Expert Witness Corner: Computer Counter-Forensics

Digital Evidence Triad:

The fragile nature of digital evidence, coupled with the complexity and skill required to conduct an assessment that will bear the scrutiny of a court of law, makes it important to independently validate and verify the findings of the forensic assessor.

Case preparations involving scientific evidence must consider three core areas in detail, exploring each facet of evidence to assess whether Best Practice and prevailing regulations have been adhered to. This also ensures a full appreciation of the available digital evidence, which can be placed into the context of the allegations and accompanying physical evidence. These three spheres are:

1: Search & Seizure: The means by which the target media (e.g. hard disks and CD’s found on the suspect or at a specific location) were acquired by law enforcement agents and their subsequent preservation through the ‘chain of custody’.

2: Preservation of Evidence Containment and protection of evidence exhibits so as to ensure fragile and volatile digital evidence is neither corrupted nor tainted.

3: Forensic Assessment & Analysis Evaluation of media and raw materials to furnish law enforcement agents with forensically sound evidence that can be presented in a court of law.

Efforts geared towards thwarting or impacting on the forensic computing process are levelled at one or more of these spheres.

Physical Safeguards:

In the context of countering digital forensic practices, physical security is based on the principle that if a computer system cannot be found, then it cannot be seized by the authorities for examination.

Locked cabinets and steel laptop cables will frustrate efforts to remove devices from the suspect’s premises; however, they will be defeated given adequate time and resources.

More advanced approaches towards protecting computing devices include concealing key computer drives or media under the floorboards, in the loft space or in out-house facilities such as a garage. This can afford a degree of security and ensure that devices remain hidden from investigators. Communication with the device can be achieved without telltale cabling, relying instead upon encrypted wireless signals.

Anti-tamper devices, such as specialist alarm units that reside within computer casing, can be used to upset and hinder the search and seizure process. More complex approaches towards asset protection can include integrated ‘anti-seizure’ devices that are attached to the computer drive. These are designed to corrupt the computer drive data should any attempt be made to remove the disk or access the system without the use of a special hardware token and password.

File & Application Security:

Investigators will naturally gravitate towards files and folders that appear to have titles of relevance to the case in hand. Perhaps the simplest approach to concealing files or folders is to rename them to something innocuous and unlikely to arouse suspicion.

A more considered approach to hiding information involves the moving of user data, such as textual reports or financial spreadsheets, into archives which normally contain only files required by the computer for operation (e.g. the system32 or config folders).

Both of these approaches help conceal information from the curious or casual browser, but the material will undoubtedly be uncovered during the course of a comprehensive forensic evaluation of the computer drive.

A different approach involves changing the way in which the computer operating system interprets files. Microsoft WindowsTM, the most prevalent desktop computing environment, identifies files and the program that should be used when they are being opened by the extension associated with the filename. Extensions take the form of a full stop and three letters appended to a filename – for instance the popular.doc extension that indicates a Microsoft WordTM document.

A somewhat crude but nonetheless effective approach to obscuring information is to change the associated file extensions. This could make a Word document (.doc extension) to appear as a bitmap graphic (.bmp extension). If a user attempts to open the file, the default program associated with the file-type, Microsoft PaintTM in this instance, will be invoked. Since the file data is actually in Microsoft Word format, Microsoft Paint will not be able to render the information and will return an error.

Such efforts are likely to help sensitive materials pass under the nose of casual observersand those intent on identifying files of a particular type, such as graphical images which feature the extensions including.bmp or.jpeg.

A more conventional approach towards protection of information is to employ passwords. Starting with Microsoft Office 95, it became possible to password protect office productivity files to prevent unauthorised access. Well equipped forensic laboratories have specialist equipment to allow dictionary and brute-force attacks (trying all possible character combinations) against password protected files and programs, so unless a particularly complex pass-phrase is used the security is likely to be broken fairly quickly.

Most users employ passwords based on words found in the English dictionary or words that have meaning to them, such as the name of their wife or pet. These passwords are not complex enough to thwart concerted efforts to break the security. Passwords based upon non-English words, greater than eight characters in length and using both numbers and non-alphanumeric characters (e.g. exclamation or punctuation marks) provide a level of complexity that is extremely difficult to break.

However, password protection can have serious shortcomings that can be exploited by forensic investigators. Protection of this type usually places a barrier up at the beginning of the file, which means if this safeguard can be by-passed, the actual data contained within can be extracted. A classic example is a forensic examiner using a plain text editor, such as Notepad, to open a password protected document. All controls, safeguards and features that may be in place through Microsoft Word are thus circumvented.

Taking file and application level protection to the next level is the practice of cryptography – the science of securing information through the use of reversible transformations. The word “cryptography” has its roots in the greek terms “cryptos”, meaning secret, and “graphy”, meaning writing. Simple ciphers, known as mono-alphabetic or Caesar systems, involve the substitution of letters. The development of digital computing revolutionized cryptography and made today’s highly complex and secure cryptographic systems possible.

With the introduction of Microsoft Windows XPTM an enhanced security feature known as Encrypting File System (EFS) has become readily available to desktop computer users. EFS is a cryptographic support system that enables files, folders and even sections of the hard disk file system to be encrypted using a variant of the Data Encryption Standard (DES) algorithm.

Attacking cryptographic materials is known as cryptanalysis and requires highly experienced consultants for any reasonable chance of success. Attacks can be levelled against the protocol (i.e. the mechanics of the encryption system employed), the protected file/data, or the interface and environment (i.e. the manner in which the user has interacted with the cryptosystem and/or computer system to create the secured material).

A more complex approach to concealing information involves placing it within or around another open and public source, a practice known as stegonography. Classic examples of stego’ include invisible inks or the use of grilles to cover a written message and reveal only selected words or phrases. In a digital context, stegonography involves embedding the code that constitutes one file, for instance a graphical image, into the code structure of a secondary file.

The use of stegonography can be difficult to detect even with the benefit of specialist forensic tools and when employed correctly can allow suspect material to evade even the most astute investigator. When combined with cryptography, stegonography can be an especially powerful means of safeguarding both the presence and content of information.

Another approach to concealing information is to embed data in special sections of the file system structure. Alternative Data Streams (ADS) was a design feature introduced into the Microsoft WindowsTM operating system with the NTFSTM file system as a means to provide compatibility with the Macintosh Hierarchical File SystemTM (HFS).

The way the Macintosh’s file system works is it uses both data and resource forks to store its contents. The data fork is for the contents of the document while the resource fork is to identify file type and other pertinent details. There has been a marked increase in the use of these streams by malicious hackers wanting to store their files once they have compromised a computer. Not only that, it has also been seen that viruses and other types of malware are being placed there as well. The crux of the matter is that these streams will not be revealed using normal viewing methods, whether via a command prompt or using the Windows Explorer.

Whilst data embedded within ADS will remain invisible during all normal operations, forensic examiners can identify such material using complex data analysis tools. When information is encrypted, embedded within other file code (stegonography), and finally hidden in an ADS, it is likely that the material will be safe from even the most astute investigators.

Internet Privacy:

The Internet is an essential tool for business and leisure but is also a compelling resource for those commissioning or researching criminal activities.

Reading email or browsing the World Wide Web (WWW) leaves traces on the host computer that can be recovered by forensic investigators to give an indication as to website visited, terms used on search engines and conversations held in online chat-rooms.

Whilst popular browser applications such as Internet Explorer and Mozilla feature routines to remove personally identifiable information, a more considered approach to eliminating any local traces of online activity would involve the use of a specialist application such as ‘Evidence Eliminator’.

To add a layer of security between the computer and Internet, and thus protect against any potential eavesdropping on the telephone/broadband network, an approach known as Onion Routing may be employed. Developed by American researchers Onion Routing employs a complex series of relays, routers and encryption protocols to ensure anonymity and confidentiality of traffic.

Whilst investigators without the capacity or capability to undertake complex cryptographic evaluations may be at a loss to identify the content of such protected internet content, it may be possible to glean useful information through the use of ‘traffic analysis’. Here the intention is to identify patterns and norms. For instance, it may not be possible to determine what website an individual is accessing, but through cataloguing the traffic it can be possible to say, with certainty, when a user was online. Should this be backed up with physical surveillance that can attest the individual was alone at the premises under observation at a particular point in time, then should further evidence come to light at a later point (perhaps as a result of performing a forensic analysis of the suspect’s computer, following a search/seizure order), it can neatly tie the suspect to the computer keyboard.

Exploiting Forensic Methodology:

Whilst the approaches previously discussed have focused on obscuring or concealing either the physical computer devices or the digital evidence contained therein, the following techniques are geared towards thwarting the forensic process of examination of digital media.

Operations upon files and folders are recorded in timestamps, which provide details as to when the file/folder was created, when it was last accessed, and when the file/folder was last modified. Timestamp data is recorded automatically by the operating system and provides crucial evidence as to actions and times/dates when they occurred. However, appreciating how valuable timestamp data can be to investigators, tools have been created by various Hacking groups to allow manual or automatic modification of timestamps. This technique is known as “fuzzing” and can make attribution of the file – or who was at the keyboard at a specific point in time – near impossible. Furthermore, fuzzing taints the evidence so that the integrity of the timestamps is damaged to a degree that would make them inadmissible in a court of law.

ACPO Guidelines for the seizure of computer devices, suggest immediate disconnection of the power unit, so as to preserve information on the system computer drive(s). This is regarded as Standard Operating Procedure (SOP) by investigators around the world, but it does have one very serious shortcoming. By disconnecting the power, any information stored within the volatile memory (e.g. RAM) will automatically be lost and cannot be retrieved. Hacking tools have evolved to take advantage of this investigative procedure; having scripts and applications that run exclusively in memory so that no traces will survive on the disk should the computer be seized by the authorities. It is considered to be only a matter of time before this counter- forensics technique becomes even more widely adopted by those intent on using computers for the commission or support of criminal enterprise.

Legal Context:

Whilst not a security technique or forensic safeguard, some criminals have shown remarkable forward planning as a precaution if they one day have to stand trial for an offence.

In legal circles there have been a number of high profile cases involving computer abuse/misuse, where the line of defence has been that the computing device had been under the control of an unknown third party. In many cases the assertion is the computer has been broken into by a Hacker, who used the device as a platform for perpetrating their crime. This has become known as the ‘Trojan defence’ and was applied successfully in the case of R v Aaron Caffrey, who was charged with breaking into computer systems owned by the American port authority in Houston.It has been known for criminals to purposefully infect their computers with viruses and malicious code, laying the foundations for just such a defence should the need ever arise.

The technical arguments as to whether computer code, which is what essentially all digital media is, can constitute obscene media have long been agreed in the rulings of R v Fellows and R v Arnold. In matters involving obscene images and media, the recent ruling in R v. Porterhas put flesh on the bones of the argument as to what constitutes ‘possession’ in a technical sense. In this case the presiding Judge gave directions as to whether the jury could consider that deleted images, recoverable only using advanced forensic means, could still be considered in the possession of the owner.

Recently the Home Office announced plans to begin enforcing provisions outlined in Part 3 of the Regulation of Investigatory Powers Act (RIPA). The wording of this act would make it an offence for an individual or entity to refuse or be unable to disclose passwords or encryption keys specifically requested by the authorities in relation to an investigation. One argument against these provisions is that it reverses the burden of proof and makes a party guilty of an offence should they be in a legitimate position to be unable to comply with a disclosure order.

One of the main criticisms of the act, however, is whether or not it will have the desired effect in enabling criminals abusing or leveraging technology to suitably punished. The oft-quoted example is that of an individual arrested on suspicion of possessing obscene images and media. Should the computer drive be strongly encrypted, the authorities may attempt to coerce the decryptions keys via RIPA. However, it would clearly not be in the individual’s best interests to comply, as this would reveal the extent of their cache and almost certainly result in a punishment that would far outweigh that which would be on the table as punishment for non-compliance with the RIPA provisions.

Security vs. Accessibility:

When considering security controls and countermeasures a careful balance must always be achieved, as to how to maintain reasonable accessibility to the data whilst ensuring confidentiality.

A collection of obscene images could, for instance, be grouped into one archive that is strongly encrypted and the resulting code embedded into the file structure of an innocuous file that is in turn buried deep within the computer’s file system. This computer drive may then be concealed within the loft crawl space and communications with the device achieved using encrypted wireless protocols. Clearly this would afford a good degree of secrecy to the material, but does make it increasingly difficult to access or retrieve for any practical purposes.

The accessibility angle is used to the advantage of investigators, who will routinely scan suspect premises for wireless communication signals or follow computer data or power cables to identify any hidden devices.

