Monday, May 06, 2013

FTK, Experts and Daubert


“After a two-day bench trial,” Robert Springstead was convicted of distributing child pornography in violation of 18 U.S. Code §2252(a)(2), receiving child pornography in violation of 18 U.S. Code §2252(a)(2), possessing child pornography in violation of 18 U.S. Code §2252(a)(4)(B), receiving obscene visual representations of the sexual abuse of children in violation of 18 U.S. Code § 1466A(a)(1) and possessing obscene visual representations of the sexual abuse of children in violation of 18U.S. Code § 1466A(a)(1)U.S. v. Springstead, 2013 WL 1502036 (U.S. Court of Appeals for the 4th Circuit 2013).  The judge sentenced him to serve 204 months in prison, after which he appealed. Brief of the United States U.S. v. Springstead, 2012 WL 3999953.

The case began on November 6, 2010, when an agent from

[Immigration and Customs Enforcement's Homeland Security Investigations directorate] logged into his undercover peer-to-peer account and discovered a user who was identified by the online name `thegeta’ utilizing an account on the same peer-to-peer Gigatribe program. (`thegeta’ was a userame utilized by Springstead.) The agent sent an invite request to `thegeta’ . . . for permission to trade images.

On November 8, Springstead accepted the invitation and gave permission for the agent to access and download the files [he] made available for trading. On November 18, HSI downloaded approximately 26 images and 5 videos of minors engaging in sexually explicit conduct . . . from Springstead's account. . . .

Brief of the United States, supra.

Springstead was, apparently coincidentally, also the object of an FBI investigation:

On December 11, 2010, a Task Force Officer with the FBI in Texas also downloaded multiple images of minors engaging in sexually explicit conduct from Springstead's peer-to-peer account. Specifically, the FBI downloaded 256 files from Springstead's account, which included images of minors engaging in sexually explicit conduct and cartoons and drawings that depicted obscene visual representations of the sexual abuse of children. 

Brief of the United States, supra.

On December 21, 2011, officers executed a search warrant at Springstead’s residence, where they seized a computer from which they later seized “numerous pictures and video containing child pornography”.   Brief of the United States, supra.

HSI Special Agent Paul Wolpert conducted the forensic examination of the computer media seized . . . at Springstead's house. . . . Wolpert has been with ICE HSI for approximately eight years and investigates crimes involving children, including sex tourism, production and other child pornography-related crimes, and other online crimes involving minors. . . . He has been involved with online child exploitation investigations since 2006 and virtually all of his . . . investigations involved the Internet in one way or another. . . .He has performed computer forensic examinations since 2006. . . .

Brief of the United States, supra.

(The prosecution’s brief on appeal notes Springstead lived with his parents and used the computer in the home’s family room.  Brief of the United States, supra.  The computer “had three accounts, `Mom,’ `Dad,’ and `Bob, which were associated with Martha Springstead, David Springstead, and [Robert] respectively.”  Brief of the United States, supra.  Springstead’s account was “described on the computer as the `Owner’ account” and the “`Bob’/`Owner’ account contained a jpeg . . . entitled `Me,” and the picture in that file was of” Springstead.  Brief of the United States, supra.)

In his appeal, Springstead argued, in part, that the federal judge who presided at his bench trial erred in admitting

Wolpert's testimony regarding his forensic examination of Springstead's computer. Specifically, Springstead posits that Wolpert lacked the requisite knowledge and training to explain how the Forensic Tool Kit (`FTK’) software used in this case was designed and functioned and that the Government failed to offer testimony regarding the reliability, peer review, error rate, and standards of the industry for the software as required by Federal Rule of Evidence 702. 

U.S. v. Springstead, supra.

Federal Rule of Evidence 702 governs the admission of expert testimony in federal trials.  Rule 702 states that a witness “who is qualified as an expert by knowledge, skill, experience, training, or education” can testify “in the form of an opinion or otherwise” if four conditions are met: 

(a) the expert’s scientific, technical, or other specialized knowledge will help the trier of fact to understand the evidence or to determine a fact in issue;
(b) the testimony is based on sufficient facts or data;
(c) the testimony is the product of reliable principles and methods; and
(d) the expert has reliably applied the principles and methods to the facts of the case.

The  judge who presided over the trial decides whether testimony should be admitted under Rule 702 and, in so doing must require that the prospective witness “`explain how his experience leads to the conclusion reached, why his experience is a sufficient basis for the opinion, and how his experience is reliably applied to the facts.’” U.S. v. Springstead, supra (quoting U.S. v. Wilson, 484 F.3d 267 (U.S. Court of Appeals for the 4th Circuit 2007)).

According to this opinion, at Springstead’s trial Wolpert testified about his qualifications as a

certified computer examiner as an expert in using Forensic Took Kit (FTK), which is an AccessData software program used by forensic analysts all over the world to analyze computers and computer media. . . . ICE sanctions the use of only FTK and Encase, another forensic analyst software program, for its computer forensics specialists. . . . Wolpert is trained on how to use FTK and receives periodic, semiannual ongoing training on FTK and any updates associated with it. There is a certified examiner course that he participates in to stay current in the field. . . .

Wolpert used the FTK program to identify the illicit materials on Springstead's computer. But [he] also testified that he could have located all those same illicit materials without the use of FTK by painstakingly going through each file and folder of Springstead's computer. This process would take months, possibly even a year. . . .

