting Started with Microsoft Office Live Meeting. Published October 2007 Getting Started with Microsoft Office Live Meeting Published October 2007 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless

More information

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.

More information

Precise innovation presents: USer manual

Precise innovation presents: USer manual Precise innovation presents: USer manual Let the FUn Begin! The goal of Caref is simple to give parents greater peace of mind and children a greater sense of freedom when they should be focusing as much

More information

The Witness and the Justice System in Alberta

The Witness and the Justice System in Alberta The Witness and the Justice System in Alberta Introduction This booklet provides basic information about appearing as a witness in the courts of Alberta. It is designed to explain your role as a witness,

More information

CDR-100. iphone Spy Recovery (for Win) User Guide. Rev. 1.0. iphone Data Recovery Software for Windows OS

CDR-100. iphone Spy Recovery (for Win) User Guide. Rev. 1.0. iphone Data Recovery Software for Windows OS CDR-100 iphone Spy Recovery (for Win) iphone Data Recovery Software for Windows OS User Guide Rev. 1.0 Contents Introduction 1 System Requirements 2 Features 3 Getting Ready for Data Recovery 4 Installation

More information

GoodReader User Guide. Version 1.0 GoodReader version 3.16.0

GoodReader User Guide. Version 1.0 GoodReader version 3.16.0 GoodReader User Guide Version 1.0 GoodReader version 3.16.0 Contents Operating GoodReader 1 Send PDF files to Your ipad 2 Copy Files with itunes 2 Copy Files to a Cloud Service 5 Download Files from the

More information

ARREST! What Happens Now?

ARREST! What Happens Now? Personal Injury Wrongful Death Slip & Fall Automobile Accidents Trucking Accidents Motorcycle Accidents Medical Malpractice Criminal Defense You re Under ARREST! What Happens Now? Do NOT Speak to Police

More information

Glossary of Terms Acquittal Affidavit Allegation Appeal Arraignment Arrest Warrant Assistant District Attorney General Attachment Bail Bailiff Bench

Glossary of Terms Acquittal Affidavit Allegation Appeal Arraignment Arrest Warrant Assistant District Attorney General Attachment Bail Bailiff Bench Glossary of Terms The Glossary of Terms defines some of the most common legal terms in easy-tounderstand language. Terms are listed in alphabetical order. A B C D E F G H I J K L M N O P Q R S T U V W

More information

Dacorum U3A Apple Mac Users Group Agenda TUESDAY 7th July 2015 Time Machine Backups for your MAC & ipad?

Dacorum U3A Apple Mac Users Group Agenda TUESDAY 7th July 2015 Time Machine Backups for your MAC & ipad? Agenda TUESDAY 7th July 2015 Time Machine Backups for your MAC & ipad? 1 Overview Time Machine Backups Mac Basics: Time Machine backs up your Mac Time Machine is the built-in backup feature of OS X. It

More information

Mobile Print/Scan Guide for Brother iprint&scan

Mobile Print/Scan Guide for Brother iprint&scan Mobile Print/Scan Guide for Brother iprint&scan Version G ENG Definitions of notes We use the following icon throughout this user s guide: Notes tell you how you should respond to a situation that may

More information

Getting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009

Getting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009 Getting Started with Microsoft Office Live Meeting Published October 2007 Last Update: August 2009 Information in this document, including URL and other Internet Web site references, is subject to change

More information

INDEX. Google Android Phone OS application and operation 2. Blackberry Operation System(Software Installation and Operation) 13

INDEX. Google Android Phone OS application and operation 2. Blackberry Operation System(Software Installation and Operation) 13 DVR4rt-H264 Mobile User Guide INDEX DATE: 2011/03/02 VER 1.0 Google Android Phone OS application and operation 2 Blackberry Operation System(Software Installation and Operation) 13 iphone Software installation

More information

CNJG Annual Meeting Pre-Meeting Workshop. Presentors: David Binder, Dir., IT Don Debias, Help Desk Mgr. John Bednar, Sr. Help Desk Specialist

CNJG Annual Meeting Pre-Meeting Workshop. Presentors: David Binder, Dir., IT Don Debias, Help Desk Mgr. John Bednar, Sr. Help Desk Specialist CNJG Annual Meeting Pre-Meeting Workshop Presentors: David Binder, Dir., IT Don Debias, Help Desk Mgr. John Bednar, Sr. Help Desk Specialist Agenda Overview of current state of technology Hardware Software

More information

VoipSwitch softphones

VoipSwitch softphones VoipSwitch softphones sales@voipswitch.com 3/21/2011 Voiceserve ltd.grosvenor House,1 High Street,London United Kingdom 1 Contents Introduction and solution overview... 2 iphone mobile softphone... 3 Google

More information

Introduction. Mobile GIS emerged in the mid-1990s to meet the needs of field work such as surveying and utility maintenance.

Introduction. Mobile GIS emerged in the mid-1990s to meet the needs of field work such as surveying and utility maintenance. Mobile GIS Introduction With more than 6.8 billion mobile cellular subscribers, (2013), wireless communication and mobile computing have gained acceptance worldwide with speed that has surpassed many other

More information

Mobile Banking FAQ for Business

Mobile Banking FAQ for Business Mobile Banking FAQ for Business General Questions 1. What is National Bank of Arizona Business Mobile Banking? Mobile Banking provides anytime access to your eligible account(s) from select mobile phones

More information

Mobile Print/Scan Guide for Brother iprint&scan

Mobile Print/Scan Guide for Brother iprint&scan Mobile Print/Scan Guide for Brother iprint&scan Version I ENG Definitions of notes We use the following icon throughout this user s guide: Notes tell you how you should respond to a situation that may

More information

Anchor End-User Guide

Anchor End-User Guide Table of Contents How to Access Your Account How to Upload Files How to Download the Desktop Sync Folder Sync Folder How to Share a File 3 rd Party Share from Web UI 3 rd Party Share from Sync Folder Team-Share

More information

Chapter 1 Kingsoft Office for Android: A Close Look. Compatible with Microsoft Office: With Kingsoft Office for Android, users are allowed to create,

Chapter 1 Kingsoft Office for Android: A Close Look. Compatible with Microsoft Office: With Kingsoft Office for Android, users are allowed to create, Introduction From the globally respected software company Kingsoft, comes an extraordinary new Office software for your Android mobile or tablet device. Utilizing decades of leading innovation, Kingsoft

More information

PhoneView Product Manual

PhoneView Product Manual PhoneView Product Manual PhoneView is a Mac application for accessing iphone, ipad or ipod touch imessages, SMS/MMS, WhatsApp messages, contacts, call history, voicemails, shared app data, Safari web bookmarks

More information

Android OS Mobile Dialer Application Manual. Make low cost Internet calls from Android Smartphone or Tablet

Android OS Mobile Dialer Application Manual. Make low cost Internet calls from Android Smartphone or Tablet Android OS Mobile Dialer Application Manual Make low cost Internet calls from Android Smartphone or Tablet Android Mobile Dialer Application 1. Introduction... 2 2. Signup... 3 3. Download & Setup... 5

More information

Personal Cloud. Support Guide for Mobile Apple Devices

Personal Cloud. Support Guide for Mobile Apple Devices Personal Cloud Support Guide for Mobile Apple Devices Storing and sharing your content 2 Getting started 2 How to use the application 2 Managing your content 2 Adding content manually 2 Downloading files

More information

Intermedia Cloud Softphone. User Guide

Intermedia Cloud Softphone. User Guide Intermedia Cloud Softphone User Guide FOR MORE INFO VISIT: CALL US EMAIL US intermedia.net +1.800.379.7729 sales@intermedia.net 1 Contents 1 Introduction... 3 1.1 Cloud Softphone Features... 3 2 Installation...

More information

Mobile App User's Guide

Mobile App User's Guide Mobile App User's Guide Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure

More information

RingCentral Office@Hand from AT&T Desktop App for Windows & Mac. User Guide

RingCentral Office@Hand from AT&T Desktop App for Windows & Mac. User Guide RingCentral Office@Hand from AT&T Desktop App for Windows & Mac User Guide RingCentral Office@Hand from AT&T User Guide Table of Contents 2 Table of Contents 3 Welcome 4 Download and install the app 5

More information

BlackBerry Curve 9310/9315/9320 Smartphones. Version: 7.1. User Guide

BlackBerry Curve 9310/9315/9320 Smartphones. Version: 7.1. User Guide BlackBerry Curve 9310/9315/9320 Smartphones Version: 7.1 User Guide Published: 2012-10-19 SWD-20121019094225835 Contents Quick Help... 9 Getting started: Your smartphone... 9 Popular topics... 28 Popular

More information

Wave 4.5. Wave ViewPoint Mobile 2.0. User Guide

Wave 4.5. Wave ViewPoint Mobile 2.0. User Guide Wave 4.5 Wave ViewPoint Mobile 2.0 User Guide 2014 by Vertical Communications, Inc. All rights reserved. Vertical Communications and the Vertical Communications logo and combinations thereof and Applications

More information

Getting Started. Version 3.1 Last updated 2014/3/10. Orbweb ME: Getting Started

Getting Started. Version 3.1 Last updated 2014/3/10. Orbweb ME: Getting Started Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or

More information

iphone 3GS Initial Set-up Guide

iphone 3GS Initial Set-up Guide iphone 3GS Initial Set-up Guide 2 3 Introduction Table of Contents Thank you for choosing Consumer Cellular! We know you re excited to use your new phone and this guide will help you set it up as quickly

More information

CAS CLOUD WEB USER GUIDE. UAB College of Arts and Science Cloud Storage Service

CAS CLOUD WEB USER GUIDE. UAB College of Arts and Science Cloud Storage Service CAS CLOUD WEB USER GUIDE UAB College of Arts and Science Cloud Storage Service Windows Version, April 2014 Table of Contents Introduction... 1 UAB Software Policies... 1 System Requirements... 2 Supported

More information

OpenTouch Conversation for Android Smartphone Release 2.1

OpenTouch Conversation for Android Smartphone Release 2.1 OpenTouch Conversation for Android Smartphone Release 2.1 OmniPCX Office Rich Communication Edition OpenTouch Business Edition OpenTouch Multimedia Services User guide 8AL90640USAB ed01 1514 1 README FIRST

More information

Using OwnCloud. OwnCloud is a very easy to use file storage and sharing system that you can access anywhere you have an internet connection.

Using OwnCloud. OwnCloud is a very easy to use file storage and sharing system that you can access anywhere you have an internet connection. Using OwnCloud OwnCloud is a very easy to use file storage and sharing system that you can access anywhere you have an internet connection. 1. Contact the IT Department to set up your account. 2. Once

More information

Mobile Device Forensics: A Brave New World?

Mobile Device Forensics: A Brave New World? Mobile Device Forensics: A Brave New World? Contributed by Jason Gonzalez and James Hung, Stroz Friedberg LLC Say your client is charged with trade secret theft. What if you could show electronic evidence

More information

Mobile Communicator for Mobile Devices

Mobile Communicator for Mobile Devices Mobile Communicator for Mobile Devices Quick Reference Guide Hosted Voice Customer Resource Center www.earthlinkbusiness.com/hostedvoice 2015 EarthLink. Trademarks are property of their respective owners.

More information

Hello. Quick Start Guide

Hello. Quick Start Guide Hello. Quick Start Guide Welcome to your new MacBook Air. Let us show you around. This guide shows you what s on your Mac, helps you set it up, and gets you up and running with tips for the apps you ll

More information

Seagate Business Storage 8-bay Rackmount NAS Reviewer s Guide

Seagate Business Storage 8-bay Rackmount NAS Reviewer s Guide Seagate Business Storage 8-bay Rackmount NAS Reviewer s Guide Seagate Business Storage 8-bay Rackmount NAS Reviewer s Guide/page 2 Purpose of this guide Experience the most common use cases for the product,

More information

An Informational User Guide for: Web Conferencing

An Informational User Guide for: Web Conferencing Allows You to: Manage your audio conference online using easy point and click conference commands Show slide presentations and graphics to meeting participants Show your desktop to meeting participants

More information

1. What are Nevada State Bank Mobile Banking and Nevada State Bank Business Mobile Banking?

1. What are Nevada State Bank Mobile Banking and Nevada State Bank Business Mobile Banking? General Questions 1. What are Nevada State Bank Mobile Banking and Nevada State Bank Business Mobile Banking? Nevada State Bank Mobile Banking and Nevada State Bank Business Mobile Banking provide anytime

More information