Summary:

Criminals and those engaging in offences involving the use or support of information technology continue to use various means to thwart the efforts of investigators to secure digital evidence. Whilst countermeasures range from the crude yet novel (e.g. burying devices under the floorboards) to the highly sophisticated (e.g. encrypting information and concealing the code within redundant areas of the computer file system) – it is clear that defensive practices of this nature are becoming increasingly prevalent. Equally, these efforts are becoming worryingly effective in hindering the efforts of law enforcement and have contributed significantly in the police either training their own specialist investigators or trying to find an expert witness with the requisite skills.

History has taught us that attacks against systems – whether physical or digital in nature – only increase in efficiency and effectiveness over time. It is therefore essential that lawyers involved in these type of cases find an expert witness with the requisite skill set that can deal with the complex technical issues that often arise.

This article is not a ‘how-to’ guide and certain details from both the defensive and offensive perspectives have been intentionally omitted. The techniques described in this article are documented in a variety of public resources and in many instances employed quite regularly by criminals abusing or misusing technology.

It is considered more harmful to the forensic industry to operate under a veil of security and operate with a false sense that the practices employed are above reproach.

It is hoped that by highlighted this disturbing trend some of the challenges and limitations of current forensic computing practice can be appreciated. Furthermore, this can stimulate informed discussions that will lay the foundations for research into fresh approaches for countering counter- forensic practices.

Ross Patel is a forensic computer consultant with Afentis Forensics. You can view the company profile and find an expert witness at X-Pro UK, the innovative expert witness directory.

expert witness accreditation

Related Expert Witness Articles

Expert Witness Corner: The Use of Experts in U.K Commercial & Construction Cases

There is a risk attached to the use of experts in the service of the Tribunal. The expert, the person experienced in the business or techniques of the dispute, can start a cold breeze of logic and common sense blowing through the dusty rooms of the law.

Involve an expert and you involve someone to whom the truth and the facts are more important than the tactics and games. More seriously, you involve someone to whom justice and fairness are more important than the esoteric details of positive law. Someone whose frustration, at the obfuscation found in much modern legal practice, sometimes may result in steps towards the truth being taken much more quickly than billing practice normally would permit.

My lawyer friends should be warned that, by bringing an expert into the service of the tribunal, whether as a member of a tribunal, as a sole arbitrator or as the tribunal’s own expert, they have a tiger by the tail.

Let me recapitulate briefly: I suggest the characteristics of an expert, and for this purpose I mean an expert in fields other than law, to include: knowledge and experience of his or her field – an expert knows what he or she is talking about; the skills of logic and common sense; an ordinary man’s, or woman’s, sense of justice and fairness; skills of communication and exposition, at least related to the field of expertise and often more broadly related – an expert knows how to express his or her findings or opinions.

Disputing parties, seeking a way to resolve or determine their dispute, may well look at those characteristics and think that they are precisely what is required.

That is right and that is, of course, the original purpose, the raison d’être of commercial arbitration, although a modern observer could be excused for thinking otherwise.

That was how arbitration began in commerce, before the modern structure of nation states became what it is today. Merchants would choose one of their peers, preferably one whose prestige and reputation put him out of the hurly burly of immediate competition, and agree to accept his decision. He was the arbitrator- knowledge and experience, logic and common sense, sense of justice and fairness, ability to communicate his findings. It was all that was necessary. Now is not the time to discuss how the need for control by the State has led to a corruption of the process. I have discussed that elsewhere, and the move towards a globalization of trade eventually may mean a return to the standards of the past, as trade once again passes beyond the grasp of nation-states.

My immediate point is that, far from being an exception to the arbitral process, the use of an expert is the natural, the obvious way to determine a private dispute in a specialist area of trade or professional practice.

That is my starting point. Of course there are trade disputes in which there is some obscure point of law; there are others in which a suitably obscure point of law may be invented. My essential proposition, however, is that most topics in trade and commerce are best understood by people in trade or commerce, experts in the field. That must be so, otherwise they would not be able to trade successfully day-by-day, as obviously they do.

That is why the expert plays an essential role in the service of the tribunal.

I will now turn to the principal ways in which that service may be provided. In the limited time available, I will deal with three categories.

First I will touch upon the role of the expert as a sole arbitrator and the ways in which, if necessary, additional legal support may be brought into the room.

Secondly, I will discuss the expert as a member of a plural tribunal, his or her relationship with others, and the possibility of creating a “dream team” to deal with a specific dispute.

Finally, I will look at the task of a tribunal-appointed expert and the relationship between the expert and the tribunal.

Before doing so, however, I would digress for a moment to discuss the relationship between two fields of law. For want of better definitions, I shall call them Positive Law and Natural Law. Positive Law is what it is. Holmes once said, to an attorney in his court, “This is a court of law, young man, not a court of justice.” A great jurist, leader of the American Realist school of jurisprudence, whose definition of positive law is perhaps the most exact that can be found, he was right. To paraphrase something else he said, Law is no more and no less than the prediction of what a court will decide in practice. I would not presume to argue with that; it is unarguable.

As it happens, although I teach in a Law School, I am an engineer. Engineering is variously described as a useful art or the application of science. The aim of engineers, and I quote the Institution of Civil Engineers in London, is the harnessing of the great forces of Nature in the service of mankind.

Please think about that for a moment. No one is beyond the laws of nature. My colleagues and I serve the laws of nature every day of our lives. If the bridge is not strong enough, it falls.

Engineers know well the famous accident to the bridge at Tacoma Narrows and it exemplified what I want to say. Because of a peculiarity of the wind through the gorge, and the design of the bridge – it was a suspension bridge – oscillations were induced in it and became progressively more severe over a period, eventually it broke and sent at least one abandoned vehicle down with it. The incident led to changes in design to take account of the effects of wind. It was not the first instance of a man-made bridge failing in the wind. The Tay Bridge Disaster, in the nineteenth century was another.

Now, there would have been time, once the Tacoma Narrows Bridge started to oscillate, to apply to the court for an emergency injunction to prevent it. I daresay that it would have been easy to persuade the Judge of the public interest.

But, and this is the point I wish to make, the injunction would not, could not have been effective. The bridge would still fall. Canute demonstrated to his courtiers that all his undoubted power could not cause the tide to turn. Galileo admitted to his inquisitors that the Earth did not move around the Sun. It was res judicata, but nobody told the Earth, and still it moves. That is the nature of the law I serve. Unforgiving, inflexible, certain (but only insofar as it is correctly known). A hard mistress and not one whose rules may be changed by statute, by fiat or by a determination of the court. Natural Law.

And Natural Law governs both material and immaterial matters. There are laws of Physics, Chemistry and Mathematics, but there are also Laws of Aesthetics, of Logic, of Morals and of Human Behaviour. We specialise, of course, and we can learn more of some Natural Laws than we can of others, but none can pick and choose which Natural Law to apply. It applies without our intervention.

Now this may seem a little remote from Commercial Arbitration, but it is not. The principles of the Law of Obligations are essentially Natural Law principles. In Contract, they spring from the logical consequences of the ability to communicate ideas and wishes and, in particular, promises. In other areas, tortious obligations, they spring from the twin principles of free will, which makes us responsible for the consequences of our actions, and our duty to one another, a necessary part of social existence. And Arbitration, of course, is a creature of the promise. It has a foundation in Natural Law. That is fundamental and inevitable. International Arbitration is, by definition, universal; the Laws of nation states, the only positive Laws, are not. I am not here discussing state recognition, that is another matter altogether.

I will deal only briefly with the expert as sole arbitrator. The advantages of trusting a dispute to someone who understands the nature of the problem are self evident, as is the moral strength of an agreement to abide by the judgement of a peer in one’s field of work. There are three aspects which need attention. One is the need for such and expert arbitrator to acquire the appropriate procedural skills, for which training is available. Most senior professionals, in every sphere of activity, have experience of managing meetings fairly. Another is the occasional need for the arbitrator to seek legal advice, which has always been a traditional right, although occasions for it are rare. The third is the problem of transparency, which is overcome by the expert arbitrator setting out, for the parties, such personal knowledge as may be relevant, and inviting them to deal with it if they wish. Expert arbitrators may be in a minority on the international scene today, but there are several of them and there may well be a recovery of numbers as training becomes more widely available.

The advantage of at least one or two experts in a multiple tribunal is also, I suggest, self-evident. That is especially so in modern international arbitration, where the party appointed arbitrators are required to be neutral and not to act as a kind of quasi-advocate for their appointers. Non-lawyers are not accustomed to advocacy and do not have the contentious instincts of the professional advocate. That makes them well suited to a neutral role.

I wish particularly to alert you to the enormous opportunity which the parties have to create an ideal tribunal for the problem they have to resolve. I have called it the “dream team” approach. Imagine, if you will, a build-operate-transfer project, to manufacture ethical pharmaceuticals to be marketed in an area where only imported products have been available. Now assume that disputes have arisen, during construction, about the performance and profitability of the plant.

What I suggest is that the parties and their lawyers could put together a tribunal which comprised, say, a chemical engineer, an expert on project finance and a lawyer familiar with the country where the construction was taking place. Not only would those men or women be able to deal with their respective fields. If given the opportunity, they would create a collegiate team which would be able to discuss issues from widely differing points of view, bringing a synergy to the arbitral process. The whole would be greater than the sum of its parts.

That is what I had in mind when I spoke of the relationship between the members of a tribunal. It is a collegiate relationship, between colleagues, not a relationship of contentions.

Now I turn to the service which the expert may give as witness or investigator for the tribunal. I will not deal with experts appointed as members of the legal teams of the parties; others will discuss that role.

Various legislation covers the appointment of a tribunal expert. The English Arbitration Act of 1996 refers to advisors, assessors and experts, but does not differentiate greatly between them. Distinctions between those roles may be somewhat technical; Article 26 of the UNCITRAL Model Law refers only to experts and, I suggest, sets out the natural requirements for the task. An expert or experts may be appointed – no prescription as to the nature of the expert – and, unless the parties agree otherwise, that expert must be available for examination. The Model Law also imposes a duty of co-operation on the parties.

In any reference, the decision as to whether or not to appoint an expert is a decision of the tribunal. Although the parties have the right to agree otherwise, the tribunal’s discretion is complete, both as to whether to appoint an expert and as to who the expert should be. In practice, however, it often may make sense for the tribunal to invite the parties to agree upon an expert.

The expert’s role is defined by the tribunal, in the light of the views of the parties. Ideally, there should be precise terms of reference, which may take the form of a series of questions. The expert can play a useful role in suggesting additional questions and in drawing up the terms of reference, but the final decision will be that of the tribunal.

The tribunal’s expert is an extension of the power of the tribunal to make enquiry. That was brought home to me by a distinguished professor of law who described a mission which arose for a tribunal of which he was chairman. The field of the dispute was esoteric, and the tribunal could not find an expert in the field who did not have connections with one or other of the parties. There were documents to be examined and enquiries to make. Accordingly, the tribunal appointed a gentleman, not from that field of business, but from a generally similar discipline, to examine the documents, to make the enquiries and to report to the tribunal. Almost an agent de police judiciaire, you might think.

One method of proceeding, which I have found successful, is for the parties to give their reasoned answers to the questionnaire before the expert’s enquiries begin. This gives a structure to the enquiries. Then, the first report is given for their comments and the final report may incorporate the comments given by the parties. That may make unnecessary the examination of the expert before the tribunal, but the tribunal may wish to have the expert present to comment upon any further evidence. Because the expert can be examined, he or she may be relieved of the obligation to ensure that both parties are present at any phase of the enquiry. That can save a great deal of time and expense, but the expert must report upon anything he or she takes into account. The principles of Natural Justice are not suspended for the expert, only made a little more practical. Any basis for the expert’s opinion must be made known, and any documents made available to the expert ordinarily should be available to the parties and the tribunal. An exception may be made for trade secrets; the tribunal may order some material to be shown only to the expert, who may then refer to it in a way that protects the secret. It is a procedure that requires care by both expert and tribunal.

Remember, it is so important that lawyers not only

find an expert witness but are able to find one that not only specialises in his chosen field but also has a working knowledge of how tribunals work. That is crucial.

Professor Beresford Hartwell is an experienced Engineer/Arbitrator/Adjudicator. You can view his Profile and find an expert witness at X-Pro, the innovative expert witness directory.

Expert Witness Join Video 2

www.ExpertWitness.com – This Expert Witness database directory matches highly credentialed expert witnesses, legal analysts, economists, medical experts, medical malpractice and forensic litigation support consultants with attorneys, lawyers, law firms, legal, insurance, legislative, judicial, regulatory, government, business decision makers and professionals. You can find an expert witness for all your litigation needs with this Expert Witness directory database. ExpertWitness.com is headed up by Patrick O’Leary. He was a founder and CEO of a very large Internet Social Network called MatchMaker.com. It was sold to Lycos for Million Dollars in 2000. After such a home run, he himself started working as an Expert Witness and then shortly there after acquired the business ExpertWitness.com. While under his control, he grew the network by more than 5x in only a few short years. More about Patrick O’Leary ExpertWitness.com matches highly credentialed expert witnesses, legal analysts, economists, medical experts and forensic litigation support consultants/experts with attorneys, lawyers, law firms, legal, insurance, legislative, judicial, regulatory, government, business decision makers and professionals. You can find an expert witness for all your litigation needs at ExpertWitness.com Our network presents our expert’s CV/resumes to thousands of legal professionals around the world every day. The leading name in experts for almost two(2) decades, our sites continue to rank
Video Rating: 0 / 5

Will Allen, Expert witness – US covering up documented UFOs and ETs over Capitol and White House

READ ARTICLE/UFO PHOTO SLIDE SHOW: Expert witness: US covering up documented ETs & UFOs over White House, Capitol www.examiner.com
Video Rating: 4 / 5

Professor, former Justice of the Supreme Court , IIR Executive Development course instructor, Professor the Hon. George Hampel AM QC gives an insight into The Expert Witness and Expert Evidence Workshop, and defines why training for expert witnesses is essential. For more info,contact +61 2 9080 4050, edinfo@iir.com.au , or visit: www.iired.com.au

Steven Kay QC: ICTY, Cross examination of Expert Witness, The Prosecutor v Gotovina et al 2009

Steven Kay QC, lead counsel for the Cermak defence team, cross-examines military expert and ICTY OTP staff member, Reynaud Theunens. For further info and links: www.9bedfordrow.co.uk
Video Rating: 5 / 5

Delivering Expert Witness Testimony

Enjoy this 15 minute, audio-only, clip from ASSE’s recent Virtual Symposium.
Video Rating: 0 / 5

The Importance of Word Choice in Expert Witness Reports

You’ve probably heard the phrase: “it’s not always just about you.” The expert report is not just an expression of your opinions for your own satisfaction. Before you qualifications it, you cannot realize how greatly the words you choose, and the way in which you form your sentences, will affect the legal results. Your attorneys and the opposing attorneys will look more closely at what you say and how you say it than any English teacher you ever had.
Quite simply, your attorney wants to be able to quote things you say to help him make his case. The opposing attorney would love to be able to quote things you say that are either wrong or poorly expressed. He would love for you to provide him with ammunition for cross examination. He wants to hear sentences or adjectives that make you sound uncertain, and that may even enable him to use your words to support opposing points of view.
Similarly, you will have the task of reading the opposing expert’s report and looking for weak technical work or wording that your retaining attorney can undermine or attack.

Your goal in reviewing the other expert’s report is to identify the technical strengths and weaknesses found there. This will help your attorney in his effort to discredit the other expert and/or his work. Knowing what to include in your own expert report should make obvious what omissions or errors to look for in the other expert’s report.
Maneuver carefully with your opinions. You must sound sure. You must be confident of your opinion. Don’t use hedge words or phrases, a common weakness in expert reports. In your reconstruction of an event, or as the result of your tests and analyses, you may reach a firm conclusion. Say so in your opinion. Do not use words like “seemingly,” “possibly,” “possibly,” “maybe” or even phrases like, “it appears that,” “it may be that,” or “it usually is the case that.” If you use phrases and words like these, I can assure you that your opinion will not be helpful. The other attorney will interrogate you about alternative ways to interpret your opinion. He will use your own hedging phraseology to suggest that your opinion should not be taken as credible or convincing. Why should the jury be convinced if you don’t even sound convinced?
By the same token, avoid absolutes, unless a condition about which you are talking is truly a sure thing with no exceptions. Just remember that is rare.
You may wonder exactly how to express your opinion when you do not believe that something is 100% certain, but are confident it is or was true. Here is the answer. The strongest and most acceptable phraseology when expressing each of your opinions is to meet the criteria that you are stating the opinion “…to a reasonable degree of scientific certainty” or “…to a reasonable degree of medical certainty.”

Judd Robbins has been an internationally recognized expert witness since 1986 in the US and in the UK. In 2010, his book “Expert Witness Training” was published by Presentation Dynamics. Robbins has advanced degrees from UC Berkeley and the University of Michigan, has been an Information Systems manager and an Education Systems manager, and consults in both computer and legal issues. Learn more about Mr. Robbins and his Expert Witness Training materials at www.juddrobbins.com

Find More Expert Witness Articles