By using FTK, Wolpert made an exact copy (or `mirror image’) of the computer hard drive prior to examining the item by using `hash values’ to ensure that no data has been altered during the evidence analysis. . . . Then, [he] uses the FTK program to more easily view the contents of the computer. For example, FTK allows Wolpert to see all of the picture images on the computer regardless of where they are stored, whereas manually locating all of the same pictures in the various files in which they could reside would be much more time consuming. . . . Wolpert has been admitted as an expert in forensic analysis in two state court trials and two federal court trials, and he has testified in countless other federal court hearings concerning his forensic expertise. . . .

Wolpert explained how FTK works in great detail. [He] has attended an AccessData . . . course for certified examiners. Accessdata gave him a body of work to perform using FTK. After [it] was completed, they evaluated his results and certified that he is able to use the FTK software. . . . After that he has engaged in ongoing AccessData training to make sure he is current with the FTK program. . . . Regarding FTK, Wolpert discussed the need for the mirror image copy, the imaging of the hard drive, the verification of the copy of the hard drive, and that FTK software is used to parse information from the hard drive. . . .

U.S. v. Springstead, supra.

In his appellate brief, Springstead said Wolpert’s testimony was “the only evidence offered by the United States regarding the forensic examination of Government Exhibit 41, the computer hard drive on which images of child pornography was located.” U.S. v. Springstead, supra. Springstead’s brief also noted Wolpert’s testimony that he used FTK to analyze the hard drive and had undergone training in the use of the software.  U.S. v. Springstead, supra. But Springstead claimed that Wolpert

did not know what the error rate on the software was, if any, did not know how the software was designed, did not know how the software purported to obtain and sort the information from the hard drive, and indicated that his work was not peer reviewed.

testified there were no professional standards on guidelines that applied to his purported area of expertise. He also testified that he had not reviewed and was not familiar with the report from the National Institute of Standards and Technology (NIST) that analyzed and discussed the issues regarding the reliability of the FTK software. Finally Wolpert testified that he was not an expert in computer hard drives or any type of computer software and had not undertaken any inquiry into the manufacturer of Springstead's hard drive. . . .  i

Brief of the Appellant, U.S. v. Springstead, 2012 WL 2602658. 

Springstead then pointed out that the legal standard courts apply to the admissibility of expert testimony comes from the Supreme Court’s decisions in Kumho Tire Co. Ltd. v.Carmichael, 526 U.S. 137 (1999) and Daubertv. Merrell Dow Pharmaceuticals, Inc., 509 U.S. 579 (1993).  Brief of the Appellant, supra.  Under the Kumho-Daubert standard, the district court judge is as a gatekeeper who decides whether proffered expert testimony is reliable enough to be admissible.  As Springstead’s brief explains, the judge must insure that expert testimony is not only relevant, but

reliable and in doing so should consider the following factors `(1) whether the particular scientific theory “can be (and has been) tested”; (2) whether or the theory “has been subjected to poor review and publication”; (3) the “known or potential rate of error”; (4) the “existence and maintenance of standards controlling the technique's operation”; and (5) whether the technique has achieved “general acceptance” in the reluctant scientific or expert community.’ This analysis should apply to both technical and scientific expertise. . . .

Brief of the Appellant, supra. 

Springstead then argued that in this case, the judge let Wolpert testify about

matters that clearly did not meet th[is] legal standard . . . and for which he did not have the required specialized knowledge. In essence, Wolpert said he knew the FTK software was reliable because he knew someone who worked for this company that manufactures the software told him so. 

He had no independent training in computers or computer software that would permit him to express expert opinions. He simply relied on the data the software produced. This lack of expertise that meets the legal standard is highlighted by the fact Wolpert could not explain significant anomalies like how images could allegedly be on the hard drive before it was created and how certain files could have a date of transfer that was before the date the file was created, per the report that FTK produced.

Brief of the Appellant, supra. 

Springstead’s brief also argued that the prosecution had not addresses these issues:

The United States pointed out at trial that in some other cases a proper foundation has been paid for the admission of testimony and reports based on FTK. . . . This fact does not make the testimony of Wolpert admissible. He simply was not possessed of the specialized knowledge  through training or experience to testify as an expert. 

The fact someone who has a financial interest in selling this software told him that it worked but did not disclose how it worked, which scientific principals were pertinent to what standards were used to create the software goes not rise to the level required for expert qualification or testimony. The fact that in other cases a properly qualified expert may have testified is not pertinent to the evidence in this case.

Brief of the Appellant, supra. 

Springstead’s brief therefore argued that “[f]or all these reasons the appellant contends that it was an abuse of discretion to admit the reports and testimony based on the FTK software.” Brief of the Appellant, supra. 

The Court of Appeals, though, did not agree:

The district court heard considerable evidence regarding Wolpert's education, experience, expertise, and personal involvement in this case. The district court qualified Wolpert as an expert in internet and computer forensics, finding that Wolpert had `the requisite knowledge and training, experience, and because of the certification process, there's been a method . . . whereby he's been tested on his familiarity and ability to operate the [FTK] that he uses in his computer forensic investigations.’

Having reviewed the record with the appropriate standards in mind, we conclude the district court's decision to qualify Wolpert as an expert did not constitute an abuse of discretion. . . . To the extent Springstead challenges the reliability of Wolpert's testimony on the ground that the district court inadequately considered factors such as testing, peer review, error rates, and acceptability in the relevant scientific community, Daubert v. Merrell Dow, supra, the test of reliability is `flexible,’ and Daubert's list of specific factors neither necessarily nor exclusively applies to all experts or in every case.  Kumho Tire Co. Ltd. v. Carmichael, supra.

U.S. v. Springstead, supra.

This news story provides a little more information about Springstead and the case.

No comments: