report of forensic examination
Transcription
report of forensic examination
REPORT OF FORENSIC EXAMINATION Prepared By: Tami L. Loehrs LAW2000, Inc. 305 South Euclid, Suite 111 Tucson, Arizona 85719 520.219.6807 Prepared For: Steven Berne Case No: 2:08 CR-000033 08-CR-0626 Case Name: United States vs. Milton Scott Pruitt State of Georgia vs. Milton Scott Pruitt Date: 12/26/2008 CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 1 OF 58 PAGES EXAMINATION REPORT THIS IS A PRELIMINARY REPORT OF AN ONGOING FORENSIC EXAMINATION. THIS REPORT MAY BE SUPPLEMENTED AS NEW EVIDENCE IS UNCOVERED. SUMMARY OF FINDINGS • A review of the Panasonic Toughbook laptop computer identified as the Forsyth County computer issued to Milton Scott Pruitt (HDD01) revealed no pornographic images in allocated or unallocated space indicating no pornography was ever received or otherwise possessed on HDD01. In this regard, the evidence does not support the charges in Federal Count One that Milton Scott Pruitt knowingly received child pornography on his Forsyth County-issued computer. • With the exception of one Internet search term for “weird al ebony and ivory parody” on December 14, 2006, a review of HDD01 revealed nothing of an obvious personal nature and all activity appeared to be related to Pruitt’s work. With regard to March 15, 2007 specifically, there is no evidence that anything of a personal nature occurred on HDD01. In this regard, the evidence does not support the charges in State Count II that Milton Scott Pruitt willfully and intentionally violated the terms of his oath by using his county issued computer for his personal use. • I found evidence that the Remote to County (Public Hotspot) connection was setup as a shortcut on HDD01 and accessed from HDD01 on many occasions, including March 15, 2007. However, there is no evidence on HDD01 that anything of a personal nature occurred on this date and as such does not support the charges in State Count I that Milton Scott Pruitt willfully and intentionally violated the terms of his oath by using his county issued computer to access the wireless Internet account of Savis Communications for his personal use. Whether or not Pruitt’s access to the wireless Internet account was conducted without authority is beyond the scope of my examination. • Although there is evidence that a remote access connection was made to the Forsyth County Server from HDD01 on March 15, 2007, there is no evidence on HDD01 regarding the files accessed during that remote session. The only evidence I have seen in this regard is two screenshots of the My Recent Documents folder for MSPruitt allegedly taken from the Forsyth County Server. However, these two screenshots which purport to be the same document submitted in two separate matters do not match and are forensically unsound. In order to make any determinations with regard to files accessed during the remote session by MSPruitt on March 15, 2007, an independent forensic examination of the Forsyth County Server needs to be conducted. • I found evidence that multiple USB media storage devices were connected to HDD01 from 01/18/06 through 05/03/07. However, the charges in State Counts IV, V, VI and VII do not provide any identification of the media storage devices at issue such as a Hardware ID, Serial Number or Friendly Name. Therefore, it is impossible to conclude from reviewing the evidence whether any of the media storage devices referenced in Counts IV, V, VI or VII are, in fact, the same media storage devices connected to HDD01 or the media storage devices seized and forensically examined. • I did not find any images of child pornography in allocated space on the HP Pavilion desktop computer seized from Pruitt’s residence (HDD02). TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 2 OF 58 PAGES EXAMINATION REPORT • I found approximately 63 images of child pornography in unallocated space on HDD02, all of which appear to have been cached from Internet activity. As of the writing of this report, I have not found any evidence that Pruitt knowingly received, viewed or otherwise possessed any of the images of child pornography found in unallocated space. In this regard, the evidence does not support the charges in Federal Count Three that Milton Scott Pruitt knowingly possessed child pornography on his home computer. • There is evidence that multiple users had access to HDD02 including Jami Suddeth. In fact, there is evidence that Jami Suddeth was accessing HDD02 during several dates and times associated with deleted images of child pornography and images identified in SA Stanley’s report. TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 3 OF 58 PAGES EXAMINATION REPORT FACTS OF CASE The following are the facts of this case as they were set forth in the disclosure I reviewed: On the morning of April 16, 2007, an Information Technology employee for the County Government of Forsyth, Georgia, John-David Rusk (“Rusk”), noticed unusual Internet usage on the Forsyth County Server from the previous weekend of April 14 and15, 2007. Rusk researched remote access connections and identified several users who connected to the Server during the time in question, including MSPruitt. According to Rusk he opened the MSPruitt profile and “by accident I sorted to see the oldest files first and was shocked to see thumbnail images of a disturbing sexual nature accessed by the MSPruitt account on March 15, 2007.” Rusk immediately contacted Chief Hamrick to inquire if Pruitt was authorized to view such material. Rusk never completed his research into the unusually high Internet usage. On May 3, 2007, Special Agent Bobby Stanley (“SA Stanley”) received a request to investigate the remote access to the Forsyth County Server by Pruitt. SA Stanley met with Rusk and was provided with Rusk’s report and a screen shot of the My Recent Documents folder for MSPruitt. A review of the My Recent Documents folder for user MSPRUITT revealed 10 images of child pornography opened between 2:07 a.m. through 03:16 a.m. on March 15, 2007. Before concluding the interview, Rusk executed a RAS session and successfully copied a file from the remote computer to the local computer showing that data could be copied during a remote session. According to the event properties for March 15, 2007, at 2:01:10 a.m., MSPRUITT logged into the Remote Access Server utilizing IP address 216.91.246.162. This IP address was traced to the patrol zone of South Precinct for which Pruitt was assigned. (Investigative Summary Bates No. 163240.) In an Affidavit and Application for Search Warrant prepared by Special Agent Bobby Stanley, SA Stanley states that it appeared the only area Pruitt accessed were files belonging to Detective Roe and images associated with child pornography investigations. According to Stanley, Pruitt navigated his way to S:\Roe\2007\mar\07031338 Joe Mamma to access ten images of child pornography. Also according to SA Stanley in another document, images of child pornography were accessed by MSPruitt from S:\Roe\2005\2005 CFTS\may 05\0505434 State v. Jackson CP\Exhibit 5 Forensics\Possible CP Unallocated_file. During his investigation, SA Stanley was provided with a screen capture taken by the Forsyth County CID showing that the items in Roe’s folder show the “thumbnail” view by default. Accordingly, it was concluded that MSPruitt had to scroll through those images to open the ten files found in the My Recent Documents folder of the MSPruitt profile. On May 11, 2007 at approximately 11:30 p.m., a search warrant was executed on Pruitt’s Crown Victoria patrol car and items of evidentiary value were seized and recorded on GBI Evidence Receipt E-364895. Although the evidence receipt is difficult to read, it appears that the items seized included a hard drive, a PNY thumb drive and a Panasonic Toughbook laptop computer. (Investigative Summary, Bates No. 163249.) On May 14, 2007, Special Agent Bobby Stanley conducted a forensic examination of a Panasonic Pro Toughbook laptop computer and items of possible evidentiary value were found. A written report of the forensic examination prepared by SA Stanley was not found in the disclosure I reviewed. On May 16, 2007 at approximately 07:26 p.m., Pruitt was interviewed by SA Stanley at the Forsyth County Sheriff’s Office. Although SA Stanley summarized this interview in an investigative summary, a transcript of this interview was not found in the disclosure I reviewed. TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 4 OF 58 PAGES EXAMINATION REPORT On May 17, 2007 at 03:10 a.m., a search warrant was executed at the residence of Scott Pruitt and an HP Pavilion Desktop computer was forensically previewed and seized. In addition, SA Stanley conducted on-sight forensic previews of three thumb drives but found nothing of evidentiary value. From May 16, 2007 through February 13, 2008, SA Stanley conducted a forensic examination of a Western Digital 250gb hard dive bearing serial number WCANK2776793 (HDD02). The examination consisted of a search of the history files and examining htm and dhtml files. During the exam, SA Stanley determined that “Pruitt had inserted the missing thumb drive into his personal computer and viewed what appeared to be images of child pornography.” SA Stanley noted that the images matched the naming nomenclature of images located on the Forsyth County Sheriff’s office server that contained forensic files of child pornography investigations. A forensic report of the exam was saved as a file titled Home.rtf, however, I did not see this report in the disclosure I reviewed. (Investigative Summaries, Bates No. 163265, 174533, 174537, 174540 and 176099.) On or about August 20, 2008, an Indictment was filed in the United States District Court for the Northern District of Georgia, charging Milton Scott Pruitt with the following: Count One On or about March 15, 2007, Milton Scott Pruitt knowingly received on his Forsyth County-issued computer child pornography, in violation of Title 18, United States Code, Sections 2252A(1)(2)(A) and 2256(8)(A). Count Two Beginning on a date unknown and continuing through on or about May 16, 2007, Milton Scott Pruitt knowingly received on his Forsyth County-issued computer child pornography, in violation of Title 18, United States Code, Sections 2252A(1)(2)(A) and 2256(8)(A). Count Three Beginning on a date unknown and continuing through on or about May 16, 2007, Milton Scott Pruitt knowingly possessed on his home computer child pornography, in violation of Title 18, United States Code, Sections 2252A(1)(2)(A) and 2256(8)(A). On or about November 10, 2008, an Indictment was filed in the Forsyth Superior Court, charging Milton Scott Pruitt with the following: Count I Milton Scott Pruitt, with the offense of Violation of Oath by a Public Officer, did willfully and intentionally violate the terms of his oath on the 15th day of March by using his county issued computer to access the wireless Internet account of Savis Communications, without authority and with the intent to appropriate said Internet service for his personal use. Count II Milton Scott Pruitt, with the offense of Violation of Oath by a Public Officer, did willfully and intentionally violate the terms of his oath on the 15th day of March by using his county issued computer for his personal use. Count III Milton Scott Pruitt, with the offense of Violation of Oath by a Public Officer, did willfully and intentionally violate the terms of his oath on the 15th day of March by accessing files without authority. TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 5 OF 58 PAGES EXAMINATION REPORT Count IV Milton Scott Pruitt, with the offense of Violation of Oath by a Public Officer, did willfully and intentionally violate the terms of his oath between the 11th day of October, 2006 and the 17th day of May, 2007 by keeping for his personal use a media storage device seized in a criminal investigation. Count V Milton Scott Pruitt, with the offense of Violation of Oath by a Public Officer, did willfully and intentionally violate the terms of his oath on the 16th day of March by taking a county issued media storage device. Count VI Milton Scott Pruitt, with the offense of Theft by Taking, between the 11th day of October, 2006 and the 17th day of May, 2007, did appropriate a media storage device which was seized in a criminal investigation. Count VII Milton Scott Pruitt, with the offense of Theft by Taking, on the 16th day of March did appropriate a county issued media storage belonging to the Forsyth County Sheriff’s Office. Count VIII Milton Scott Pruitt, with the offense of Computer Theft, on the 16th day of March, did use a computer network without authority and with the intent to appropriate the wireless Internet access of Savis Communications Corporation. PURPOSE OF EXAMINATION Determine if the evidence supports the Federal charges that Milton Scott Pruitt knowingly received images of child pornography on his Forsyth County-issued laptop computer (HDD01). Determine if the evidence supports the Federal charges that Milton Scott Pruitt knowingly received and possessed images of child pornography on his home computer (HDD02). Determine if the evidence supports the State charges that Milton Scott Pruitt accessed the wireless Internet account of Savis Communications without authority with the intent to appropriate said service for his personal use; used his county issued computer for personal use; accessed files without authority; kept for his personal use a media storage device seized in a criminal investigation; and took a county issued media storage device belonging to the Forsyth County Sheriff’s Office. EVIDENCE EXAMINED Item No Description Notes HDD01 80gb hard drive from Panasonic Pro Toughbook laptop computer seized from Pruitt’s patrol car Original evidence remains in the custody of the Georgia Bureau of Investigation, forensic analysis was conducted on EnCase evidence TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 6 OF 58 PAGES EXAMINATION REPORT HDD02 Western Digital 250gb hard drive, S/N: WCANK2776793, from HP Pavilion desktop computer seized from Pruitt’s residence HDD03 512mb Thumb Drive seized from Pruitt’s Patrol car; S/N 0016-9E40 HDD04 1gb Thumb Drive seized from Pruitt’s residence; S/N E3BD-E7F7 files provided by Special Agent Bobby Stanley Original evidence remains in the custody of the Georgia Bureau of Investigation, forensic analysis was conducted on EnCase evidence files provided by Special Agent Bobby Stanley Original evidence remains in the custody of the Georgia Bureau of Investigation, forensic analysis was conducted on EnCase evidence files provided by Special Agent Bobby Stanley Original evidence remains in the custody of the Georgia Bureau of Investigation, forensic analysis was conducted on EnCase evidence files provided by Special Agent Bobby Stanley EXAMINATION DETAILS On December 1, 2008 at 08:30 a.m., I arrived at the Georgia Bureau of Investigation and met with SA Stanley. He provided me with a Dell XPS M1730 Laptop computer, with an Intel Core 2 Extreme 2.8ghz processor, 3.18gb of RAM and Windows XP Service Pack 2. In addition, SA Stanley provided me with two hard drives and a Tableau write blocker. The first hard drive was a Seagate 1000gb SATA Hard Drive, SN 90J0MG76, labeled Pruit Patrol PC. I attached the drive to the write blocker and viewed the contents which included EnCase evidence files identified as toughb.E01 through toughb.E60. The second hard drive was a Seagate 1000gb SATA, SN 9QJ1CRPV, labeled Pruit Home PC. This drive contained EnCase evidence files identified as image.E01 through image.EKN. Inasmuch as I could not connect both drives to the forensic laptop at the same time, and there was not enough time in three days to conduct two completely separate forensic exams, I copied the evidence files from the Panasonic Toughbook to the Dell XPS laptop after confirming that no child pornography existed on that piece of evidence. I then connected the second drive with the home PC to the write blocker and added evidence files for both drives to EnCase and FTK. I set FTK to index and carve image files from unallocated space and as FTK processed the evidence, I began my examination using EnCase. Neither of the evidence drives I received from SA Stanley contained images for the thumb drives seized pursuant to the evidence sheets I reviewed. I spoke with SA Stanley regarding the thumb drives and he explained that he had one of the thumb drives on location and would make me a forensic image and the other drive would have to be sent down from Forsyth County. Shortly thereafter, SA Stanley provided me with a blue thumb drive identified with white letters “PNY”. This drive contained one file titled PNY.E01. I added the PNY.E01 file to the EnCase case file and noted one device labeled Untitled. I bookmarked the specifications, folder structure and exported the file listing. I asked SAt Stanley about the origination of this drive and he stated that this was one of the drives seized from Pruitt’s Patrol car. He further stated that the Evidence sheet regarding this drive is in the disclosure materials. I located a Forsyth County Sheriff’s Office Property & Evidence sheet dated 10/11/06 identifying 1 512 PNY technologies Attache Jump Drive, Serial No 0528-AWK6990149. According to the evidence sheet, the location where this drive was found is identified as person. I concluded my exam for the day at 05:00 p.m. At that time, FTK was still processing the evidence and I let EnCase run various forensic processes to run overnight. On December 2, 2008 at 08:30 a.m., I arrived at the Georgia Bureau of Investigation and was escorted by SA Stanley to the forensics computer. I noted that FTK was still processing the evidence and EnCase had concluded its processes. I TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 7 OF 58 PAGES EXAMINATION REPORT continued conducting my exam until 05:00 p.m. at which time FTK was still processing the evidence and I allowed EnCase to run additional processes overnight. On December 3, 2008 at 08:30 a.m., I arrived at the Georgia Bureau of Investigation and was escorted by SA Stanley to the forensics computer. I noted that FTK was still processing the evidence and EnCase had concluded its processes. At approximately 9:30 a.m., SA Stanley provided me with an EnCase evidence file titled Pruitt.E01. I added this file to the EnCase case file and noted one device labeled untitled. I bookmarked the specifications, folder structure and exported the file listing. I asked SA Stanley about the origination of this drive and he stated that this thumb drive was seized from Pruitt’s residence and that he had not previously examined this drive. I located a Forsyth County Sheriff’s Office Property & Evidence sheet dated 05/17/07 identifying 1 Hitachi 1g jump drive, no serial number. According to the evidence sheet, the location where this drive was found is unreadable but appears to be living room. At approximately 02:30 p.m., I concluded my examination for the purpose of allowing time to export out evidentiary data for further examination at my forensics lab in Tucson and to catch my flight back to Tucson. FTK was still processing the evidence at this time so I canceled the process and closed FTK. All of the data I exported for further examination was contained in a folder under Desktop\Pruitt\Export. I showed SA Stanley the data folder I needed copied and connected my 160gb USB drive to the forensics laptop. SA Stanley re-enabled write access to the USB port on the forensic laptop and he copied the Export folder to my USB drive ensuring that no contraband was exported. Upon returning to Tucson, I continued my examination of the evidence using the data exported during my examination at the GBI in Atlanta, Ga. TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 8 OF 58 PAGES EXAMINATION REPORT PANASONIC PRO TOUGHBOOK LAPTOP COMPUTER (HDD01) System Specifications I ran the Initialize Case feature of EnCase and noted that a forensic image of HDD01 was created on 11/25/08 at 12:37 p.m. by Stilger. HDD01 has one partition identified as C, with a total capacity of 37.3gb and 8.4gb allocated to data. The operating system is Windows XP and was installed on 10/20/05 at 06:31 p.m. registered to Forsyth County Government. Other than the default accounts created by the Windows operating system, I noted one user account for MDT and one user account for MDTAdmin. The time zone was set to Eastern Standard time and I assured that EnCase and FTK were set accordingly. Name: ActualDate: TargetDate: FilePath: Case Number: Evidence Number: Examiner Name: Notes: Drive Type: File Integrity: Acquisition Hash: Verify Hash: EnCase Version: System Version: Fastbloced: Is Physical: Compression: Total Sectors: C Volume File System: Sectors per cluster: Total Sectors: Total Clusters: Free Clusters: Volume Name: Id: Serial Number: Full Serial Number: Driver Information: OS Info Product Name: Current Version: Registered Owner: Registered Organization: System Root: Current Build Number: Path Name: toughb 11/25/08 12:37:03PM 11/25/08 12:37:03PM F:\toughb.E01 bobby image toughb stilger DRIVEFIXED Verifying 524BBF39C73DF8DD7E9E0DD7C75277C0 6.11 Windows XP No Yes None 78140160 NTFS 8 78,124,032 9,765,503 7,561,734 Drive Type: Bytes per sector: Total Capacity: Unallocated: Allocated: Volume Offset: S-1-5-21-2709433111-2501898379-1022875441 B86C-6E5E 8B86C80B86C6E5E NTFS 3.1 Fixed 512 39,999,500,288 bytes (37.3GB) 30,972,862,464 bytes (28.8GB) 9,026,637,824 bytes (8.4GB) 63 Microsoft Windows XP 5.1 Forsyth County Government Forsyth County Government C:\WINDOWS 2600 C:\WINDOWS TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 9 OF 58 PAGES EXAMINATION REPORT Product ID: Last Service Pack: Product Key: VersionNumber: Source Path: Install Date: Last Shutdown Time: 55274-OEM-0011903-00116 Service Pack 2 User name: Full Name: Type of User: Account Description: Primary Group Number: Security Identifier: User belongs to group: MDT MDT Local User MDT User 513 S-1-5-21-2709433111-2501898379-1022875441-1006 Users Power Users Logon Script: Profile Path: Last Logon: Last Password Change: Last Incorrect Password Logon: User name: Full Name: Type of User: Account Description: Primary Group Number: Security Identifier: User belongs to group: Logon Script: Profile Path: Last Logon: Last Password Change: Last Incorrect Password Logon: c:\windows 10/20/05 06:31:58PM 05/04/07 05:01:53PM %SystemDrive%\Documents and Settings\MDT 05/04/07 03:52:23AM 10/20/05 06:58:43PM 05/04/07 03:52:18AM MDTAdmin Local User Built-in account for administering the computer/domain 513 S-1-5-21-2709433111-2501898379-1022875441-500 Administrators %SystemDrive%\Documents and Settings\Administrator 02/08/07 09:52:08PM 12/17/05 12:46:02AM 02/08/07 09:52:06PM TimeZone Info Current control set is 001 Default control set is 001 Failed control set is 000 LastKnownGood control set is 002 Standard time bias is -5:00 hours offset from GMT. StandardName: Eastern Standard Time Standard time is set to change the Standard bias by 0 minutes. Standard time is set to change on Sunday of the 5th week of October, at 02:00 hours. DaylightName: Eastern Daylight Time Daylight savings is set to change the Standard bias by 60 minutes. Daylight savings time is set to change on Sunday of the 1st week of April, at 02:00 hours. Active time bias is -4:00 hours offset from GMT. The current time setting is -4:00 hours offset from GMT. The offset must be either added or subtracted from GMT depending on the time zone location TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 10 OF 58 PAGES EXAMINATION REPORT Mapped Info Administrator Drive: RemotePath: UserName: ProviderName: ProviderType: ConnectionType: DeferFlags: Z \\172.27.128.8\Forsyth FTP ISDMS\administrator Microsoft Windows Network 131072 1 4 Last Accessed I sorted all files on HDD01 by Last Accessed date to confirm the original evidence was not accessed after it was seized. The evidence revealed that HDD01 was last accessed on 05/04/07 at 07:01 a.m. which is consistent with no access after the evidence was seized. IMAGES I reviewed all images in allocated space using the Gallery View in EnCase and noted a total of 3001 images, including default system images, cached Internet images and default images from software applications. I did not find any images of an obvious personal nature and no adult pornography or child pornography. I ran the File Mounter process in EnCase to open compound files such as the thumbs.db. The thumbs.db is a hidden file created by the Windows operating system that stores small thumbnails of images that are on the computer. Each folder containing images or videos will also have a corresponding thumbs.db file. When an image or video is deleted from the computer, the thumbnail of that image will remain in the thumbs.db. The thumbs.db files are compressed and must be “mounted” or uncompressed before the images inside those files can be seen. The thumbs.db files are commonly examined during a forensic analysis to determine if child pornography images existed on the computer at one time and were subsequently deleted. I did not find any images of an obvious personal nature and no adult pornography or child pornography in the thumbs.db files. I ran the file carver for all .jpg images in unallocated space and recovered 7910 images. I reviewed all 7910 images but did not find any images of an obvious personal nature and no adult pornography or child pornography. MULTIMEDIA FILES (VIDEOS) I sorted all files by file extension and looked for .avi, .mpeg, .mov, and .wmv files. I found several video files associated with software applications but nothing of a personal nature and nothing containing adult pornography or child pornography. FOLDER STRUCTURE I reviewed the entire Folder Structure of HDD01 for any user-defined files and folders indicative of adult pornography or child pornography but found none. To view the Folder Structure in its entirety, click here. I reviewed various locations in the Folder Structure that commonly contain items of evidentiary interest but I found nothing related to adult pornography or child pornography. Desktop The Desktop is the graphical user interface that appears when the computer is booted up. The Desktop consists of icons, windows, toolbars, folders and wallpaper and users commonly create shortcuts on the Desktop to files and folders TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 11 OF 58 PAGES EXAMINATION REPORT of interest for easy access. I located one folder titled Camera Photos with several non-pornography photographs, but I did not find anything of a personal nature and nothing related to adult pornography or child pornography. Cookies Cookies are text files sent by a server to a Web client used for authenticating, session tracking and maintaining specific information about users. These Cookies are automatically cached to the hard drive, named by the website address and stored in a folder under each user’s Windows profile. I reviewed the Cookies folder under the profile MDT and found 10 Cookies but nothing of a personal nature and nothing related to adult pornography or child pornography. My Documents My Documents is a default folder created under each user’s profile by the Windows operating system and is considered the standard location for storing user-defined files and folders. All of the folders in this location are default folders installed by Windows. I found three user-defined documents, two of which are related to Remote Desktop but I did not find anything of an obvious personal nature and nothing related to child pornography or adult pornography. Recent Folder When a file is opened on a computer running the Windows operating system, the file name of the opened file is saved with a .lnk file extension in the Recent Folder. These links contain dates and times when the files were opened (File Created), when they were opened again (Last Written) and the full path where the file is/was located. I reviewed the Recent folder and found 152 link files with activity from 10/20/05 through 05/03/07. The majority of the links are related to work documents on the desktop. I did not find any links to files of an obvious personal nature and nothing indicative of adult pornography or child pornography. There are links to ten image files opened on 03/26/07 at 2:06 p.m. from D:\Pics, identified as a Store’N’Go USB drive (highlighted in yellow below.) To view all details of the link files, click here. Although these files have the same naming nomenclature as files on the Forsyth County Server that allegedly contain images of child pornography, there is no evidence that the files identified in the Recent folder actually contain child pornography inasmuch as the actual files were not found on HDD01 and the Store’N’Go USB drive was not examined. If this file naming nomenclature is commonly used for other files on the Forsyth County Server of a non-pornographic nature, then it would be impossible to determine if these images were related to a legitimate investigation versus images of child pornography without examining the images on the Store’N’Go USB drive. Name Desktop.ini DATE.lnk PRINT STUFF (E).lnk world_of_warcraft_hunter_b.lnk 02-11-07 (2).lnk JANUARY 2007.lnk Click It or Ticket.lnk B Watch Click or Ticket Master JAN.lnk Click or Ticket FEB 07.lnk Removable Disk (E).lnk 02-12-07 North Precinct.lnk File Created 10/20/05 09:17:49AM 02/12/07 02:32:19AM 02/14/07 02:39:08PM 02/14/07 02:39:14PM 02/14/07 08:56:29AM 02/14/07 10:49:30PM 02/14/07 10:49:30PM 02/14/07 10:49:36PM 02/14/07 10:52:31PM 02/14/07 10:52:31PM 02/15/07 02:32:49AM TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 Last Written 12/19/05 01:33:45PM 02/12/07 02:32:27AM 02/14/07 02:39:14PM 02/14/07 02:39:14PM 02/14/07 03:36:35PM 02/14/07 10:49:35PM 02/14/07 10:49:36PM 02/14/07 10:49:36PM 02/14/07 10:52:31PM 02/14/07 10:52:31PM 02/15/07 02:33:05AM EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 12 OF 58 PAGES EXAMINATION REPORT 02-13-07 Passdown.lnk 02-14-07 (2).lnk Copper thefts and residential burglaries.lnk Defensive Tactics In-service.lnk Doc1__.lnk D-South Pass Down 02-13-07.lnk FW STINGER CLASS.lnk N SOARPassdown.lnk NORTH SOAR Passdown.lnk NOTES TO ONCOMING SHIFT 02-12-07 C-WATCH NORTH.lnk NOTES TO ONCOMING SHIFT 02-13-07 C-WATCH NORTH.lnk Passdown.lnk Seniority February 07.lnk South DShift 02-12-07.lnk South Pct 021207 Weekly Roster.lnk Watch Preference Plan February 07.lnk Badge Numbers ACTIVE-INACTIVE.lnk 02-15-07.lnk gcic wanted person located 07-02-00056.lnk WANTED PERSON LOCATED 07-02-00056.lnk 07-02-00056 WANTED PERSON LOCATED.lnk 02-16-07 Passdown.lnk 02-18-07 Passdown C-SHIFT SOUTH.lnk 02-19-07 (2).lnk 07b006U.lnk BOLO.lnk bolo.doc.lnk C Watch Passdown 02-17-07.lnk D-South Pass Down 02-16-07.lnk D-South Pass Down 02-17-07.lnk D-South Pass Down 02-18-07.lnk FW Suspecious Vehicle.lnk HEAT Posting21407_.lnk K-9 Posting021907.lnk North B Passdown.lnk NORTH SOAR PASSDOWN 02-16-07.lnk NORTH SOAR PASSDOWN 02-19-07.lnk NOTES TO ONCOMING SHIFT 02-16-07 C-WATCH 02/15/07 02:34:21AM 02/15/07 02:35:20AM 02/15/07 03:18:39AM 02/15/07 03:19:37AM 02/10/07 02:20:54AM 02/15/07 03:21:53AM 02/15/07 03:22:12AM 02/15/07 03:22:24AM 02/10/07 02:24:54AM 02/15/07 02:35:16AM 02/15/07 02:35:25AM 02/15/07 03:19:36AM 02/15/07 03:20:55AM 02/15/07 03:21:51AM 02/15/07 03:22:11AM 02/15/07 03:22:23AM 02/15/07 03:22:49AM 02/15/07 03:23:01AM 02/15/07 03:23:03AM 02/15/07 03:27:06AM 02/15/07 03:27:07AM 02/10/07 02:27:10AM 02/15/07 03:31:50AM 02/15/07 03:31:58AM 02/15/07 03:32:13AM 02/15/07 03:32:26AM 02/15/07 09:48:24AM 02/16/07 12:46:12AM 02/19/07 09:10:38PM 02/19/07 09:11:38PM 02/19/07 09:10:40PM 02/20/07 09:36:33PM 02/20/07 09:37:59PM 02/20/07 09:38:11PM 02/20/07 05:04:25AM 02/20/07 09:41:33PM 02/20/07 09:41:42PM 02/20/07 09:41:48PM 02/20/07 09:42:15PM 02/20/07 09:42:21PM 02/20/07 09:42:52PM 02/20/07 05:04:38AM 02/20/07 09:47:43PM 02/20/07 09:48:35PM 02/10/07 02:24:02AM 02/20/07 09:49:00PM 02/20/07 09:49:29PM 02/20/07 09:49:46PM 02/15/07 03:31:33AM 02/15/07 03:31:49AM 02/15/07 03:31:57AM 02/15/07 03:32:11AM 02/15/07 03:32:25AM 02/15/07 03:37:51AM 02/15/07 10:57:55AM 02/16/07 12:46:24AM 02/19/07 09:11:36PM 02/19/07 09:11:50PM 02/19/07 09:11:50PM 02/20/07 09:37:54PM 02/20/07 09:37:59PM 02/20/07 09:38:14PM 02/20/07 09:38:40PM 02/20/07 09:41:33PM 02/20/07 09:41:42PM 02/20/07 09:42:14PM 02/20/07 09:42:20PM 02/20/07 09:42:51PM 02/20/07 09:44:27PM 02/20/07 09:44:45PM 02/20/07 09:47:55PM 02/20/07 09:48:38PM 02/20/07 09:48:59PM 02/20/07 09:49:28PM 02/20/07 09:49:45PM 02/20/07 09:50:00PM TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 13 OF 58 PAGES EXAMINATION REPORT NORTH.lnk NOTES TO ONCOMING SHIFT 02-18-07 C-WATCH NORTH.lnk South Pct 021907 Weekly Roster.lnk Employee Ride Along.lnk Citizen Ride Along.lnk ride along.lnk Incident Report.lnk 02-19-07 North Precinct.lnk 02-19-07.lnk KELLER.lnk 02-26-07 Passdown.lnk 02-27-07 Passdown C-Shift South.lnk 02-28-07 (2).lnk 02272007.lnk BOLO-1068.lnk BOLO-1068A.lnk D-South Pass Down 02-26-07.lnk D-South Pass Down 02-27-07.lnk employeeconcerns.lnk employeeconcerns2.lnk Extra Patrol 20 beat.lnk Extra Patrol Request.lnk FW Bald Ridge Acres.lnk FW High Value Stolen Rims.lnk FW Hole in the Wall Burglary.lnk Grand Jury TRIAL DATES 2007.lnk NORTH SOAR PASSDOWN 2-26-07.lnk NORTH SOAR PASSDOWN 2-27-07.lnk NORTH SOAR PASSDOWN 2-28-07.lnk RE New Hospital Guard On-Call List.lnk 02-28-07PD.lnk A South PASSDOWN 02-28-07.lnk B Watch Passdown 02-28-07.lnk PASSDOWN 02-28-07.lnk FW No Driver's License.lnk 02-14-07.lnk 1-22-07 North Precinct.lnk 01-22-07.lnk Bald Ridge Acres Extra Patrol 30 beat.lnk 02/20/07 09:50:01PM 02/20/07 05:04:54AM 02/21/07 07:32:30AM 02/21/07 07:33:54AM 02/21/07 07:35:35AM 02/28/07 10:59:24PM 02/20/07 09:38:15PM 02/20/07 05:04:25AM 03/01/07 01:56:10AM 03/01/07 01:56:19AM 03/01/07 01:56:39AM 03/01/07 01:57:23AM 03/01/07 01:58:21AM 03/01/07 01:58:37AM 03/01/07 01:58:42AM 03/01/07 01:59:22AM 03/01/07 01:59:58AM 02/10/07 02:23:37AM 03/01/07 02:02:08AM 03/01/07 02:02:15AM 03/01/07 02:02:28AM 03/01/07 02:02:38AM 03/01/07 02:02:52AM 03/01/07 02:02:55AM 03/01/07 02:03:11AM 03/01/07 02:03:19AM 03/01/07 02:03:35AM 03/01/07 02:03:46AM 03/01/07 02:05:46AM 03/01/07 11:31:23PM 03/01/07 11:32:05PM 03/01/07 11:33:13PM 03/01/07 11:33:38PM 03/01/07 11:34:34PM 02/15/07 02:32:49AM 03/01/07 11:39:50PM 03/01/07 11:39:50PM 03/02/07 01:50:13AM TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 02/20/07 09:50:06PM 02/20/07 09:50:25PM 02/21/07 07:32:30AM 02/21/07 07:33:54AM 02/21/07 07:35:35AM 02/28/07 10:59:24PM 02/28/07 11:51:47PM 02/28/07 11:51:47PM 03/01/07 01:56:13AM 03/01/07 01:56:19AM 03/01/07 01:56:39AM 03/01/07 01:57:26AM 03/01/07 01:58:29AM 03/01/07 01:58:41AM 03/01/07 01:59:20AM 03/01/07 01:59:56AM 03/01/07 02:01:59AM 03/01/07 02:02:03AM 03/01/07 02:02:13AM 03/01/07 02:02:26AM 03/01/07 02:02:37AM 03/01/07 02:02:50AM 03/01/07 02:02:52AM 03/01/07 02:02:55AM 03/01/07 02:03:13AM 03/01/07 02:03:33AM 03/01/07 02:03:44AM 03/01/07 02:04:03AM 03/01/07 02:05:46AM 03/01/07 11:31:37PM 03/01/07 11:33:11PM 03/01/07 11:33:32PM 03/01/07 11:33:48PM 03/01/07 11:34:34PM 03/01/07 11:38:36PM 03/01/07 11:42:00PM 03/01/07 11:42:00PM 03/02/07 01:50:13AM EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 14 OF 58 PAGES EXAMINATION REPORT 02-28-07.lnk South Pct 030507 Weekly Roster.lnk 03-05-07.lnk Tidwell 1-46 movies.lnk !Start.lnk 0064.lnk 0079.lnk 0080.lnk 0102.lnk 0101.lnk 0111.lnk 0114.lnk 0132.lnk 0081.lnk 0029.lnk Pics.lnk Shift Deputies.lnk Quarterly Eval.lnk Quarterly Eval Devereaux.lnk Devereaux.lnk Bishop.lnk Bishop (2).lnk FCSO Employee Manual.revised-1-16-2007.lnk Mobile Video Master Log.lnk Mobile Video Recording Tape Tracking Log.lnk Tape Drop.lnk Award.lnk 04102007.lnk 3667_001.lnk 041107 Burglary Weekly.lnk 041107 Entering Autos Weekly.lnk 041107 Motor Veh Theft Weekly.lnk aprilphotoshoot.lnk FBI RFI.lnk FW Forsyth Co Website Noise ordinance.lnk Mar 07 Monthly.lnk New Microsoft Word Document.lnk Passdown Sheet 04-09-07.lnk PITTS BOLO 1.lnk PITTS BOLO 2.lnk 03/01/07 01:56:19AM 03/05/07 11:23:40PM 03/05/07 11:23:40PM 03/25/07 05:43:23AM 03/25/07 05:43:23AM 03/26/07 02:06:45PM 03/26/07 02:07:09PM 03/26/07 02:07:14PM 03/26/07 02:07:41PM 03/26/07 02:09:03PM 03/26/07 02:09:30PM 03/26/07 02:09:44PM 03/26/07 02:10:05PM 03/26/07 02:10:43PM 03/26/07 02:11:15PM 03/22/07 02:04:09PM 03/29/07 02:00:24AM 02/14/07 01:26:51PM 03/29/07 02:48:26AM 03/29/07 02:48:26AM 02/14/07 01:26:41PM 04/06/07 10:28:12PM 02/14/07 10:44:08AM 02/15/07 03:46:06AM 02/15/07 03:44:40AM 04/09/07 12:23:14AM 04/11/07 09:04:43PM 04/11/07 09:04:43PM 04/11/07 09:05:39PM 04/11/07 09:05:58PM 04/11/07 09:06:36PM 04/11/07 09:06:59PM 04/11/07 09:07:19PM 04/11/07 09:08:21PM 04/11/07 09:08:42PM 04/11/07 09:08:50PM 04/11/07 09:09:00PM 04/11/07 09:09:14PM 04/11/07 09:09:24PM 04/11/07 09:09:39PM TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 03/02/07 01:50:13AM 03/05/07 11:24:29PM 03/05/07 11:24:29PM 03/25/07 05:43:23AM 03/25/07 05:43:23AM 03/26/07 02:06:45PM 03/26/07 02:07:09PM 03/26/07 02:07:14PM 03/26/07 02:07:41PM 03/26/07 02:09:03PM 03/26/07 02:09:30PM 03/26/07 02:09:44PM 03/26/07 02:10:05PM 03/26/07 02:10:43PM 03/26/07 02:11:15PM 03/26/07 02:11:15PM 03/29/07 02:00:24AM 03/29/07 02:00:24AM 03/29/07 02:48:26AM 03/29/07 02:48:26AM 04/06/07 10:28:28PM 04/06/07 10:28:28PM 04/07/07 11:03:16PM 04/09/07 12:21:03AM 04/09/07 12:21:24AM 04/09/07 12:23:14AM 04/11/07 09:05:27PM 04/11/07 09:05:27PM 04/11/07 09:05:39PM 04/11/07 09:05:58PM 04/11/07 09:06:36PM 04/11/07 09:06:59PM 04/11/07 09:08:13PM 04/11/07 09:08:21PM 04/11/07 09:08:42PM 04/11/07 09:08:50PM 04/11/07 09:09:07PM 04/11/07 09:09:20PM 04/11/07 09:09:24PM 04/11/07 09:09:39PM EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 15 OF 58 PAGES EXAMINATION REPORT RE Roll Call Training Item.lnk Xgboys THE STAR LEDGER - The road to a tragic showdown at bank.lnk 04-11-07.lnk TROOPER LEGAL UPDATE MARCH 07.lnk 04-03-07 (2).lnk 04-03-07.lnk USB DISK (D).lnk 04-03-07 tanner.lnk 04-03-07 ROGERS.lnk 04-06-07 ROGERS.lnk DAILY ACTIVITY 4-12-07.lnk DAILY ACTIVITY 4-11-07.lnk DAILY ACTIVITY 4-8-07.lnk DAILY ACTIVITY LOG 04-12-07.lnk 04242007-2.lnk 04-25-07.lnk 3235_001.lnk Remote to County (Coutny Hotspot).lnk Clear On.lnk Forsyth County Map.lnk FCSO 01-00-000.lnk Supplemental Report.lnk 07-02-00695.lnk SGT PRUITT (D).lnk Remote to County (Public Hotspot).lnk 04/11/07 09:10:15PM 04/11/07 09:10:47PM 04/11/07 09:11:26PM 04/11/07 09:05:40PM 04/11/07 09:11:15PM 04/17/07 10:36:37PM 04/17/07 10:36:37PM 04/17/07 10:37:56PM 04/17/07 10:37:56PM 04/17/07 11:20:05PM 04/17/07 11:20:10PM 04/17/07 11:47:55PM 04/17/07 11:47:59PM 04/17/07 11:48:03PM 04/18/07 12:12:30AM 04/25/07 08:16:29PM 04/25/07 08:16:31PM 04/25/07 08:16:44PM 11/07/06 10:51:43AM 02/10/07 10:06:48PM 10/16/06 09:05:40AM 02/12/07 02:30:35AM 02/15/07 03:38:19AM 05/03/07 08:19:15PM 02/20/07 01:00:37AM 11/20/06 02:47:45PM 04/11/07 09:11:26PM 04/11/07 09:12:34PM 04/11/07 09:12:34PM 04/17/07 10:37:04PM 04/17/07 10:37:04PM 04/17/07 10:37:56PM 04/17/07 10:43:50PM 04/17/07 11:20:09PM 04/17/07 11:20:12PM 04/17/07 11:47:58PM 04/17/07 11:48:01PM 04/17/07 11:48:05PM 04/18/07 12:12:36AM 04/25/07 08:16:36PM 04/25/07 08:16:44PM 04/25/07 08:16:44PM 05/03/07 04:05:05AM 05/03/07 07:04:13AM 05/03/07 07:22:28PM 05/03/07 08:17:23PM 05/03/07 08:17:23PM 05/03/07 08:19:15PM 05/03/07 08:19:15PM 05/03/07 08:52:07PM PROGRAM FILES I reviewed the Program Files folder for software applications installed on HDD01 that may contain items of evidentiary value. All applications of evidentiary interest are discussed below. Real VNC RealVNC is a server and client application for the Virtual Network Computing (VNC) protocol to control another computer's screen remotely. RealVNC was installed on HDD01 on 12/18/06. My preliminary review did not reveal anything of evidentiary value with regard to the Real VNC application. Internet Explorer Internet Explorer is a graphical web browser developed by Microsoft and included as part of the Microsoft Windows operating system. A history of the user’s Internet usage, searches conducted, and files opened or saved using the browser software is contained in the Index.dat files. Using NetAnalysis, I reviewed the Index.dat files for websites visited and noted activity from 10/20/05 through 05/03/07 for users MDTAdmin and MDT. I reviewed all Internet activity and TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 16 OF 58 PAGES EXAMINATION REPORT noted the following websites were most often visited but I did not find anything of an obvious personal nature and no websites related to adult pornography or child pornography. Google.com Microsoft.com Fcnet Forsythco.com I reviewed all Search Engine Criteria and noted the following search terms and phrases used on Google.com, but I did not find any search terms related to adult pornography or child pornography. Although the search term “weird al ebony ivory parody” does not appear to be work related, the remaining search terms appear to be related to work and/or resolving issues with the computer. Last Visited 29/01/2007 15:37:29 Mon 29/01/2007 15:37:29 Mon 29/01/2007 15:37:28 Mon 14/12/2006 09:41:33 Thu 14/12/2006 09:37:01 Thu 14/12/2006 09:36:39 Thu 14/12/2006 09:36:17 Thu 28/11/2006 21:26:16 Tue 28/11/2006 21:25:30 Tue 28/11/2006 21:00:37 Tue 28/11/2006 21:00:20 Tue 28/11/2006 20:59:20 Tue 28/11/2006 20:56:47 Tue 24/10/2006 13:35:11 Tue 24/10/2006 13:34:52 Tue 24/10/2006 13:34:35 Tue 24/10/2006 13:30:51 Tue 24/10/2006 13:30:38 Tue 24/10/2006 13:17:38 Tue 24/10/2006 12:59:04 Tue Host www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com Search Engine Criteria RNAAPP RNAAPP RNAAPP weird al ebony ivory parody weird al ebony ivory weird al ebony ivory weird al ebony ivory Streets and trips problems Streets and trips conflicting with Norton Streets and trips conflicting with Norton Streets and trips running slow Streets and trips launching slow Streetsand trips launching slow .ink on all icons restore destop shortcuts system restore executable restoring a corupt desktop tweakui all desktop icons are .ink .ink Favorites Favorites are stored web page locations and their primary purpose is to easily catalog and access web pages that a user has visited and chosen to save. I reviewed the Favorites in Internet Explorer but I noted only the default favorites included with the Internet Explorer software. I did not find any user-created links and nothing of a personal nature and nothing related to adult pornography or child pornography. TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 17 OF 58 PAGES EXAMINATION REPORT Windows Media Player Windows Media Player is the default digital media player included with the Windows operating system and is used for organizing and playing digital music, video and image files. When a multimedia file is opened using the Windows Media Player, the name of the file is stored in the RecentFileList folder. I reviewed the RecentFileList but did not find anything of a personal nature and nothing related to adult pornography or child pornography. REGISTRY FILES The Windows registry is a directory which stores settings and options for the operating system for Microsoft Windows 32-bit versions, 64-bit versions, and Windows Mobile. It contains information and settings for all the hardware, operating system software, most non-operating system software, users, preferences of the computer, etc. I exported the registry files including USER.DAT, SYSTEM, SOFTWARE, SAM and SECURITY and reviewed them for evidentiary information using Registry Viewer. Storage Devices The registry maintains a record of hardware devices on the computer including removable storage media connected to the USB ports. I reviewed the registry key ControlSet002\Enum\USBSTOR and noted many different USB drives that have been connected to HDD01, including a USB device used by the Geek Squad, a computer repair service. The following is a summary of those devices found in the Registry. For a more detailed listing of these devices, click here. ControlSet002\Enum\USBSTOR\Disk&Ven_&Prod_Geek_Squad&Rev_0.3\200411005005915123f8&0 Last Written Time 11/16/2006 15:23:19 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\Disk________Geek_Squad______0.3_ FriendlyName REG_SZ Geek Squad USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Flash&Prod_Drive_SM_USB20&Rev_1000\AA04812700783&0 Last Written Time 11/21/2006 18:17:43 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskFlash___Drive_SM_USB20__1000 FriendlyName REG_SZ Flash Drive SM_USB20 USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Flash&Prod_Drive_SM_USB20&Rev_1100\AA04012700007427&0 Last Written Time 2/21/2007 2:40:19 UTC Name Type HardwareID REG_MULTI_SZ USBSTOR\DiskFlash___Drive_SM_USB20__1100 FriendlyName REG_SZ Data Flash Drive SM_USB20 USB Device TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 18 OF 58 PAGES EXAMINATION REPORT ControlSet002\Enum\USBSTOR\Disk&Ven_Flash&Prod_Drive_SM_USB20&Rev_1100\AA04012700009163&0 Last Written Time 4/18/2007 3:19:40 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskFlash___Drive_SM_USB20__1100 FriendlyName REG_SZ Flash Drive SM_USB20 USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Flash&Prod_Drive_SM_USB20&Rev_1100\AA04012700009292&0 Last Written Time 4/8/2007 4:00:56 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskFlash___Drive_SM_USB20__1100 FriendlyName REG_SZ Flash Drive SM_USB20 USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Flash&Prod_Drive_SM_USB20&Rev_1100\AA04012700010696&0 Last Written Time 3/22/2007 13:04:18 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskFlash___Drive_SM_USB20__1100 FriendlyName REG_SZ Flash Drive SM_USB20 USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Flash&Prod_Drive_SM_USB20&Rev_1100\AA04012700010774&0 Last Written Time 4/18/2007 4:12:03 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskFlash___Drive_SM_USB20__1100 FriendlyName REG_SZ Flash Drive SM_USB20 USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Flash&Prod_Drive_SM_USB20&Rev_1100\AA04012700014262&0 Last Written Time 4/12/2007 22:32:10 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskFlash___Drive_SM_USB20__1100 FriendlyName REG_SZ Flash Drive SM_USB20 USB Device TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 19 OF 58 PAGES EXAMINATION REPORT ControlSet002\Enum\USBSTOR\Disk&Ven_Flash&Prod_Drive_SM_USB20&Rev_3000\AA04012707912&0 Last Written Time 4/18/2007 2:37:42 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskFlash___Drive_SM_USB20__3000 FriendlyName REG_SZ Flash Drive SM_USB20 USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Flash&Prod_Drive_SM_USB20&Rev_3000\AA04012708119&0 Last Written Time 2/10/2007 1:04:03 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskFlash___Drive_SM_USB20__3000 FriendlyName REG_SZ Flash Drive SM_USB20 USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_IC25N020&Prod_ATCS04-0&Rev_\DEF10A6AC38F&0 Last Written Time 11/15/2006 21:05:40 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskIC25N020ATCS04-0____________ FriendlyName REG_SZ IC25N020 ATCS04-0 USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Kingston&Prod_DataTraveler_2.0&Rev_1.04\0DB185515021D952&0 Last Written Time 8/29/2006 18:38:40 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskKingstonDataTraveler_2.01.04 FriendlyName REG_SZ Kingston DataTraveler 2.0 USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_LEXAR&Prod_JUMPDRIVE&Rev_1.20\F251430221100&0 Last Written Time 2/14/2007 19:38:21 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskLEXAR___JUMPDRIVE_______1.20 FriendlyName REG_SZ LEXAR JUMPDRIVE USB Device TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 20 OF 58 PAGES EXAMINATION REPORT ControlSet002\Enum\USBSTOR\Disk&Ven_LEXAR&Prod_JUMPDRIVE_SECURE&Rev_1000\302AC201012824290105&0 Last Written Time 11/17/2006 19:20:44 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskLEXAR___JUMPDRIVE_SECURE1000 FriendlyName REG_SZ LEXAR JUMPDRIVE SECURE USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Memorex&Prod_TD_2C&Rev_1.00\286071516303A8C2&0 Last Written Time 1/18/2006 21:23:40 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskMemorex_TD_2C___________1.00 FriendlyName REG_SZ Memorex TD 2C USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Memorex&Prod_TD_2C&Rev_1.00\2860FB40F1B1CBC8&0 Last Written Time 11/15/2006 21:43:48 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskMemorex_TD_2C___________1.00 FriendlyName REG_SZ Memorex TD 2C USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Memorex&Prod_TD_Classic_003C&Rev_1.02\0C516B500380C8B9&0 Last Written Time 4/18/2007 3:47:16 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskMemorex_TD_Classic_003C_1.02 FriendlyName REG_SZ Memorex TD Classic 003C USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_PNY&Prod_USB_2.0_FD&Rev_PMAP\6E6C0B004D32&0 Last Written Time 5/3/2007 21:52:12 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskPNY_____USB_2.0_FD______PMAP FriendlyName REG_SZ PNY USB 2.0 FD USB Device TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 21 OF 58 PAGES EXAMINATION REPORT ControlSet002\Enum\USBSTOR\Disk&Ven_SanDisk&Prod_Cruzer_Micro&Rev_0.1\20041100401b4bd16b60&0 Last Written Time 8/29/2006 18:59:08 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskSanDisk_Cruzer_Micro____0.1_ FriendlyName REG_SZ SanDisk Cruzer Micro USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_SanDisk&Prod_Cruzer_Micro&Rev_0.2\200443184213a151adcf&0 Last Written Time 8/31/2006 17:48:59 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskSanDisk_Cruzer_Micro____0.2_ FriendlyName REG_SZ SanDisk Cruzer Micro USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_SIMPTECH&Prod_USB_DRIVE&Rev_1.12\0159245429290&0 Last Written Time 8/30/2006 20:26:54 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskSIMPTECHUSB_DRIVE_______1.12 FriendlyName REG_SZ SIMPTECH USB DRIVE USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_USB_2.0&Prod_Flash_Disk&Rev_1100\AA04012700007667&0 Last Written Time 3/22/2007 13:01:39 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskUSB_2.0_Flash_Disk______1100 FriendlyName REG_SZ USB 2.0 Flash Disk USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_VBTM&Prod_Store_'n'_Go&Rev_5.00\0B618860D06088B3&0 Last Written Time 3/26/2007 18:02:06 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskVBTM____Store_'n'_Go____5.00 FriendlyName REG_SZ VBTM Store 'n' Go USB Device TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 22 OF 58 PAGES EXAMINATION REPORT Typed URLs When a user manually types a website address (URL) into the Internet Explorer browser, that address is recorded in the registry key Software\Microsoft\Internet Explorer\TypedURLs. I reviewed the Typed URLs but did not find anything of a personal nature and nothing related to adult pornography or child pornography. Last Written Time 2/14/2007 14:59:21 UTC Name Type Data url1 REG_SZ http://www.yahoo.com/ url2 REG_SZ http://www.google.com/ url3 REG_SZ http://www.forsythco.com/www.google.com url4 REG_SZ http://fcnet/ url5 REG_SZ http://172.27.128.20/iuseragent/iuseragent.asmx url6 REG_SZ http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome OpenSave Most Recently Used When a file is opened and saved using the Open / Save As command in Windows, the name of that file is stored in the Windows registry under the key Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSaveMRU\*. I reviewed this registry key and noted the following items that had been opened and saved on HDD01 but I did not find anything of a personal nature and nothing related to adult pornography or child pornography. Last Written Time 1/31/2007 21:54:21 UTC Class Name Name Shell Type Data MRUList REG_SZ gfedcab g REG_SZ C:\Program Files\West Group\GALEH1WG.vid f REG_SZ e REG_SZ C:\Documents and Settings\MDT\Desktop\Forsyth County Map.est d REG_SZ C:\Documents and Settings\MDT\My Documents\Deputy Terminal Services.RDP c REG_SZ C:\emblem_fire1024.jpg a REG_SZ C:\badge4.jpg C:\Documents and Settings\MDT\Desktop\Remote to County (Coutny Hotspot).RDP TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 23 OF 58 PAGES EXAMINATION REPORT b REG_SZ C:\Documents and Settings\MDT\My Documents\Georgia, United States, North America.ptm TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 24 OF 58 PAGES EXAMINATION REPORT HP PAVILION DESKTOP COMPUTER (HDD02) System Specifications I ran the Initialize Case feature of EnCase and noted that a forensic image of HDD02 was created on 11/25/08 at 12:16 p.m. by Stilger. HDD02 has one partition identified as C, with a total capacity of 244.4gb and 60.2gb allocated to data. The operating system is Windows XP and was installed on 09/24/06 at 01:31 p.m. registered to Scott Pruitt. Other than the default accounts created by the Windows operating system, I noted one user account for HP_Administrator and one user account for Jami Suddeth. The time zone was set to Eastern Standard and I assured that EnCase and FTK were set accordingly. Name: ActualDate: TargetDate: FilePath: Case Number: Evidence Number: Examiner Name: Notes: Drive Type: File Integrity: Acquisition Hash: Verify Hash: EnCase Version: System Version: Fastbloced: Is Physical: Compression: Total Sectors: M Pruitt 11/25/08 12:16:34PM 11/25/08 12:16:34PM F:\image.E01 Bobby Image M Pruitt STILGER DRIVEFIXED Verifying 2553AE67B81C454E0B019AA61B3711FB 6.11 Windows XP No Yes None 488397168 C Volume File System: Sectors per cluster: Total Sectors: Total Clusters: Free Clusters: Volume Name: Id: Serial Number: Full Serial Number: NTFS Drive Type: 8 Bytes per sector: 488,392,002 Total Capacity: 58,819,981 Unallocated: 43,026,039 Allocated: HP_PAVILION Volume Offset: S-1-5-21-1223415986-456185491-3836011227 7FB0-E824 70B5BA297FB0E824 Driver Information: NTFS 3.1 OS Info Product Name: Current Version: Registered Owner: Registered Organization: System Root: Current Build Number: Fixed 512 240,926,642,176 bytes (224.4GB) 176,234,655,744 bytes (164.1GB) 64,691,986,432 bytes (60.2GB) 63 Microsoft Windows XP 5.1 Scott Pruitt C:\WINDOWS 2600 TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 25 OF 58 PAGES EXAMINATION REPORT Path Name: Product ID: Last Service Pack: Product Key: VersionNumber: Source Path: Install Date: Last Shutdown Time: C:\WINDOWS 76487-OEM-0011903-00803 Service Pack 2 User name: Full Name: Type of User: Account Description: Primary Group Number: Security Identifier: User belongs to group: HP_Administrator Scott Pruitt Local User Logon Script: Profile Path: Last Logon: Last Password Change: Last Incorrect Password Logon: User name: Full Name: Type of User: Account Description: Primary Group Number: Security Identifier: User belongs to group: Logon Script: Profile Path: Last Logon: Last Password Change: Last Incorrect Password Logon: 09/24/06 01:31:48PM 05/16/07 09:03:05AM 513 S-1-5-21-1223415986-456185491-3836011227-1008 Debugger Users Administrators %SystemDrive%\Documents and Settings\HP_Administrator 05/17/07 12:16:46AM 09/25/06 06:34:48AM 05/12/07 06:47:08AM Jami Suddeth Jami Suddeth Local User 513 S-1-5-21-1223415986-456185491-3836011227-1009 Users %SystemDrive%\Documents and Settings\Jami Suddeth 12/14/06 12:33:50AM 12/14/06 12:32:57AM 12/14/06 12:33:44AM TimeZone Info Current control set is 003 Default control set is 003 Failed control set is 001 LastKnownGood control set is 002 Standard time bias is -5:00 hours offset from GMT. StandardName: Eastern Standard Time Standard time is set to change the Standard bias by 0 minutes. Standard time is set to change on Sunday of the 1st week of November, at 02:00 hours. DaylightName: Eastern Daylight Time Daylight savings is set to change the Standard bias by 60 minutes. Daylight savings time is set to change on Sunday of the 2nd week of March, at 02:00 hours. Active time bias is -4:00 hours offset from GMT. TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 26 OF 58 PAGES EXAMINATION REPORT Last Accessed I sorted all files by Last Accessed date to confirm the original evidence was not accessed after it was seized. The evidence revealed that HDD02 was last accessed on 05/16/07 at 04:16 p.m. which is consistent with no access after the evidence was seized. However, the last logon time recorded by the operating system indicates a logon of 05/17/06 at 12:16 a.m. IMAGES I reviewed all images in allocated space using the Gallery View in EnCase and noted a total of 72,941 images, including default system images, cached Internet images, default images from software applications and personal photos of family and/or friends. I did not find any images of child pornography in allocated space. I ran the File Mounter process in EnCase to open compound files such as the thumbs.db. The thumbs.db is a hidden file created by the Windows operating system that stores small thumbnails of images that are on the computer. Each folder containing images or videos will also have a corresponding thumbs.db file. When an image or video is deleted from the computer, the thumbnail of that image will remain in the thumbs.db. The thumbs.db files are compressed and must be “mounted” or uncompressed before the images inside those files can be seen. The thumbs.db files are commonly examined during a forensic analysis to determine if child pornography images existed on the computer at one time and were subsequently deleted. After mounting the thumbs.db, I noted 78,500 total images but I did not find any images of child pornography. I ran the file carver process for all .jpg images in unallocated space and recovered 6010 images. I reviewed all 6010 images and bookmarked 63 images of possible child pornography found in unallocated space. All images were small thumbnails that were likely cached to the hard drive from websites accessed on the Internet based on their appearance and file sizes. 17 of the images recovered from unallocated space are thumbnail images of video files with the same maroon colored banner across the top of the image indicating these thumbnails likely came from the same website. I spoke with SA Stanley and requested that he show me the images of child pornography that resided on the Forsyth County Server escorted me to his lab to show me the images that resided on the Forsyth County Server at the location S:\Roe\2005\2005 CFTS\may 05\0505434 State v. Jackson CP\Exhibit 5 Forensics\Possible CP Unallocated_file and allegedly accessed by Pruitt. After visually observing these images and taking some handwritten notes, I compared those with the images found on HDD02 but did not find any matches. Subsequently, SA Stanley provided me with hash values for the images that resided on the Forsyth County Server at the location S:\Roe\2005\2005 CFTS\may 05\0505434 State v. Jackson CP\Exhibit 5 Forensics\Possible CP Unallocated_files. I ran a search for those hash values on HDD02 but did not find any matches. MULTIMEDIA FILES (VIDEOS) I sorted all files by file extension and located several video files but nothing related to adult pornography or child pornography. Other than a couple of deleted videos with innocuous names such as 002.mpg, all videos appeared to be related to software applications. FOLDER STRUCTURE I reviewed the entire Folder Structure of HDD02 for any user-defined files and folders indicative of child pornography but found none. To view the Folder Structure in its entirety, click here. I reviewed various locations in the Folder Structure that commonly contain items of evidentiary interest but I found nothing related to child pornography. TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 27 OF 58 PAGES EXAMINATION REPORT Desktop The Desktop is the graphical user interface that appears when the computer is booted up. The Desktop consists of icons, windows, toolbars, folders and wallpaper and users commonly create shortcuts on the Desktop to files and folders of interest for easy access. I reviewed the Desktop shortcuts but I did not find anything related to child pornography. My Documents My Documents is a default folder created under each user’s profile by the Windows operating system and is considered the standard location for storing user-defined files and folders. I reviewed the My Documents folder but I did not find anything related to child pornography. To view the files in the My Documents folder, click here. Recent Folder When a file is opened on a computer running the Windows operating system, the file name of the opened file is saved with a .lnk file extension in the Recent Folder. These links include dates and times when the files were opened (File Created), when they were opened again (Last Written) and the full path where the file is/was located. I reviewed the Recent folder and found activity from 09/25/06 through 05/16/07 but nothing related to child pornography. To view the files in the Recent Folder, click here. PROGRAM FILES I reviewed the Program Files folder for software applications installed on EV1HD1 that may contain items of evidentiary value. All applications of evidentiary interest are discussed below. Internet Explorer Internet Explorer is a graphical web browser developed by Microsoft and included as part of the Microsoft Windows operating system. A history of the user’s Internet usage, searches conducted, and files opened or saved using the browser software is contained in the Index.dat files. Using NetAnalysis, I reviewed the Index.dat files for websites visited and noted activity from 03/28/06 through 05/16/07 for users Jami Suddeth and HP_Administrator and over 27,932 URL records. I noted websites related to adult pornography, teen pornography and child pornography. My analysis regarding this Internet activity and the identification of a computer user during this activity is ongoing and will be supplemented as additional evidence is discovered. I reviewed all Search Engine Criteria and noted the following search terms and phrases used on Google and Alta Vista. I did find searches indicative of child pornography and my analysis regarding this activity and the identification of a computer user during this activity is ongoing and will be supplemented as additional evidence is discovered. Last Visited 16/05/2007 14:14:05 Wed 16/05/2007 14:14:05 Wed 16/05/2007 14:12:54 Wed 16/05/2007 14:12:54 Wed 16/05/2007 14:12:45 Wed 16/05/2007 14:12:44 Wed 16/05/2007 12:50:42 Wed 16/05/2007 12:50:42 Wed Host www.altavista.com www.altavista.com search.yahoo.com search.yahoo.com search.yahoo.com search.yahoo.com www.altavista.com www.altavista.com Search Engine Criteria callaway golf clubs callaway golf clubs chess sales chess sales www.uschesssales.com www.uschesssales.com hot whois hot whois TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 28 OF 58 PAGES EXAMINATION REPORT 16/05/2007 12:50:18 Wed 16/05/2007 12:50:18 Wed 16/05/2007 12:09:23 Wed 16/05/2007 12:09:22 Wed 15/05/2007 22:01:01 Tue 15/05/2007 22:00:04 Tue 15/05/2007 22:00:03 Tue 15/05/2007 22:00:02 Tue 15/05/2007 22:00:02 Tue 15/05/2007 21:59:53 Tue 15/05/2007 21:59:53 Tue 15/05/2007 21:57:38 Tue 15/05/2007 21:57:37 Tue 15/05/2007 13:11:25 Tue 15/05/2007 13:11:24 Tue 15/05/2007 13:11:12 Tue 15/05/2007 13:11:12 Tue 25/04/2007 09:46:26 Wed 25/04/2007 09:45:25 Wed 25/04/2007 09:35:59 Wed 25/04/2007 09:35:56 Wed 25/04/2007 09:35:43 Wed 25/04/2007 09:34:59 Wed 25/04/2007 04:46:25 Wed 25/04/2007 04:45:24 Wed 25/04/2007 04:35:58 Wed 25/04/2007 04:35:55 Wed 25/04/2007 04:35:43 Wed 25/04/2007 04:34:59 Wed 20/04/2007 09:14:15 Fri 20/04/2007 07:49:38 Fri 20/04/2007 07:47:40 Fri 30/01/2007 12:19:32 Tue 30/01/2007 12:17:01 Tue 30/01/2007 12:16:51 Tue 11/01/2007 20:34:28 Thu 11/01/2007 20:34:17 Thu 11/01/2007 20:33:41 Thu 11/01/2007 20:31:10 Thu 11/01/2007 20:31:10 Thu www.altavista.com www.altavista.com www.altavista.com www.altavista.com search.yahoo.com www.altavista.com www.altavista.com www.altavista.com www.altavista.com www.altavista.com www.altavista.com www.altavista.com www.altavista.com www.altavista.com www.altavista.com www.altavista.com www.altavista.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com hot who is hot who is two car garqge plans two car garqge plans ttp://search.yahoo.com/search/age_restrict_redirect hair bow design guide hair bow design guide hair bow "design guide" hair bow "design guide" making hair bows making hair bows hair bow "how to guide" hair bow "how to guide" pearl vision pearl vision pearl vision lakeland plaza cumming ga pearl vision lakeland plaza cumming ga Chessmaster OPK check patch Chesmaster OPK check patch crafty download crfty download winboard version crafty winboard version crafty Chessmaster OPK check patch Chesmaster OPK check patch crafty download crfty download winboard version crafty winboard version crafty white county ga criminal records fulton county georgia court child support increase fulton county georgia interrogatories Legal response Legal responce disable file renaming in excel disable file renaming in excel disable file renaming in excel disable file renaming disable file renaming TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 29 OF 58 PAGES EXAMINATION REPORT 11/01/2007 20:29:59 Thu 11/01/2007 20:28:53 Thu 11/01/2007 20:28:40 Thu 11/01/2007 20:28:16 Thu 11/01/2007 17:51:13 Thu 08/01/2007 02:33:21 Mon 08/01/2007 02:10:09 Mon 07/01/2007 14:32:49 Sun 07/01/2007 14:31:13 Sun 07/01/2007 14:31:02 Sun 06/01/2007 06:21:10 Sat 06/01/2007 06:20:51 Sat 06/01/2007 06:20:47 Sat 06/01/2007 06:19:40 Sat 06/01/2007 06:19:13 Sat 06/01/2007 06:19:08 Sat 06/01/2007 06:19:00 Sat 06/01/2007 06:18:51 Sat 06/01/2007 06:18:32 Sat 06/01/2007 06:12:43 Sat 06/01/2007 06:12:32 Sat 06/01/2007 06:12:28 Sat 06/01/2007 06:11:32 Sat 06/01/2007 06:11:28 Sat 06/01/2007 06:11:22 Sat 06/01/2007 06:10:51 Sat 06/01/2007 06:10:46 Sat 06/01/2007 06:09:56 Sat 06/01/2007 06:09:07 Sat 06/01/2007 06:08:40 Sat 06/01/2007 06:08:28 Sat 06/01/2007 06:08:13 Sat 06/01/2007 06:07:54 Sat 06/01/2007 06:07:51 Sat 06/01/2007 06:07:48 Sat 06/01/2007 06:04:25 Sat 06/01/2007 06:02:01 Sat 06/01/2007 06:01:34 Sat 06/01/2007 05:59:33 Sat 06/01/2007 05:57:36 Sat www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.altavista.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com images.google.com disable file renaming stop file renaming file renaming Excel Visual Basic Code Excel Visual Basic Code avery label template 5160 Avery Label 5160 template don lee homes cumming ga don lee homes forsyth county ga don lee homes nude preteen nude preteen nude preteen nude preteen nude preteen nude preteen boy preteen boy gay boy gay boy nude boy nude boy nude boy nude boy nude boy nude boy nude boy nude boy inurl:"nude boy" inurl:"nude boy" inurl:"nude preteen" inurl:"nude lolita" inurl:"underage" inurl:"lolita" "nude" "underage" inurl:"lolita" "nude" "underage" inurl:"lolita" "nude" "underage" inurl:"lolita" "nude" "underage" inurl:"lolita" "nude" "underage" inurl:"lolita" "nude" "underage" inurl:"lolita" "nude" inurl:"lolita" "nude" TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 30 OF 58 PAGES EXAMINATION REPORT 06/01/2007 05:57:34 Sat 06/01/2007 05:57:34 Sat 06/01/2007 05:57:31 Sat 06/01/2007 05:49:32 Sat 06/01/2007 05:48:56 Sat 06/01/2007 05:28:10 Sat 06/01/2007 05:23:56 Sat 06/01/2007 05:10:29 Sat 06/01/2007 05:10:18 Sat 06/01/2007 05:10:10 Sat 06/01/2007 05:09:50 Sat 04/01/2007 14:25:59 Thu 03/01/2007 20:49:34 Wed 03/01/2007 20:49:33 Wed 03/01/2007 20:49:26 Wed 03/01/2007 20:49:21 Wed 03/01/2007 20:49:21 Wed 03/01/2007 20:49:21 Wed 02/01/2007 23:31:42 Tue 02/01/2007 23:30:52 Tue 02/01/2007 23:27:34 Tue 02/01/2007 23:26:52 Tue 02/01/2007 23:20:33 Tue 02/01/2007 23:18:42 Tue 27/12/2006 00:04:10 Wed 24/12/2006 22:06:58 Sun 24/12/2006 22:06:54 Sun 24/12/2006 22:03:08 Sun 24/12/2006 21:35:41 Sun 24/12/2006 21:35:05 Sun 24/12/2006 21:34:21 Sun 24/12/2006 21:33:01 Sun 24/12/2006 21:32:44 Sun 24/12/2006 21:32:28 Sun 24/12/2006 21:32:22 Sun 24/12/2006 21:32:18 Sun 24/12/2006 21:31:41 Sun 24/12/2006 21:31:30 Sun 24/12/2006 21:30:09 Sun 24/12/2006 20:45:36 Sun images.google.com images.google.com images.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com images.google.com images.google.com www.google.com news.google.com news.google.com news.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.altavista.com www.altavista.com www.altavista.com www.altavista.com www.altavista.com www.altavista.com www.altavista.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com images.google.com www.google.de inurl:"lolita" "nude" inurl:"lolita" "nude" inurl:"lolita" "nude" inurl:"lolita" "nude" inurl:"lolita" "nude" inurl:"lolita" "nude" inurl:"lolita" "nude" inurl:"lolita" filetype:".jpg" inurl:"lolita" filetype:.jpg inurl:"lolita" filetype:"jpg" inurl:"lolita" cumming cleaners saddam hanging saddam hanging saddam hanging saddam hanging saddam hanging saddam hanging APNIC lookup RIPE lookup ARIN lookup CRSNIC lookup whois lookup whois look up inurl:naked preteen preteen porno preteen porno preteen porno intitle:"nude preteen" -non intitle:"nude preteen" -non intitle:"nude preteen" nude preteen preteen nude nude preteen preteen preteen preteen preteen preteen inurl:newbbs biz TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 31 OF 58 PAGES EXAMINATION REPORT 24/12/2006 20:45:13 Sun 24/12/2006 20:45:00 Sun 24/12/2006 20:44:44 Sun 24/12/2006 20:44:30 Sun 24/12/2006 20:44:20 Sun 24/12/2006 20:42:34 Sun 24/12/2006 20:41:50 Sun 24/12/2006 20:36:59 Sun 24/12/2006 20:36:40 Sun 24/12/2006 20:33:58 Sun 24/12/2006 20:29:31 Sun 24/12/2006 20:28:27 Sun 24/12/2006 20:24:20 Sun 24/12/2006 20:21:20 Sun 24/12/2006 20:21:12 Sun 24/12/2006 20:17:23 Sun 24/12/2006 20:09:00 Sun 24/12/2006 20:08:25 Sun 24/12/2006 20:07:09 Sun 24/12/2006 20:06:50 Sun 09/12/2006 11:05:25 Sat 09/12/2006 06:05:25 Sat 07/12/2006 22:14:50 Thu 07/12/2006 17:14:49 Thu 05/12/2006 21:48:34 Tue 05/12/2006 21:47:20 Tue 05/12/2006 21:46:42 Tue 05/12/2006 21:46:05 Tue 05/12/2006 21:42:50 Tue 05/12/2006 21:41:11 Tue 05/12/2006 21:36:29 Tue 05/12/2006 16:48:33 Tue 05/12/2006 16:46:42 Tue 05/12/2006 16:46:04 Tue 05/12/2006 16:42:49 Tue 05/12/2006 16:41:11 Tue 05/12/2006 16:36:28 Tue 02/12/2006 14:17:16 Sat 02/12/2006 14:13:11 Sat 02/12/2006 14:11:24 Sat www.google.de www.google.de www.google.de www.google.de www.google.de www.google.de www.google.de www.google.de www.google.de www.google.de www.google.de www.google.de www.google.de www.google.de www.google.de www.google.de www.google.de www.google.de www.google.de www.google.de www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com inurl:newbbs intitle:newbbs intitle:newbbs preteen intitle:bbs preteen intitle:bbs preteen intitle:bbs preteen intitle:bbs preteen intitle:bbs intitle:nude preteen intitle:nude preteen intitle:nude preteen intitle:nude preteen preteen preteen preteen r=all allintitle: newbbs allintitle: newbbs intitle:"newbbs" intitle: newbbs movies 400 in cumming ga movies 400 in cumming ga m&ms.com m&ms.com the lords prayer the lords prayer sweet poems sweet poems health care poems healthcarepoems.com google earth the lords prayer sweet poems sweet poems health care poems healthcarepoems.com google earth old navy lakeshore mall in gainesville ga north point mall TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 32 OF 58 PAGES EXAMINATION REPORT 02/12/2006 14:11:09 Sat 02/12/2006 09:17:16 Sat 02/12/2006 09:13:11 Sat 02/12/2006 09:11:23 Sat 02/12/2006 09:11:08 Sat 30/11/2006 19:18:31 Thu 30/11/2006 19:17:34 Thu 30/11/2006 19:17:13 Thu 30/11/2006 19:16:08 Thu 30/11/2006 19:14:09 Thu 30/11/2006 19:13:03 Thu 30/11/2006 19:02:01 Thu 30/11/2006 17:48:58 Thu 30/11/2006 14:18:31 Thu 30/11/2006 14:17:33 Thu 30/11/2006 14:17:12 Thu 30/11/2006 14:16:08 Thu 30/11/2006 14:14:08 Thu 30/11/2006 14:13:03 Thu 30/11/2006 14:02:01 Thu 30/11/2006 12:48:58 Thu 29/11/2006 19:35:11 Wed 29/11/2006 19:26:32 Wed 29/11/2006 19:26:04 Wed 29/11/2006 14:35:10 Wed 29/11/2006 14:26:31 Wed 29/11/2006 14:26:04 Wed 24/11/2006 12:57:54 Fri 24/11/2006 12:37:24 Fri 24/11/2006 12:36:47 Fri 24/11/2006 12:36:38 Fri 24/11/2006 12:36:13 Fri 24/11/2006 12:35:24 Fri 24/11/2006 12:32:17 Fri 24/11/2006 12:30:16 Fri 24/11/2006 12:28:15 Fri 24/11/2006 12:28:10 Fri 24/11/2006 12:28:06 Fri 24/11/2006 12:28:00 Fri 24/11/2006 12:27:54 Fri www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com outlet mall in dawsonville old navy lakeshore mall in gainesville ga north point mall outlet mall in dawsonville thefoster'shouse.com jobs in cumming ga jobs in cumming ga jobs in cumming ga jos in cumming ga specialtyappliancey.com jobsshearch.com abcjobs.com thefoster'shouse.com jobs in cumming ga jobs in cumming ga jobs in cumming ga jos in cumming ga specialtyappliancey.com jobsshearch.com abcjobs.com truck body kits little acres day care in cumming ga day cares in cumming ga truck body kits little acres day care in cumming ga day cares in cumming ga mysapce.com applebees in cumming ga xtreme audio in cumming ga xtreme audio in cumming ga xtreme audio in cumming ga yellow pages xtreme audio in cumming ga mobile electronics and accessories in cumming ga keyless entry for automobile installation in cumming ga keyless entry for automobile installation in cumming ga keyless entry for automobile installation in cumming ga keyless entry for automobile installation in cumming ga keyless entry for automobile installation in cumming ga TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 33 OF 58 PAGES EXAMINATION REPORT 24/11/2006 12:27:41 Fri 24/11/2006 12:27:03 Fri 24/11/2006 12:26:48 Fri 24/11/2006 12:25:54 Fri 24/11/2006 12:25:40 Fri 24/11/2006 12:21:02 Fri 24/11/2006 12:20:54 Fri 24/11/2006 12:10:31 Fri 24/11/2006 12:09:05 Fri 24/11/2006 12:06:50 Fri 24/11/2006 12:06:29 Fri 24/11/2006 07:57:54 Fri 24/11/2006 07:37:23 Fri 24/11/2006 07:36:47 Fri 24/11/2006 07:36:37 Fri 24/11/2006 07:36:13 Fri 24/11/2006 07:35:24 Fri 24/11/2006 07:32:16 Fri 24/11/2006 07:30:16 Fri 24/11/2006 07:28:14 Fri 24/11/2006 07:28:10 Fri 24/11/2006 07:28:05 Fri 24/11/2006 07:28:00 Fri 24/11/2006 07:27:53 Fri 24/11/2006 07:27:41 Fri 24/11/2006 07:27:02 Fri 24/11/2006 07:26:48 Fri 24/11/2006 07:25:53 Fri 24/11/2006 07:25:40 Fri 24/11/2006 07:21:01 Fri 24/11/2006 07:17:41 Fri 24/11/2006 07:10:31 Fri 24/11/2006 07:06:50 Fri 24/11/2006 07:06:29 Fri 18/11/2006 13:55:13 Sat 03/11/2006 22:43:52 Fri 28/10/2006 23:01:14 Sat 14/10/2006 20:00:56 Sat www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com www.google.com search.yahoo.com search.yahoo.com www.google.com HPIA:2006-39 keyless entry for automobile installation in cumming ga keyless entry for automobile in cumming ga keyless entry for automobile cumming ga cummin cummin stereo cumming stereos in cumming ga keyless entries for trucks in cumming ga keyless entries for trucks in cumming ga keyless entries for trucks in cumming ga keyless entries for trucks in cumming ga mysapce.com applebees in cumming ga xtreme audio in cumming ga xtreme audio in cumming ga xtreme audio in cumming ga yellow pages xtreme audio in cumming ga mobile electronics and accessories in cumming ga keyless entry for automobile installation in cumming ga keyless entry for automobile installation in cumming ga keyless entry for automobile installation in cumming ga keyless entry for automobile installation in cumming ga keyless entry for automobile installation in cumming ga keyless entry for automobile installation in cumming ga keyless entry for automobile in cumming ga keyless entry for automobile cumming ga cummin cummin stereo cumming stereos in cumming ga keyless entries for trucks in cumming ga keyless entries for trucks in cumming ga keyless entries for trucks in cumming ga clark howard myspace face painting www.google.com TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 34 OF 58 PAGES EXAMINATION REPORT Favorites Favorites are stored web page locations and their primary purpose is to easily catalog and access web pages that a user has visited and chosen to save. I reviewed the Favorites in Internet Explorer but I did not find anything related to child pornography. Real Player Real Player is a cross platform media player that can play various multimedia formats including music and video files. When files are opened using the Real Player software, link (.lnk) files are created in the Real Player History file. I reviewed the Real Player history file and found 238 links to videos that were opened using Real Player from 10/15/06 through 12/14/06. Some of the link files had names indicative of adult pornography but I did not find anything related to child pornography. To view the Real Player History, click here. Windows Media Player Windows Media Player is the default digital media player included with the Windows operating system and is used for organizing and playing digital music, video and image files. When a multimedia file is opened using the Windows Media Player, the name of the file is stored in the RecentFileList folder. I reviewed the RecentFileList but did not find any files. REGISTRY FILES The Windows registry is a directory which stores settings and options for the operating system for Microsoft Windows 32-bit versions, 64-bit versions, and Windows Mobile. It contains information and settings for all the hardware, operating system software, most non-operating system software, users, preferences of the computer, etc. I exported the registry files including USER.DAT, SYSTEM, SOFTWARE, SAM and SECURITY and reviewed them for evidentiary information using Registry Viewer. Storage Devices The registry maintains a record of hardware devices on the computer including removable storage media connected to the USB ports. I reviewed the registry key ControlSet002\Enum\USBSTOR and noted many different USB drives that have been connected to HDD01. The following is a summary of those devices found in the Registry. For a more detailed listing of these devices, click here. ControlSet001\Enum\USBSTOR\Disk&Ven_&Prod_USB_DRIVE&Rev_1.12\1162700724893&0 Last Written Time 3/28/2006 23:59:32 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\Disk________USB_DRIVE_______1.12 FriendlyName REG_SZ USB DRIVE USB Device ControlSet001\Enum\USBSTOR\Disk&Ven_Brother&Prod_MFC-420CN&Rev_1.00\7&32e1dc08&0&BROK4F677441&0 Last Written Time 10/20/2006 4:16:02 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskBrother_MFC-420CN_______1.00 TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 35 OF 58 PAGES EXAMINATION REPORT FriendlyName REG_SZ Brother MFC-420CN USB Device ControlSet001\Enum\USBSTOR\Disk&Ven_Flash&Prod_Drive_SM_USB20&Rev_3000\AA04012707834&0 Last Written Time 10/8/2006 2:24:24 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskFlash___Drive_SM_USB20__3000 FriendlyName REG_SZ Flash Drive SM_USB20 USB Device ControlSet001\Enum\USBSTOR\Disk&Ven_FUJIFILM&Prod_USBDRIVEUNIT&Rev_1.00\592D3936325E06021174B320328B30&0 Last Written Time 10/15/2006 0:17:21 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskFUJIFILMUSB-DRIVEUNIT___1.00 FriendlyName REG_SZ FUJIFILM USB-DRIVEUNIT USB Device ControlSet001\Enum\USBSTOR\Disk&Ven_Generic&Prod_USB_CF_Reader&Rev_1.01\2004888&1 Last Written Time 10/22/2006 15:32:34 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskGeneric_USB_CF_Reader___1.01 FriendlyName REG_SZ Generic USB CF Reader USB Device ControlSet001\Enum\USBSTOR\Disk&Ven_Generic&Prod_USB_MS_Reader&Rev_1.03\2004888&3 Last Written Time 10/22/2006 15:32:34 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskGeneric_USB_MS_Reader___1.03 FriendlyName REG_SZ Generic USB MS Reader USB Device ControlSet001\Enum\USBSTOR\Disk&Ven_Generic&Prod_USB_SD_Reader&Rev_1.00\2004888&0 Last Written Time 10/22/2006 15:32:34 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskGeneric_USB_SD_Reader___1.00 FriendlyName REG_SZ Generic USB SD Reader USB Device TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 36 OF 58 PAGES EXAMINATION REPORT ControlSet001\Enum\USBSTOR\Disk&Ven_Generic&Prod_USB_SM_Reader&Rev_1.02\2004888&2 Last Written Time 10/22/2006 15:32:34 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskGeneric_USB_SM_Reader___1.02 FriendlyName REG_SZ Generic USB SM Reader USB Device ControlSet001\Enum\USBSTOR\Disk&Ven_USB_2.0&Prod_Flash_Disk&Rev_1100\AA04012700007667&0 Last Written Time 10/21/2006 23:15:38 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskUSB_2.0_Flash_Disk______1100 FriendlyName REG_SZ USB 2.0 Flash Disk USB Device ControlSet001\Enum\USBSTOR\SFloppy&Ven_MITSUMI&Prod_USB_FDD_____070M&Rev_3.01\6&2b63e84c&0 Last Written Time 10/22/2006 7:38:21 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\SFloppyMITSUMI_USB_FDD_____070M3.01 FriendlyName REG_SZ MITSUMI USB FDD 070M USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_&Prod_USB_DRIVE&Rev_1.12\1162700724893&0 Last Written Time 3/28/2006 23:59:32 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\Disk________USB_DRIVE_______1.12 FriendlyName REG_SZ USB DRIVE USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Apple&Prod_iPod&Rev_1.62\000A2700194EE41D&0 Last Written Time 1/17/2007 2:01:56 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskApple___iPod____________1.62 FriendlyName REG_SZ Apple iPod USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Apple&Prod_iPod&Rev_1.62\000A270019A49E0F&0 Last Written Time Name 4/13/2007 18:45:01 UTC Type Data TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 37 OF 58 PAGES EXAMINATION REPORT HardwareID REG_MULTI_SZ USBSTOR\DiskApple___iPod____________1.62 FriendlyName REG_SZ Apple iPod USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Brother&Prod_MFC-420CN&Rev_1.00\7&32e1dc08&0&BROK4F677441&0 Last Written Time 5/15/2007 15:18:37 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskBrother_MFC-420CN_______1.00 FriendlyName REG_SZ Brother MFC-420CN USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Creative&Prod_NOMAD_MUVO&Rev_0100\0000210429E28116&0 Last Written Time 1/7/2007 16:11:25 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskCreativeNOMAD_MUVO______0100 FriendlyName REG_SZ Creative NOMAD MUVO USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Flash&Prod_Drive_SM_USB20&Rev_1100\AA04012700007925&0 Last Written Time 1/31/2007 22:35:26 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskFlash___Drive_SM_USB20__1100 FriendlyName REG_SZ Flash Drive SM_USB20 USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Flash&Prod_Drive_SM_USB20&Rev_3000\AA04012707834&0 Last Written Time 2/26/2007 14:44:03 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskFlash___Drive_SM_USB20__3000 FriendlyName REG_SZ Flash Drive SM_USB20 USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_FUJIFILM&Prod_USBDRIVEUNIT&Rev_1.00\592D3936325E06021174B320328B30&0 Last Written Time 10/15/2006 0:17:21 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskFUJIFILMUSB-DRIVEUNIT___1.00 FriendlyName REG_SZ FUJIFILM USB-DRIVEUNIT USB Device TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 38 OF 58 PAGES EXAMINATION REPORT ControlSet002\Enum\USBSTOR\Disk&Ven_Generic&Prod_USB_CF_Reader&Rev_1.01\2004888&1 Last Written Time 5/16/2007 14:31:15 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskGeneric_USB_CF_Reader___1.01 FriendlyName REG_SZ Generic USB CF Reader USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Generic&Prod_USB_MS_Reader&Rev_1.03\2004888&3 Last Written Time 5/16/2007 14:31:15 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskGeneric_USB_MS_Reader___1.03 FriendlyName REG_SZ Generic USB MS Reader USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Generic&Prod_USB_SD_Reader&Rev_1.00\2004888&0 Last Written Time 5/16/2007 14:31:15 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskGeneric_USB_SD_Reader___1.00 FriendlyName REG_SZ Generic USB SD Reader USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_Generic&Prod_USB_SM_Reader&Rev_1.02\2004888&2 Last Written Time 5/16/2007 14:31:15 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskGeneric_USB_SM_Reader___1.02 FriendlyName REG_SZ Generic USB SM Reader USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_LEXAR&Prod_JD_CLASSIC&Rev_3000\BDED2510112913250806&0 Last Written Time 4/19/2007 12:52:30 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskLEXAR___JD_CLASSIC______3000 FriendlyName REG_SZ LEXAR JD CLASSIC USB Device TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 39 OF 58 PAGES EXAMINATION REPORT ControlSet002\Enum\USBSTOR\Disk&Ven_LEXAR&Prod_JUMPDRIVE&Rev_1.20\F251430221100&0 Last Written Time 5/7/2007 20:06:35 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskLEXAR___JUMPDRIVE_______1.20 FriendlyName REG_SZ LEXAR JUMPDRIVE USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_OLYMPUS&Prod_DVR_DM_SERIES&Rev_1.00\6&4a610b4&0 Last Written Time 1/6/2007 9:25:06 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskOLYMPUS_DVR_DM_SERIES___1.00 FriendlyName REG_SZ OLYMPUS DVR DM SERIES USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_PNY&Prod_USB_2.0_FD&Rev_PMAP\6E6C0B004D32&0 Last Written Time 4/19/2007 12:28:03 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskPNY_____USB_2.0_FD______PMAP FriendlyName REG_SZ PNY USB 2.0 FD USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_USB_2.0&Prod_Flash_Disk&Rev_1.00\0603220149265&0 Last Written Time 1/12/2007 3:58:24 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskUSB_2.0_Flash_Disk______1.00 FriendlyName REG_SZ USB 2.0 Flash Disk USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_USB_2.0&Prod_Flash_Disk&Rev_1100\AA04012700007667&0 Last Written Time 5/7/2007 20:13:44 UTC Name Type Data HardwareID REG_MULTI_SZ USBSTOR\DiskUSB_2.0_Flash_Disk______1100 FriendlyName REG_SZ USB 2.0 Flash Disk USB Device ControlSet002\Enum\USBSTOR\Disk&Ven_VBTM&Prod_Store_'n'_Go&Rev_5.00\0B618860D06088B3&0 Last Written Time Name 5/10/2007 16:00:15 UTC Type Data TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 40 OF 58 PAGES EXAMINATION REPORT HardwareID REG_MULTI_SZ USBSTOR\DiskVBTM____Store_'n'_Go____5.00 FriendlyName REG_SZ VBTM Store 'n' Go USB Device Typed URLs When a user manually types a website address (URL) into the Internet Explorer browser, that address is recorded in the registry key Software\Microsoft\Internet Explorer\TypedURLs. I reviewed the Typed URLs but did not find anything related to adult pornography or child pornography. Last Written Time 5/16/2007 19:13:48 UTC Name Type Data url1 REG_SZ www.uschesssales.com url2 REG_SZ http://www.msn.com/ url3 REG_SZ http://www.ebay.com/ url4 REG_SZ http://www.eyemedvisioncare.com/ url5 REG_SZ http://www.wachovia.com/ url6 REG_SZ http://www.myspace.com/ url7 REG_SZ http://www.softlyher.com/ url8 REG_SZ http://www.google.com/ OpenSave Most Recently Used When a file is opened and saved using the Open / Save As command in Windows, the name of that file is stored in the Windows registry under the key Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSaveMRU\*. I reviewed this registry key and noted items that had been opened and saved on HDD02 but I did not find anything related to adult pornography or child pornography. The following is a sampling of those documents, for a complete list of all files in the OpenSaveMRU, click here. Last Written Time 5/16/2007 18:34:15 UTC Class Name Name Type Shell Data MRUList REG_SZ ihgfedcba i REG_SZ K:\New Folder\SM\1.jpg TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 41 OF 58 PAGES EXAMINATION REPORT h REG_SZ C:\Program Files\ChessBase\Engines\Inactive Engines\Chessmaster 10\Wb2Uci.exe g REG_SZ C:\Program Files\ChessBase\DeepFritz GM\Wb2Uci.zip f REG_SZ C:\Program Files\Ubisoft\Chessmaster 10th Edition\crafty1917p3.exe e REG_SZ C:\Program Files\ChessBase\Engines\Inactive Engines\CM10engine.exe d REG_SZ C:\Documents and Settings\HP_Administrator\My Documents\BRYAN WADE\Georgia_Offline_Child_Support_Calculator_2007v3.xls c REG_SZ C:\Documents and Settings\HP_Administrator\My Documents\BRYAN WADE\Open Record - White County SO.wps b REG_SZ F:\openrecord.wps a REG_SZ C:\Documents and Settings\HP_Administrator\My Documents\TurboTax\2006 Pruitt M Tax Return.tax Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSaveMRU\doc Last Written Time 2/4/2007 5:33:36 UTC Class Name Name Shell Type Data MRUList REG_SZ edcba c REG_SZ C:\Documents and Settings\HP_Administrator\My Documents\Downloads\Microsoft keys\Microsoft License Keys Ementor.doc b REG_SZ C:\Documents and Settings\HP_Administrator\Desktop\New Things to check out\Computer Checking Software\TEST PASSWORD.doc a REG_SZ C:\Documents and Settings\HP_Administrator\Desktop\Work Items\Blamk Forms\BLANK Investigative Notes.doc Recent Docs When a file is opened on a computer running the Windows operating system, the file name of the opened file is saved with a .lnk file extension in the Recent Folder and recorded in the Windows registry under the key Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs. I reviewed the Recent Docs but found nothing related to child pornography. I did find ten file names in the RecentDocs having the same nomenclature as the images of alleged child pornography on the Forsyth County Server. These files were opened on HDD02 on 05/16/07. However, the actual images do not reside on HDD02 and there is no evidence that these images contain child pornography. TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 42 OF 58 PAGES EXAMINATION REPORT Last Written Time 5/16/2007 19:03:06 UTC Name Type Data 34 Shortcut Target Name : Pics REG_BINARY Shortcut Name (ASCII) : Pics (2).lnk Shortcut Name (Unicode) : Pics (2).lnk 20 Shortcut Target Name : 0063.jpg REG_BINARY Shortcut Name (ASCII) : 0063.lnk Shortcut Name (Unicode) : 0063.lnk 46 Shortcut Target Name : 0071.jpg REG_BINARY Shortcut Name (ASCII) : 0071.lnk Shortcut Name (Unicode) : 0071.lnk 16 Shortcut Target Name : 0081.jpg REG_BINARY Shortcut Name (ASCII) : 0081.lnk Shortcut Name (Unicode) : 0081.lnk 22 Shortcut Target Name : 0112.jpg REG_BINARY Shortcut Name (ASCII) : 0112.lnk Shortcut Name (Unicode) : 0112.lnk 23 Shortcut Target Name : 0115.jpg REG_BINARY Shortcut Name (ASCII) : 0115.lnk Shortcut Name (Unicode) : 0115.lnk 9 Shortcut Target Name : 0125.jpg REG_BINARY Shortcut Name (ASCII) : 0125.lnk Shortcut Name (Unicode) : 0125.lnk 36 Shortcut Target Name : 0122.jpg REG_BINARY Shortcut Name (ASCII) : 0122.lnk Shortcut Name (Unicode) : 0122.lnk 15 Shortcut Target Name : 0127.jpg REG_BINARY Shortcut Name (ASCII) : 0127.lnk Shortcut Name (Unicode) : 0127.lnk 21 REG_BINARY Shortcut Target Name Shortcut Name (ASCII) : 0128.jpg : 0128.lnk TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 43 OF 58 PAGES EXAMINATION REPORT Shortcut Name (Unicode) : 0128.lnk 55 Shortcut Target Name : 0129.jpg REG_BINARY Shortcut Name (ASCII) : 0129.lnk Shortcut Name (Unicode) : 0129.lnk 10 Shortcut Target Name : Pics 2 REG_BINARY Shortcut Name (ASCII) : Pics 2.lnk Shortcut Name (Unicode) : Pics 2.lnk 53 Shortcut Target Name : SM REG_BINARY Shortcut Name (ASCII) : SM.lnk Shortcut Name (Unicode) : SM.lnk 52 Shortcut Target Name : Work Jump Drive REG_BINARY Shortcut Name (ASCII) : Work Jump Drive.lnk Shortcut Name (Unicode) : Work Jump Drive.lnk Virus Scan Using Mount Image Pro, I mounted HDD02 and scanned the evidence drive using Trend Micro PC-cillin Internet Security Version 14.60.1206, engine version 8.910.1002, Serial No. DLEM-0013-6525-8298-3803. No malware was detected. STANLEY’S REPORT OF IMAGES SA Stanley produced a report titled HP Images Report that includes approximately 78 image files of interest found on HDD02. The report includes the file names, Created dates, Last Accessed dates and the full path where each file was found. Four of the files were found in the Java Cache folder and the remaining images were deleted temporary Internet files. Inasmuch as the report does not contain the actual images, I located all 78 images on HDD02 and reviewed them for their content. In addition, I reviewed each of the images in SA Stanley’s report and noted the dates when the activity occurred, as follows: 11/05/06 12/10/06 12/11/06 01/17/07 05/16/07 12:06 PM 05:10 PM – 06:28 04:15 PM 10:06 AM 02:37 PM – 02:50 PM 11/05/06 SA Stanley’s report includes four images of interest created on 11/05/06 at 12:06 p.m. The following is an example of one of the images. None of the images noted on this date and time contain child pornography. Name File Created Last Accessed Full Path preteen_model_girl.jpg-16dd1af8-720492a5.jpg 11/05/06 12:06:51PM 01/16/07 10:42:21PM Pruitt\1\C\Documents and Settings\HP_Administrator\Application TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 44 OF 58 PAGES EXAMINATION REPORT Data\Sun\Java\Deployment\cache\javapi\v1.0\file\preteen_model_girl.jpg-16dd1af8-720492a5.jpg I was unable to identify any specific user activity during this date and time. It was not until 05:36 p.m. that the first user Identified activity begins with Jami Suddeth. 05:36 pm 06:19 pm LoveMuffins (Jami Suddeth) is editing her MySpace account. All Internet activity at this time occurs under the Jami Suddeth profile. MySpace activity ends 12/10/06 SA Stanley’s report includes three images of interest created on 12/10/06 between 05:21 and 06:28 p.m. and subsequently deleted. Only one of these images contains pornographic content. Image 1350598715_s[1].jpg is a very small thumbnail image that depicts a close-up of male and female genitals engaged in intercourse. Other than the lack of pubic hair on the female genitals, there are no identifying features to determine the age of either person in the image. The other two images are not pornographic in nature as evidenced below. All activity noted on this date from 05:21 p.m. to 06:28 p.m. indicates Jami Suddeth on MySpace. Name File Created Last Accessed Full Path 612796291_m[1].jpg 12/10/06 05:21:52PM 02/05/07 12:07:16PM Pruitt\1\C\Documents and Settings\Jami Suddeth\Local Settings\Temporary Internet Files\Content.IE5\QE2WQDBT\612796291_m[1].jpg Name File Created Last Accessed Full Path 1350598715_s[1].jpg 12/10/06 05:37:42PM 02/05/07 12:02:42PM Pruitt\1\C\Documents and Settings\Jami Suddeth\Local Settings\Temporary Internet Files\Content.IE5\3IQQ0SKX\1350598715_s[1].jpg Name prettyprincesspink444[1].gif File Created 12/10/06 06:28:17PM Last Accessed 02/05/07 12:07:30PM TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 45 OF 58 PAGES EXAMINATION REPORT Full Path Pruitt\1\C\Documents and Settings\Jami Suddeth\Local Settings\Temporary Internet Files\Content.IE5\QE2WQDBT\prettyprincesspink444[1].gif 12/11/06 SA Stanley’s report includes one image of interest created on 12/11/06 at 04:15 p.m. and subsequently deleted. This image is a very small thumbnail image that depicts a close-up of male and female genitals engaged in intercourse. Other than the lack of pubic hair on the female genitals, there are no identifying features to determine the age of either person in the image. All activity noted on this date indicates Jami Suddeth on MySpace. Name File Created Last Accessed Full Path 70244rdc9jm4y6t[1].jpg 12/11/06 04:15:34PM 02/05/07 12:02:25PM Pruitt\1\C\Documents and Settings\Jami Suddeth\Local Settings\Temporary Internet Files\Content.IE5\2OUFDUI5\70244rdc9jm4y6t[1].jpg 01/17/07 SA Stanley’s report includes one image of interest created on 01/17/07 at 10:06 a.m. This image is a very small thumbnail image that depicts a close-up of male and female genitals. Other than the lack of pubic hair on the female genitals, there are no identifying features to determine the age of either person in the image. There is no user identifiable activity on the computer on this date and time. Name File Created Last Accessed Full Path tn_1112[1].jpg 01/17/07 10:06:36AM 01/17/07 10:06:37AM Pruitt\1\C\Documents and Settings\HP_Administrator\Local Settings\Temporary Internet Files\Content.IE5\2NHI22GP\tn_1112[1].jpg 05/16/07 SA Stanley’s report includes 67 images of interest created on 05/16/07 from 02:37 p.m. through 02:50 p.m. None of the images cached on this date contain child pornography. TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 46 OF 58 PAGES EXAMINATION REPORT 512MB THUMB DRIVE (HDD03) System Specifications HDD03 has a total capacity of 488.6mb with 136mb allocated to data. I bookmarked the Folder Structure and noted one folder in allocated space for Program Files, the remaining folders have been deleted. Because HDD03 is a storage device only, no operating system or user accounts exist. There are a total of 507 files and folders on HDD03 with created dates from 10/05/05 through 10/12/06. For a listing of all files on HDD03, click here. I did not find anything of a personal nature, no images of adult pornography or child pornography and nothing of evidentiary value on HDD03. Volume File System FAT16 Sectors per cluster 16 Total Sectors 1,001,184 Total Clusters 62,541 Free Clusters 45,134 Volume Name NO NAME OEM Version )o-H]IHC Heads 8 Unused Sectors 32 Sectors Per FAT 245 Drive Type Fixed Bytes per sector 512 Total Capacity 512,335,872 bytes (488.6MB) Unallocated 369,737,728 bytes (352.6MB) Allocated 142,598,144 bytes (136MB) Volume Offset 32 Serial Number 0016-9E40 Sectors Per Track 32 Number of FATs 2 Boot Sectors 1 └─ C ├─ Program Files │ └─ StaffCom │ └─ DB _B ├─ ├─ FL WC forms ├─ Forms瀀 ├─ ├─ ├─ └─ Ga WC Forms New Folder _B _B TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 47 OF 58 PAGES EXAMINATION REPORT 1GB THUMB DRIVE (HDD04) System Specifications HDD04 has a total capacity of 984mb. I bookmarked the Folder Structure and noted many user defined files and folders that all appeared to be work related. The following is an example of the Folder Structure. To view the Folder Structure in its entirety, click here. Because HDD04 is a storage device only, no operating system or user accounts exist. There are a total of 1959 files and folders on HDD04 with created dates from 12/26/06 through 05/03/07. For a listing of all files on HDD03, click here. I did not find anything of a personal nature, no images of adult pornography or child pornography and nothing of evidentiary value on HDD04. Total Size 1,031,798,784 bytes (984MB) Total Sectors 2,015,232 Disk Signature 00000000 Partitions Code Type 0E Start Sector Total Sectors Size LBA DOS 0 2,015,232 984MB └─ untitled └─ C ├─ ACCIDENT DIAGRAMS ├─ Bishop ├─ Camera Photos │ └─ Simmons 04-09-07 ├─ Click It or Ticket ├─ Daily Activity │ ├─ 2007 Daily Activity Reports │ │ ├─ 03 March 2007 TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 48 OF 58 PAGES EXAMINATION REPORT CONCLUSIONS On the morning of April 16, 2007, John-David Rusk noticed unusual Internet usage on the Forsyth County Server from the previous weekend of April 14-15, 2007 and proceeded to investigate the activity. Rusk identified MSPruitt as one of the users who remotely accessed the server that weekend. According to Rusk he opened the MSPruitt profile and “by accident I sorted to see the oldest files first and was shocked to see thumbnail images of a disturbing sexual nature accessed by the MSPruitt account on March 15, 2007.” A screen shot was taken of the My Recent Documents folder in the MSPruitt profile showing files accessed from March 15, 2007 through March 26, 2007. There are several notable and troubling discrepancies with the facts set forth in this regard. Rusk states that he accidentally sorted the oldest files first and was shocked to see thumbnail images of a disturbing sexual nature. According to the screen shot that was provided with the disclosure, there are 36 shortcuts with Modified Dates from 03/15/07 to 03/26/07. The scroll bar on the right side of the screen is at all the way at the top indicating there are many additional files after 03/26/07 but none before 03/15/07. According to this screen shot, MSPruitt never accessed a file during a remote session prior to 03/15/07. However, the Remote to County shortcut was setup on HDD01 on 12/21/05 and last accessed on 05/03/07 indicating the remote connection was used for a period of at least six months. Additionally, this screen shot does not show any additional information regarding the link files and Pruitt’s activities including the File Created, Last Written or Last Accessed dates. Although the author of the screen shots was not identified in the disclosure I reviewed, the screen shots were disclosed in both State and the Federal cases charging Mr. Pruitt with wrongdoing. I reviewed both documents and noted that the screen shot disclosed in the State matter differs from the screen shot disclosed in the Federal matter. Identified as Exhibit 2 in the State matter, the screen shot shows the image files in question as 0024, 0044, 0058, 0134, 0132, 0082, 0063 and 0071. Identified only with 34-0525-22-07 in the Federal case, the screen shot shows the image files in question as 0024, 0041, 0044, 0058, 0134, 0132, 0082, 0063 and 0071. The 0041 shortcut file is clearly missing from the screen shot disclosed in the State matter indicating that file was either deleted or added. Because computer forensic evidence is an exact science, verified with the use of hash values, this extraordinary flaw merits further investigation. Another discrepancy with the screen shots disclosed by the Government is the order in which the files appear. In one document, SA Stanley states that the images of child pornography were located in the Joe Mamma folder and in a different document SA Stanley indicates that the images of child pornography were located in the Possible CP Unallocated_Files folder. While the Joe Mamma folder appears in the My Recent Documents almost two hours prior to the first file being accessed, it seems unlikely that a user would open a folder during a remote session and then wait two hours to open the first file. According to the screen shot, the Jo Mamma folder is opened, but no files within that folder are opened. If the images were actually located in the Possible CP Unallocated_Files folder, common sense tells us that the folder should appear in the My Recent Documents moments before the first file is opened indicating the folder is opened and then a file is opened. However, this folder does not appear in the screen shot until 02:16 a.m., almost 9 minutes after the first file contained in the folder was allegedly opened. These questions surrounding these inconsistencies may be answered through an independent forensic exam of the Forsyth County Server, however, the questions can not be answered with the hard copy screen shots provided. With regard to Rusk’s statement that he “was shocked to see thumbnail images of a sexual nature”, the files in the My Recent Documents are link files or shortcuts. Shortcuts are simply links to files that have been opened, not the files themselves. As such, the icons for the shortcut files represent the software application associated with that file. For example, if I open a .PDF document, the shortcut in My Recent Documents would be an image of the Adobe Acrobat software application, as evidenced in the screenshot below: TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 49 OF 58 PAGES EXAMINATION REPORT Therefore, when Rusk viewed the My Recent Documents for the MSPruitt profile, he would have seen icons for software applications associated with the format of the files, not the content of the files themselves. Additionally, the names of the shortcuts in the My Recent Documents folder did not have naming conventions associated with child pornography and as such Rusk would not have known that shortcuts named “0024” and” 0041” actually contained child pornography. In the Affidavit of Search Warrant prepared by SA Stanley, he states that “it appeared that the only area Pruitt accessed, were files belonging to Det. Roe and images associated with child pornography investigations.” He goes on to state that Pruitt navigated his way to S:\Roe\207\mar\07031338 and also accessed images of child pornography in S:\Roe\2005\2005 CFTS\may 05\0505434 State v. Jackson CP\Exhibit 5 Forensics\Possible CP Unallocated_files. When I reviewed the screen shot of My Recent Documents, I noticed that other folders were accessed during the same date and time including FCSO Investigative Notes, CFI, and 0303239 State vs Stowe. These files do not appear on the surface to be related to Detective Roe or child pornography as stated by SA Stanley in his Affidavit. Again, I feel it would be imperative that a forensic examination be conducted on the Forsyth County Server to determine exactly what activity occurred during the early morning hours of March 15, 2007 that prompted this investigation. SA Stanley also states in his Affidavit for Search Warrant that he was provided with a screen capture by the Forsyth County CID showing that the items in Roe’s folder show the “thumbnail” view by default. Accordingly, it was concluded by SA Stanley that MSPruitt would have viewed that folder in the “thumbnails” view and would have had to scroll through TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 50 OF 58 PAGES EXAMINATION REPORT the images to open the ten files found in the My Recent Documents. What SA Stanley fails to mention is that the default folder view in Windows is not the “thumbnail” view and although a user can change the view to “Thumbnails”, “Icons”, “Details” or “List”, that choice is determined by the user profile, not the folder itself. Therefore, when CID created the screen shot with the “thumbnail” view, it is imperative to know which profile was being used at the time. If the MSPruitt profile was defaulted to the “List” view, the conclusions set forth by SA Stanley that Pruitt scrolled through the images would be false. The solution to all of these inconsistencies, missing information and unanswered questions may be found in an independent forensic exam conducted by the defense on the Forsyth County Server. PANASONIC PRO TOUGHBOOK LAPTOP COMPUTER (HDD01) A review of the Panasonic Toughbook laptop computer identified as the Forsyth County computer issued to Milton Scott Pruitt (HDD01) revealed no pornographic images in allocated or unallocated space indicating no pornography was ever received or otherwise possessed on HDD01. Further, a review of all user-defined files and folders, installed software applications, emails, Internet activity and registry files revealed nothing of a pornographic nature in allocated or unallocated space indicating nothing of a pornographic nature was ever received or otherwise possessed on HDD01. The allegations that Pruitt logged into the Forsyth County Server on March 15, 2007 and accessed 10 images of child pornography from HDD01 is supported solely by two screenshots of the My Recent Documents allegedly taken from the Forsyth County Server. The discrepancies with this evidence have already been discussed previously in my report and my conclusions in this regard remain the same. While it may or may not be true that Pruitt logged into the Forsyth County Server and accessed files of child pornography, I have not seen any forensic evidence of such. There are indirect allegations that Pruitt copied these images of child pornography during his remote session on the Server to a media storage device that was never recovered but subsequently accessed by Pruitt for the purpose of viewing the images again. SA Stanley surmises that file names with similar naming nomenclature must certainly be the same images of child pornography thereby insinuating that Pruitt must have copied these images from the Server. I did not see any information disclosed from the Forsyth County Server security event logs in this regard. These security event logs would contain detailed information with regard to the activities conducted by MSPruitt during his remote session on March 15, 2007 including the exact time he logged on, the exact time he logged off, and the amount of data that was transferred during that remote session, if any. Some of this information will only exist if various security options in the Windows operating software have been turned on as they are not turned on by default. I can only assume that these very important security features were surely enabled on a server that was hosting remote access connections while storing illegal images of child pornography. While the Adam Walsh Act prohibits me from examining a hard drive containing child pornography images in my lab for fear of possible dissemination; and hundreds of hours of computer forensics training by law enforcement has taught me that forensics computers can not be networked or connected to the Internet for fear of disseminating images of child pornography; and Court Protective Orders require that all evidence containing child pornography be locked securely in an evidence safe when not being examined; I am nonetheless astounded that Forsyth County stored illegal images of child pornography on a server that was not only networked and connected to the Internet, but was specifically setup to allow users to remotely access the server and all the data contained therein. The allegations that Pruitt copied images of child pornography to a removable storage media device during the remote session of March 15, 2007 can be answered simply by examining the Security Event logs of the Forsyth County Server. TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 51 OF 58 PAGES EXAMINATION REPORT The only evidence on HDD01 that SA Stanley is using to support the allegations that Pruitt copied images of child pornography during his remote session, exists in the form of 10 link files that appear in the Recent folder on 03/26/07. These link files have a similar naming nomenclature to the images on the server and were accessed from D:\Pics on a media storage device identified as a Store’N’Go. Inasmuch as I have not examined the Store’N’Go thumb drive nor do I have hash values for any of the files with which to compare, I can make no conclusions with regard to the images stored there and can not assume that a similar file name indicates similar content. If, for example, there are other images stored on the Forsyth County Server with the same nomenclature that are not child pornography, it would be possible that the images stored on the Store’N’Go thumb drive are related to one of Pruitt’s investigations and are wholly unrelated to child pornography. I found evidence that multiple USB media storage devices were connected to HDD01 from 01/18/06 through 05/03/07. However, the charges in State Counts IV, V, VI and VII do not provide any identification of the media storage devices at issue such as a Hardware ID, Serial Number or Friendly Name. Therefore, it is impossible to conclude from reviewing the evidence whether any of the media storage devices referenced in Counts IV, V, VI or VII are, in fact, the same media storage devices connected to HDD01 or the devices seized and forensically examined. With regard to the allegations that Pruitt used his county issued laptop for personal use, I found no evidence of this. With the exception of one Internet search term for “weird al ebony and ivory parody” on December 14, 2006, a review of HDD01 revealed nothing of an obvious personal nature and all activity appeared to be related to Pruitt’s work. With regard to March 15, 2007 specifically, there is no evidence that anything of a personal nature occurred on HDD01. HP PAVILION DESKTOP COMPUTER (HDD02) After Rusk’s findings on the Forsyth County Server, Pruitt’s home computer was forensically previewed and, according to the GBI Receipt for Property, seized on 05/16/07 at approximately 09:20 p.m. During my examination of the HP Pavilion desktop computer (HDD02), I sorted all files by Last Accessed date to confirm the original evidence was not accessed after it was seized and the evidence revealed that HDD02 was last accessed on 05/16/07 at 04:16 p.m. which is consistent with no access after the seizure. However, the last logon time recorded by the operating system indicates a logon of 05/17/06 at 12:16 a.m. As of the writing of this report, I have not yet determined why the last logon occurred after the last accessed dates of any of the files. At the very least, a logon would cause system files to be accessed thereby having the same last accessed dates and times as the logon. My examination in this regard continues and may be supplemented. After examining all files in allocated space on HDD02, I did not find any images of child pornography and no multimedia files containing child pornography. Upon completing a forensic process that carves image files from unallocated space, I did find images of child pornography in unallocated space on HDD02. All of the images I found were very small thumbnails that likely originated from websites accessed on the Internet based on their appearance and file sizes. In fact, 17 of the images recovered from unallocated space are thumbnail images of video files with identical maroon colored banners across the top of each image indicating these thumbnails likely came from the same website. Because one website can cache hundreds of images to a user’s computer in a matter of seconds, it is possible that all of the images of child pornography found in unallocated space were cached from one website on the same date and time. Because no metadata can be retrieved from images in unallocated space, it is impossible to say when the images came to be on the computer, how long they were on the computer, who or what may have caused them to be on the computer, and whether or not they were viewed, saved or otherwise distributed. Without this information, it is impossible to determine the user who may have been at the keyboard when the images were cached to the hard drive and thereby impossible to say if Pruitt knowingly possessed these images. TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 52 OF 58 PAGES EXAMINATION REPORT Further, my examination revealed multiple users had access to HDD02 including Jami Suddeth. When multiple users have access to a computer, it is impossible to say with 100% certainty who is responsible for any particular activity. In this case, Jami Suddeth had her own profile on HDD02 and spent a considerable amount of time on the Internet, specifically on MySpace. In fact, Jami Suddeth was logged onto HDD02 and her MySpace profile was being accessed during the very same date and time several images identified in SA Stanley’s report as child pornography were created on HDD02. It is important to note that simply because a user has his or her own profile on a computer, does not mean the only activity connected to that user will be found under that profile. My review of the Index.dat files indicates Internet activity related to adult pornography and some child pornography, however, I have not completed my examination of the evidence in this regard. Although I found search terms indicative of child pornography, many of them were conducted on German Google and include “bbs” in the term. This term in and of itself is odd in that “bbs” stands for bulletin boards which is old technology that is rarely used anymore. In addition, I found other foreign website activity that looks suspicious on the surface and warrants a more in-depth examination into the possible causes. Although it is possible for this activity to have been created by the user at the keyboard, I have seen similar activity on other child pornography cases that was proven to be caused by unwanted intrusions. This will require a more in-depth and timely investigation and I will supplement as additional evidence is uncovered. SA Stanley examined HDD02 and submitted a document named “HP Images Report” and titled “Pruitt Images” which I can only assume are images of concern since they were selected from thousands of images found on HDD02. This document contains the File Name, File Created dates, Last Accessed dates and Full Path for 78 files. Because the document does not contain the actual images, I located all 78 files on HDD02 and reviewed them for content. I found four of these images in the Java Cache folder but none contain child pornography. The remaining images were found in the temporary Internet files folder and had all been deleted, making them inaccessible to a computer user. Of the 78 images, I found three that may be considered child pornography. However, these images are close-up photos of female genitals with no pubic hair and no other distinguishing factors to identify the age of the female in the image. In addition, these images are very small thumbnails that were cached from a website as a result of Internet activity. As of the writing of this report, I have not identified an origin for these images. While I have identified Jami Suddeth as the computer user during the date and time that two of these images were created, I have been unable to identify a computer user during the date and time of the creation of the third image. My examination continues in this regard and will be supplemented as evidence is uncovered. Also during SA Stanley’s examination of HDD02, he determined that “Pruitt had inserted the missing thumb drive into his personal computer and viewed what appeared to be images of child pornography.” After my examination of the evidence, I find that these conclusions have no evidentiary basis. The Registry revealed many different USB thumb drives connected to HDD02, each identified by a hardware ID and a friendly name. Inasmuch as I have not seen any forensic evidence positively identifying the “missing thumb drive”, it is impossible for me or any other examiner to conclude that one of the thumb drives attached to HDD02 was the “missing thumb drive.” Further, SA Stanley concludes that Pruitt viewed “what appeared to be images of child pornography from the missing thumb drive. What SA Stanley refers to are ten link files that exist in the Recent folder with names such as 0063.jpg indicating these images were viewed on HDD02 on 05/16/07 and were stored on a thumb drive identified as a Store’N’Go . The files themselves do not exist on HDD02, they do not exist on any of the thumb drives I examined, and no hash values or file sizes are available for any of the files. The conclusion that these files contain child pornography is purely speculative with no forensic evidence to support such a conclusion. TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 53 OF 58 PAGES EXAMINATION REPORT 512MB THUMB DRIVE (HDD03) My examination of the 512mb thumb drive seized from Pruitt’s patrol car (HDD03) revealed nothing of an obvious personal nature, nothing of a pornographic nature and nothing of evidentiary value. 1GB THUMB DRIVE (HDD04) My examination of the 1gb thumb drive seized from Pruitt’s residence (HDD04) revealed nothing of an obvious personal nature, nothing of a pornographic nature and nothing of evidentiary value. TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 54 OF 58 PAGES EXAMINATION REPORT FORENSIC TOOLS USED Hardware Dell Latitude D630 Laptop Computer Intel Duo 2.2ghz 4gb RAM Software EnCase Forensic Version 6.8 Forensic Tool Kit Version 1.7 Registry Viewer 1.5 NetAnalysis 1.37 DISCLOSURE REVIEWED 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. Forsyth County Sheriff’s Office Property & Evidence sheet dated 10/11/06 re: PNY jumpdrive obtained from Angela Harper Discovery of Suspicious File Access Activity prepared by John-David Rusk (No Bates) Traffic Analysis for FastEthernet dated 04/26/07 (No Bates) Screen shot of C:\Documents and Settings\MSPruitt\Recent, no date, 03:11 p.m. (No Bates) Screen shot of C:\Documents and Settings\MSPruitt\Recent, no date, 05:03 p.m. (No Bates) GBI Waiver of Constitutional Rights to a Search Warrant of a Computer dated 05/10/07 Affidavit and Application for Search Warrant dated 05/11/07 (No Bates) Forsyth County Sheriff’s Office Property & Evidence sheet dated 05/11/07 GBI Receipt for Property dated 05/16/07 Forsyth County Sheriff’s Office Property & Evidence sheet dated 05/17/07 Search Warrant with handwritten corrected date of 05/17/07 (No Bates) Memo dated 05/17/07 from Captain Ron Freeman to Sgt. Richard Holcomb re: Internal Affairs Investigation Letter dated 05/17/07 to Sergeant Pruitt Order dated 05/23/07 Forsyth County Pre-Booking Form dated 05/23/07 Return of Service dated 05/23/07 Georgia Bureau of Investigation Investigative Summary dated 10/25/07 (Bates No. 163240) Georgia Bureau of Investigation Investigative Summary dated 10/25/07 (Bates No. 163244) Georgia Bureau of Investigation Investigative Summary dated 10/25/07 (Bates No. 163247) Georgia Bureau of Investigation Investigative Summary dated 10/25/07 (Bates No. 163248) Georgia Bureau of Investigation Investigative Summary dated 10/25/07 (Bates No. 163249) Georgia Bureau of Investigation Investigative Summary dated 10/25/07 (Bates No. 163262) Georgia Bureau of Investigation Investigative Summary dated 10/25/07 (Bates No. 163264) Georgia Bureau of Investigation Investigative Summary dated 10/25/07 (Bates No. 163265) Georgia Bureau of Investigation Investigative Summary dated 10/25/07 (Bates No. 163266) Georgia Bureau of Investigation Investigative Summary dated 10/25/07 (Bates No. 163267) Georgia Bureau of Investigation Investigative Summary dated 10/25/07 (Bates No. 163268) Georgia Bureau of Investigation Investigative Summary dated 10/25/07 (Bates No. 163269) Georgia Bureau of Investigation Investigative Summary dated 10/25/07 (Bates No. 163270) TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 55 OF 58 PAGES EXAMINATION REPORT 30. 31. 32. 33. 34. 35. 36. Georgia Bureau of Investigation Investigative Summary dated 01/31/08 (Bates No. 174533) Georgia Bureau of Investigation Investigative Summary dated 01/31/08 (Bates No. 174535) Georgia Bureau of Investigation Investigative Summary dated 01/31/08 (Bates No. 174537) Georgia Bureau of Investigation Investigative Summary dated 01/31/08 (Bates No. 174540) Georgia Bureau of Investigation Investigative Summary dated 02/13/08 (Bates No. 176099) Criminal Indictment dated August 20, 2008 General Bill of Indictment dated November 10, 2008 THIS REPORT CONTAINS HYPERLINKS TO SUPPORTING DOCUMENTATION INCLUDED ON THE ATTACHED CD-ROM. TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 56 OF 58 PAGES EXAMINATION REPORT GLOSSARY OF COMPUTER TERMS The following are common computer terms that may be used in this report: ALLOCATED SPACE: Allocated, or used, space is the area of a hard disk that holds files that are recognized by the operating system. This recognition is accomplished via a file allocation table of some type. Different types of operating systems use different types of allocation tables to keep track of files. COMPUTER EVIDENCE: Computer evidence is unique when compared with other forms of "documentary evidence." Unlike paper documentation, computer evidence is fragile, and a copy of a document stored in a computer file is Identical to the original. Thus, the legal "best evidence" rules change when it comes to the processing of computer evidence. COMPUTER FORENSICS: Computer Forensics deals with the preservation, identification, extraction, interpretation and documentation of computer evidence. Like any other forensic science, computer forensics involves the use of sophisticated technology, tools and procedures that must be followed to guarantee the accuracy of the results. Typically, computer forensic tools exist in the form of computer software and hardware write-blocking devices. Computer forensic examiners guarantee the accuracy of evidence processing results through the use of time tested procedures, and through the use of validated software tools from independent developers. FILE SLACK: Files are created in varying lengths depending on their contents. Windows based computers store files in fixed length blocks of data called clusters. Rarely do file sizes exactly match the size of one or more clusters perfectly. The data storage space that exists from the end of the file to the end of the last cluster assigned to the file is called "file slack". File slack potentially contains randomly selected bytes of data from computer memory. This happens because Windows normally writes in 512 byte blocks called sectors. Clusters are made up of blocks of sectors. If there is not enough data in the file to fill the last sector in a file, Windows makes up the difference by padding the remaining space with data from the memory buffers of the operating system. This randomly selected data from memory is called "RAM slack" because it comes from the memory of the computer. RAM slack can contain any information that may have been created, viewed, modified, downloaded or copied during work sessions that have occurred since the computer was last booted. Thus, if the computer has not been shut down for several days, the data stored in RAM slack can come from work sessions that occurred in the past. It should be noted that the newer versions of the Windows operating system zero out (write all zeros to) the RAM slack when a file is created. RAM slack pertains only to the last sector of a file. If there are additional, unused sectors between the last sector of the file and the end of the cluster, this is called "drive slack." Unlike RAM slack, which comes from memory, drive slack is made up of the data that was stored on the storage device prior to the file in question. Such data could contain remnants of previously deleted files. GB: A Gigabyte (GB) is a unit of computer memory or storage capacity equal to 1,073,741,824, or roughly one billion, bytes or characters. One gigabyte of storage space is the equivalent of 500,000 double-spaced pages of text. Hard disks capable of storing one-hundred gigabytes of data are now commonplace in desktop computers. Such storage devices could contain the equivalent of 50 million pages of data. INSTANT MESSAGING (IM) : IM is a text-based computer conversation over the Internet between two or more people who must be online at the same time, and who must be using the same instant messaging system. Current, popular IM systems are AOL's Instant Messenger (AIM), AOL's ICQ, Microsoft's MSN Messenger and Yahoo! Messenger. TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 57 OF 58 PAGES EXAMINATION REPORT JPG/JPEG: Joint Photographic Experts Group (JPEG or shortened to JPG) is a compressed format for storing bitmap images, and is one of the most common image formats used on the Internet. Other common image formats include ART, BMP, GIF(F), and TIF(F). KB: A kilobyte (KB) is a unit of computer memory or storage capacity equal to 1,024 bytes or characters. MB: A megabyte (MB) is a unit of computer memory or storage capacity equal to 1,048,576, or roughly one million, bytes or characters. METADATA: Metadata can be described simply as "data about data", or as a hidden level of information embedded in a file and maintained by the application that created the file. For example, Microsoft Word documents contain metadata showing the author of the file, the author's company, the number of file revisions, total editing time, and its own set of created, accessed and written dates. Most digital cameras save images with metadata embedded in the file showing the make and model of the camera, the date and time the photograph was taken, and the values of many of the camera's settings, such as exposure, flash, focal length, etc. OPERATING SYSTEM (OS): An OS is set of software programs used by a computer to manage its own resources, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral device~ such as disk drives and printers. Examples of operating systems are Windows 98, Windows XP, Mac OSX, Linux, and Unix. The OS is the core of the computer's operation, and application programs such as word processors run on top of it. PAGEFILE.SYS: The page file is a special file used by windows for holding temporary data which is swapped in and out of physical memory in order to provide a larger virtual memory set. In a Microsoft Windows NT, Windows 2000 and Windows XP environment, the file name is pagefile.sys and it is created during setup in the Root of the boot drive as a hidden file. It will not show up on an Explorer file listing unless you toggle off the "Hide system Files" option. PARALLEL ATA (PATA): For many years, Parallel ATA was the most common disk drive interface. Serial ATA has now become the preferred disk drive interface due to its faster speed, smaller connector, and longer cable length. When Parallel ATA was first introduced, it was an important advancement because it provided controller electronics on the drive itself, eliminating the need for a separate adaptor card. It was easy to configure and was relatively inexpensive compared to its traditional rival, SCSI. PATA uses 40-pin ribbon cables with a maximum length of 18 inches and a maximum transfer rate of 133 MB/second. PEER-TO-PEER (P2P) : P2P allows a sharing and delivery of user specified files among groups of people who are logged on to a file-sharing network. Napster was the first mainstream P2P software that enabled large scale file sharing. P2P networks are used to share multimedia files, such as music and movies. Typically, users place files they want to share with others in a 'shared" folder on their computer. To access a P2P network you need to download, install and run a P2P tool (P2P client software) . *The P2P software allows users to search for the types and names of files they are interested in downloading. Examples of current, popular P2P software are Kazaa and Grokster (FastTrack network), Limewire and BearShare (Gnutella network), eDonkey and Overnet (eDonkey/Overnet network), and BitTorrent (BitTorrent network). RAM: RAM, or Random Access Memory, is a type of memory that can be written to and read from in a nonlinear (random) manner. When a computer program or application is opened, it is transferred from the hard drive to RAM where it is more readily accessible. RAM enhances system performance because it can process requests from the TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT CASE NAME / NUMBER DETAILS United States vs. Milton Scott Pruit 2:08 CR-000033 PAGE 58 OF 58 PAGES EXAMINATION REPORT CPU much more quickly than the hard drive. The kind of RAM used in main memory on most computers is Dynamic RAM (DRAM) . DRAM stores data as electronic signals that must be constantly refreshed to keep them from dissipating. The data held in PAM is lost when the computer is turned off. UNALLOCATED SPACE/CLUSTERS: Unallocated space is the area of a hard disk that is not currently occupied by saved files, but is free to have data written to it. Unallocated file space can contain the entire or partial content of deleted files, deleted folders, and temporary files that were transparently created and deleted by computer applications and the operating system. With manual or automated methods, it is often possible to "unerase" deleted files and view the original content so long as the data area of the file has not been overwritten by other data, such as from a newer file. URL: Uniform Resource Locator (URL) is the address of a resource on the Internet. World Wide Web URLs begin with http:// TYPED EXAMINER’S NAME ORGANIZATION TAMI L. LOEHRS LAW2000, INC. SIGNATURE DATE 12/26/2008 EXHIBIT "\ ) .1 '----- "----' GEORGIA BUREAU OF INVESTIGATION HIGH TECHNOLOGY INVESTIGATIVE INVESTIGATIONS UNIT CASE SUMMARY 34·0525·22·07 On Wednesday, August 13, 2008, Special Agent Bobby Stanley conducted a forensic analysis of the hard drive of Milton Scott Pruitt's personal home desktop computer. The hard drive is described as a Western Digital 250 GB hard drive bearing serial number WCANK2776793. The examination was conducted utilizing Guidance Software Encase v6 forensic software and a Guidance Software Fastbloc write blocking device. During the, examination, Special Agent Stanley was able to locate numerous items of possible evidentiary value. The items of possible evidentiary value consisted of images of suspected child pornography which were located by conducting a search of the unallocated space of the harddrive. These images were subsequently saved and made a part of this case file titled Image Search Unallocated. The original files were stored for future analysis with a copy of the report saved to a CD and made a part of this case file. SPECIAL AGENT BOBBY T STANLEY, JR: 8/14/2008 ,Ks. bts: 10/9/2008 Page 1 of 1 211067 PROPERTY OF GBI Further dissemination is prohibited without written approval of a , GBI Supervisor EXHIBIT L [)