Escolar Documentos
Profissional Documentos
Cultura Documentos
KASEY KING, )
)
Plaintiffs, )
) Case No. 16-2108-JAR-GLR
v. )
)
LORI BOLTON FLEMING, et at. )
)
Defendants. )
)
practice centers primarily on the collection, analysis and production of e-mail on behalf of
responding parties. During my 18-year career, I have helped corporations respond to discovery
2. I received the e-mail message in question from Adebayo Ogunmeno, attorney for
Plaintiffs on Febru ary 17 , 20f 7 (MD5 hash of 02C89FCE88 20g10t237g1 40506401 485: SHA-
t hash of 692l87712ba36b9a3fab6e0l fl c09ff605 712d24). I then examined the file and found
that these software tools list Steve Phillips as having modified the file:
{00616718. DOCX;-1}
Affidavit of Jeffrey L. Johnson
implication of the Reports is that the email was forwarded from Fleming to this counsel, which is
standard practice in civil discovery" (Emphasis his; Document 71, at2). In my professional
opinion, the method Mr. Phillips describes (clients forwarding their e-mail to their counsel) is an
from the original sourcel. This is critical in e-Discovery because if the collection of an e-mail is
performed after the e-mail was transmitted through internet servers and then copied to another
machine, the properties of the file will be modified, making aproper and accurate forensic
Production Protocol". One of the metadata fields he lists as part of his standard data file given to
opposing parties is "Path". He describes Path as "E-mail: Original location of e-mail including
original file name." In addition, Brian Carrier, in his book "File System Forensic Analysis",
states that "Acquisition typically occurs during the System Preservation phase of an investigation
and is one of the most important phases in a digital forensic investigation because if data are not
collected from the system, they could be lost and therefore not recognized as evidence. Further,
if data are not collected properly, their value as legal evidence is diminished."
Affidavit of Jeffrey L. Johnson
6. The original e-mail is on Judge Bolton's computer (to the extent it has been
preserved), and must be collected directly from her computer for forensic tests and analysis to
DATED 76
ui, .-- day of Mrrd' 20t7.
Notary Public