![]() ![]() “Who was present at the car lot every single time child pornography was downloaded?” The prosecution’s final piece of evidence submitted this morning was a “timeline of exhibits of evidence” that put everything into a clear and understandable document for the jury to see all of the precise time and date correlations made by the computer forensic investigators.Ĭlayman finished by asking one last clear and simple question. Sketch of Josh Duggar in federal court for his child porn trial | Artist: John Kushmaul Prosecuting attorney William Clayman continued his examination of Fottrell until the jury had been presented an abundance of files, logs, text messages, and photographs that all correlated directly to the exact dates and times the HP computer was accessing illegal material and eventually connecting with the Little Rock Police detective’s computer. The exhaustive correlation of events went on for the entirety of the first-morning session before Judge Timothy L. Josh Duggar trial: Defense cross-examines Homeland Security investigator, prosecution calls 3 more witnesses In some cases, the presence of the phone at the car lot was pinpointed to the exact minute that the HP was downloading CSAM, either by texts the phone sent or photos taken on it. Many of these included GPS and geolocation data pulled from the computer backup of Duggar’s iPhone, and the prosecution repeatedly made comparisons of dates and times with those when the illegal downloads occurred. ![]() He added that he did look for remote access tools and found none.įor the second straight day, the prosecution submitted dozens of exhibits of evidence to the court. He made it clear that the Linux partition side of the HP computer, where all illegal evidence was found, must be selected manually when the HP computer is booting up, as the more common Windows operating system is the default. That’s not happening.” Sketch of inside the federal courtroom for Josh Duggar’s child porn trial. Josh Duggar trial: prosecution calls 2 computer forensics experts, submits dozens of exhibits of evidenceįottrell also dismissed the possibility of someone remotely accessing the HP computer in question, stating that the evidence he analyzed was “not fitting the pattern of someone connecting remotely. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |