ࡱ> }xyz{|FSxQk/2CJFIFC    $.' ",#(7),01444'9=82<.342C  2!!22222222222222222222222222222222222222222222222222[">!1AQ"aq#2RBCb$%3Sr+!1A2Q"aqB ?XgѴ9L>C՛T_jnLC-֡:0iw_2?OJ|P>{ӵH]NJ?q4go3DÓRāaG)yHoE_qɽåcڨzX13͆~fz5K櫹ô )?L%ǸG> /+n>N~=nm-1ϞQխ4NeeĻ÷:HHsZؓkF)nIfc(vy׹DPt>OzmF6!"y4KQцY*ɔoQO>iHy6fHzjddyIڑS9,x:nnVZ6WfZ'by8Ǐ#4\"c^?S\;Ku2>A+Jבp>m@ $yZ)nHc#cu>?0)>k5JG.:KmC#NJh]A-ƜVp\cߵG;AD9W~fs,ΪF%pIS#G=wSGX{q/DIDA܌w>g/ v-z! @H>Kr*lp3sTr'?Lj@9q,v PYZ.닄V O(*MDJjg ܒ[Dljʎ׵6> ` A=n~2VCsJH]>M61m(<ЅM^Eo sߊF{Bх<2kvEO;5T;y' _]0}`Au%jα ݴqI#l 9?\RXV Eq}]1] ɥzP5tW,9K)Z0KXu3ZMN"6gUAh8;ՕԮҷ[VHLqr?jz("9數*>y#Jvd<0yř-@o|fn5F9$8lO #m#9?*=d[K&9-Jy[-V|\8+O {dWS򠻋sCn?xQ|ѩ@9r;E8)b7"B~uV%v#xJpeq?J(Z Gw"Ԣp8ɺ Y2}vH\G$F'yPgqWK U$@ !9[Y*)#̝q,z:MVLHўoGa?{TY[}u;9hx?;brshWx˻dg,e sc}ʃ6>Zd.#kۼŽcٖ:co /)Lz-f8 6}#[ȑ ^nlﬥ\zU+L扡js\ɰؐ=*f^LתnGIZiD]Jp?֊IYr#al6 z}#kgDTv⧭" õu.Qx@U Sدg>kSx*@<})2kAȹ'VP# e&i @߁Ѭ*t&,x^l9󆥼ojkuhٷ{UlwnZV<ʍ#|K(;=MVs:VP>!zΧ%|QjdUOMKdx4UCyjB m_jWvP\ w3=+z^PԤfAh@STzRwHr$V`bp{0aUךK5~U6~[ϡ^:5QnAq}Ew-j* s^Ͷʠ yu 'F2~u%# biy@=5>I701"*\f1k:ڍ?1\0ɪGM$ n}X]pχ`2Ҋ-rUӞh">6]9jn~k[\AV0BH'+Mz͆o,c'8%;WВ+i. Mv;sR-*HĿ)Bi+$ؑ٣*If?41ŝߨ_lL>O8瑏>HLѐ8o9tGRv[M>ؔJuYq|?ZKS}3|tac`7p m 1>Rz$m3 lg>>xbmꗪ~NWeizRdd-m$ONb/[1 16J(a!eZ;'!cW<x+tgQ(_-@6`\nMdzdcېWV4SJZq,C{ ,I+];Vo#WHq*42z@v )&Xn==zCh.n@pG*NoX*xfH'=\{vJb&N$(o]+\v,}jEf;rNUQTAML[5K޿39ϊTƤ$JPt jZK,~m.rm#d77ZUN.J1Ru>N}M'#ӫQ-沲y/ZryR|沲ӥ lՕXnLVQaha QVP qYYI VC9{i{t-}l@5u>D>O٠F 1,v͒ JFIFC    $.' ",#(7),01444'9=82<.342C  2!!22222222222222222222222222222222222222222222222222dh"6!1AQ"aq2#BCcr%!1"AQ#2aq ?D8(۠k'j0B?@n͓['cPfU41g9;e1@T  G[7ra%0As=y}[D6d!ξwxC`s%d1JEZ׊L+R_lfЩy8Z*0H4yK%/\?Jw1]0z0 )jݔHAWGJqoZha{{Oa**aմ}{NxdR(ḒmkJ~$r2A#8ޤ'&:r ^ʩm|Y](1v=Oլw'OBh{1T*wqjYRr y&۾_Rj,|:s2 nKK{եqi;Z$ |+M]ad8ºom6FGY` byҧ-l>m;]aN)gY4)l F>߭r/yq ( $pE'~Ÿ&seggb+p1v&|k⇸Y7.?(G@%'f|Zx41R-St2vɒ1 0JQsCP8>k4K=SƏ"2i;ɹJvV+KW<1!!Wa%J3zViu1Vs|!s8hWFmEtnnx6J!KѩQۄ䚔>G*fj <yU'jƫnHYI'7YCcϙ ƺd<|Y_>YiUWQYEv!wi$~U[(] YQE[Re]OxTE=0\RZMearM%Akr9dQ)i,yeM2]*K{hYvxP[NfWQX~K.o벼rONV.ɗ> $?'jS;elrf>\&e V[OmM$Yp07 U##)!஝=8RijVL!0~{~SZ e\bTo,֖blv&I镖@GA p3Yas4J>>pވ#ӂk-BcR1{gjHWztξ`VVD9WƅkeA݋۹B&\ q5M#_L,noIRQHoKY\%K1aN}BmEV g};[x_Vg#B cqk6}iHRqUF{cy`UH@z}3dC}7r?x[QRx, NcECOnmLs R<=q })=rF@lilWTԤX*.A5`7^VdW21\7NvUCHק۽c90EeZIˈ`ɇޙlgm%DL8+.s?j(5ź ͦpyFKrr&^-}߆4Vq9)2pzkGFlMq! ?!AĻON¬7~CIS OfcNz. 2cTD0"a62z}+I+3:n+V* 5ÎG~uo' Fj(O\g%ZH0G#wc dQkS)bG1ބeDlsۘF4c|+,P R 2#Pyo޽NǽJ_k"P; P/J+r6ḇv JS A,݇2ܛhK?v;Eaj7SOwak9 w*\\s+6KW.,nrvQ/cHȎ&YiN(a1YQP{*M#[Xrk቞Lv#JKTTӭIR ON. vy.,#tY3mdlẎIdnJzj1hM QUctGUt:u麵G"GL wyH qҴsV?sƇq]"?*CYahPLtY {~xá SvN]1!Ԉ2rzHTWz3I~K=joR TE*QN(9=S Zk0S  #&OxҕƗqo @aOm,-SFj& ){+k o\ `3TͲs21_Pe*Al;jM;O ZH~(c$  vu r:U4vYӓ])naF(,@%UEns[X[Rg8';$ s)[n߈ܲY|GJiX? 'duw#{W˅sϿ?U#ϟaզmN4ByvUIg32yAs']cJb&MH|mԌ!w#ϚE\=Vdk;Ah%s+y p\`4 DH!'Ǣw[g;CZ( Οk*i8%ŸB'ʸa8~^ i%U?-74RBc4ZǦȓ'޼ L}80AmY4VO$R&W/e6C֖ϥ2.v+moM&VeǴu;+6'9#+^? G9BVW z*=NC wWw*w%>CDT֚~.8O01>AIX* Pqt{UڔwW:]^ʙduzpS*H^sӴV@s8)UUF?}'Ҵ0PT4vewsϴ|j[N s9#JnrFe\|ƍ)ssAsiINf8u+G&&86K")!%Wsʽ#GTMmH8|9">nȾj4 =`F, r9צ:TytMzj- 1 Σ.Imv W(m+, <J^*hP^yc|gUlΈt{#]'/{V_gt l힅bƥhZCh슞l7q_95Ѣ4Gl#48ܲ*s`SV7k>A<1Ekn~51Wq4|ѻ]@X{ g5>~f= GuEGĂRyʜr=eǬUk]F뇺ϯǍ,s9ؚ]ԮlsٚS5զ,G d0=sLDJ\.ʙoQ<_JAڈ_\!RCU/:7A=Vz $ƒH G'2Lfel IK}@q toh쵴azzRsŎQэ?'m:Zݻ̮=:rŴh$r-Y2p6д3@>/;&s"Y5Ak|dov;= 5/}dDmmαΎB}|'yg\CșNUP2+yA9 mY*ږ[j7B8BFOګ{Iи6iZ+mW| d9hIDm_6/Wj(³E(QL Vh) N+ k^袊+٠FM .痢-JFIFC    $.' ",#(7),01444'9=82<.342C  2!!22222222222222222222222222222222222222222222222222cc":!1AQa"#2Bq$RCrSc, !1"QABRa ?Bؚvk(6%E<p2$d6C/ʷq*\UZB-9P2 Ch OUi$|+N Nx"oin u"Ns$Vc4o;C̍&C/6>\nB=:qt03zyL0Yu#AS1z4D.;,A)Qg9P$S71+hQ|0ۯ /%GsfחUwokԔIUjt{մ+[a O`~~ƢFb$g#fCՀEulQJFI$y,ɒ53|ueC=+sqY|~5x6{Lt+CUUGkJ['~+f<2mrOgQ? *ƫmy)үP dI7!Lv;QAPȧ}pz=aԎzjIsG9Y+{n:Qk 'GFSGG撇ql~bڔÐ>oE }Ė]JNcܡx5#4r; YbK$e.1ߑVstc+P-"6qEem/.uJp1uzxEwHZVԗ+m(WRpvvթN&(HBwHG+ 4P K9QdZ9$j:dWfGj[?:dLiz("d\Lj; krlw4LrAxZ{D$+(^hrUBbl ZAT1Үzد`/%(V[_AtNъ5֝R/ސO956C|tU!m:-%+I 0AqC*ϕJR1kh @>z3q!44_8) x+,DJ2`:˅ yQgXM$w)2B;Er&33"" Yv5*R\9JX٠F4 qֈ7⋀`JFIFC    $.' ",#(7),01444'9=82<.342C  2!!22222222222222222222222222222222222222222222222222hX"I !1"Q#2ARTUaq5BSt$34EbsCVe ?\R݉ؖ [(;[GkYtC\ 6m &txHHo $9 Y<5XPi"jb;\5n$ueFM͝P<@N8cX]mE˓ځBH 3\vk),$8Al\mq&L6(wsAH85\vr^mjڔ20Vt5vRtGn2qBkyp ! P=ж6C Qж6C SP#ж6C Qж6C SPK45XT{nɱ& Ԅp;>b&ZgύU/88```@\3Z?BkqE@2uU%eBsFTDJߤs}*mH#aE;; b>weŹ5ڏriIFIJ8="n46/59'Jwzx(^%KCh e AFf )Y7_8RHt[T(G_٘NSRKN\)+ 21ΛxI>("ľ]X嗭IeԤ+?ʚ3p/f[a(o逬cӜTLlqmh MrA(p}1WEgeH2].('sNzeLErԦrZR4#p3mtP؊ah7h?W.\%,!+"HA*%^}Xn}1@@@2xP#6HjsHB :ǮxUh_X2$x3nApMc5M0=~5;!Cۍ:qہEQ@_>3(kfc;E+JcNR,[8֑]iA;cu4Pԓ:9q%{/"()%cuJp-QܧR˹ 3d`rz駪6^&3tժ;>Pu=Juҥr!t0!IJqAeFT iKRTEGvVDT'#|I:N:Ӝ9_yowu*Hˋʔ 6 =XJ?.ILt4GEijwƳ}H߾4{L%UX_^:Z P岒2ւ#@Z)'PC?ΖDrRW!'ߜHHҐ6kȎUlڤn܇7\)2δj8F3 8r8iE+y28sA=PJ| ~M\ G(_)gQXȾR϶(|lPmEc"K>أE}A 2GXe ₔ7T30EcA-d#^uIЙ<T2+/ cz޾`$%)m{CI$r@. 'ErIq dkn.[a[iR)C9 Vs/(.)0Tc q {9\lۭq[ZVL,#g7)iC% (pɎ8w/#?#y;^FvH|~z>OBR?=7 9o'k_]qG篊):~z 7 9o'k1/g_m9٦=6RÄA"\e92z]4{iJgJBdRGkoоA:Yf)JU;EKE{DCFBe]9+pqY85֛ A}:uGW{hW{hW{hW{k÷ZREI>Es6HMF[[K܎n) +R9B7qē%۱"nsGU =~N}QE baCw/)hm佺7P)j<08_W{h;"Jt- < ) 9G (?٠F( 1Wwn>m˥JFIFC    $.' ",#(7),01444'9=82<.342C  2!!22222222222222222222222222222222222222222222222222_"F !1Q"Aaq#23RrBb$%45CDc)!1A"2Qaq3 ? @)D bɠa*N&z]URUm}q6␴&0ڧF"EZk} : ħ"ZԠnb@5) 5--D"9yLC{2>P0P! 3ãkU|7|>Q@a_m;I2;r+ ܄{D6h"ISl8bEgLY' 6!$t\.cqR-k иv jní e: n|%փ^vfe *Zeŕ&n1& @Ieilm6Z25\cLË0d'|F hn$Q3@bBÖ"D1sr%C@&5%}X&C(<3,:yħcV`'84Rҁ3>%2In`{yd{osk}EZ,`'`oI d TVl"No%C_Fx;ʼn~p#.E4 nL& #d?XCKf:T߷ D 0\~aA:)]!3~AMac”. KJM{b5NSM2 nITㄢcOl*MτeeXrbsaS·,@@D}R^jbp90̤{xmp6G l !AD9@nUOYJrI_nt/6P,52CtiRbGj=Yr>bu1%u1e((psuГyE%W1kN<66R^Ve^-)FL[lݐUWjI n)B^H‡nHQ޸7 Q*oXڽN'Jl&%_oB BMu8}5!$:=%0 S} KW1҉MAȲۨpn/*ě@ (6\u %5,ǜJC"1Ff\ kz./nge_A_B 6lAgse$8.PAr[T G:OhH$Jk Jj(iFaƃ*XA$y(_ /0™4YzK H[9Ҙ:06,T @SY$Xe*dN^r`$*Sf:n-u_/yp#2=2fZhm!VoAmAPꤝIlN}:FBi#{v;Ď\^9mUk[\p<ף[kdsVҍgf6cRk-P}H!79ҧT<װyo XbPrXEƞ?֐)NW$қMIa 1fI3bneM-o{ҧ[qNOl3LIY|[d) Ӎ!?$cY LDLKx+Se#"HMv鉍"!^gjcDR bt8?Q=c*_x^6ӊCAN_NW0dM%bpjGꇐߙz7j*t2-" r$|6ZH+6:xwbVNkwt=2ԫ T3]e`G͎7 9Sr{SfkX#N@bå6.^\A":U~yTEzrO%6Jlt>0 ! QU*Xhȴ7KQ*G NLW̏>Ipà$~Kaf޷~qAB{ ޔ+d !NDuv淗JeZlpGZ.nYKH NR-2IqKM%T%'Q,dMH(jBlwY(-|5M\!#Q~AG3IyS&H"6=Not;+RL9Y4f0bM}7[ `$2C\I[)•қ!QbkۚN0w%!x*IzYf77(X¦f,{= A;y٠F`  @&JFIFC    $.' ",#(7),01444'9=82<.342C  2!!22222222222222222222222222222222222222222222222222d"B!1AQ"a2BCq$RS#34T%rbcA"1a ?QWo m o/v vc+/tzb8bZ_kxch{'-t1Y p J" hd40#eWo?v6y Gn4, u ZUJ>~m 9YvH=]"Lb;#, =V_ +ʑv ^.T 'm;+.P.!z0,{"JfʖyV8XZwkP..CrM) 7p,K= LwQ.rbٷTۈRA*i9dKJ!y!KpFi?FS2HIe=E0w< a4y qE ExrhI-rdJ\pPABрLtҴ)85<&TiF=kN+[iPBS,㷔p~"+Yvףe94zE *ASJs,Dzb}4a=]ƚ.NHJPTHQ[6RkϳmdLUKe)4JzvnU I7[ )1>ˉStk -5q i:N̚Ԅ4oE :M*X%C 1ܰdZ[6j_A"e+@LVc^-Z )V:k}q/uFޝqOM˥ 6H?"$q5ҵ 2oֱ.)R˰(m| bfʩpvDF'gKl, vs9V(A1'&JRTѥ(N4 STJL9sqָs)IhR~P64›i?.Qem!hRM(F#8DmeH%HHOkAo&Y"22$oŠaMd6-]J(1uWhCD}(2d-!gRP Dֺz@r)taĚ}xFYd{\;`bvC 1'D2`[krzVCmHN^r:( Y 5qVGh!݀t2=؃o U-wVChMd;7N*mZ *D.qZJ]5oS:%H4,1U<.!x0%2g5V\;4#Fؔ}"o@ZTYU& OrZRFStb_Eky9񑷜xԩA`Em\`Д.A5+ xp&^N2?v^{W Ҭ*6mOH%IGHWB° S SEn`TF3'^Py5'=ury 8Ny+X &C<CX 8Nz$uX  "|"͟)8fP T),D%I s]UljȺ8xXB|_*U-J£s ?٠F ͎6ËhJFIFC    $.' ",#(7),01444'9=82<.342C  2!!22222222222222222222222222222222222222222222222222[c";!1A"Qa2q#3$B5RSb!!1Q2A" ?4F8(,Mpioa WJ_:ߟ{sq44d4_!DA>~%T,TX_y^c]X?@׸U"ȦXdbgP4!guVRGcK/|*6JYm($B G\#~LDn z[jtdGKNdB@ J2ꨓҼ` ն TeS#U XďRVFbm>[aokt8xqT˅^vA#vCgM`6R* ˤ܋o+̑;iYB[\~?,:+* `ˌfz5쥏AJ|jgvkbz I_VZQEF*6s Lr"ֲ0_~mKeCclo,Q=T(n7a_ 7tY䨊duk8!1^ȶޖ¸VSM!ZA-O[憎Ih؟{vuDj>ewkoLh-L%VF]nmb۱P|XbMo,dm;T,$@%_7lXv2+*AS#bf> o@{aac$rxx#9VTKM₨KC xܒ8ak^90c;C9AhdE)4"rÜJXHQ#*08YZJg! ]7}j(i*cs2oc~6 `!ڨ1E {{mk~vmGwR`Tn/N۝j @ii#(Mo<NdcbmrY+%Jh,;X,l֫4Йtgw}:4R+7a{iʐ8Ʊ] bLvN[%O(u&b=?a6S@3؁qkپUeݬ*egTС78\m9;HXXXz]-ı sl*A4U<ŀįPjOO׋|T]lnOso98!eE #g\7=R#US+)7kzH7@6amHV;}aVl+~vщKnm X򗼎P%e:$jg#Jب[eUSRGfb8u>w9lTӼhKHQۋu=><"vcP_r ;m,Ҡ{HT ] ǐĀE"rfäh""H3Ui>%mzqiҳ9YBA N<6F.5RHLk*L/ɻQWBRo -mu>7d*P00%v؈$<|j2Ri[svU3FkX7&pTYDr oF!e_mY3٠F ϲkB<&٬JFIFC    $.' ",#(7),01444'9=82<.342C  2!!22222222222222222222222222222222222222222222222222g"G !1AQ"aq24V#7Btu6Rv38'!"1AQq ?ߨ:*Vh)g^* l*mT?2 &!n<ഽ}WZ8#d <89ԉ!mw'rb2yB}#ݚL+gw3y֖)Iq/h$ v3PvsES)HۍBO<anbnwq@@ ]]UE%Sa\-JJ{Э>I|AւޕzZ k-{'qhWȲnȓY#j)=Ig[ScAE ?Vcܝn"z !n('y:;'S=Z[ڦ>[/kJv0 ? @8d)G*&#\V˯T%+ V (2eGR%> 8R>$גc=ӊq#9v^I0E52bOvPd^.P̷Ci+Z78䤟!CS9'=jJR_o32HPwo6#-n(p{~5w"mrRJ1 8&SHu-( W@$ ޶/sDBSRQ>ں31a i 4 ҊZyBnJeGgsJRBN@z*m%ɐ;;T:|]]΄Cg yµ~kWmKLYv/Qm`B'S{8񪝻?2\;v:!$+8Uo{EN,{}y}nnTJ)ٽ@ƹXvku%`cy?+,vfzR]I2y"8Vm&5LVY4:+zYOf7_[\B; J1IBBĕ&ncOnW|jen0q %@pt=x"v[ofN]cl8;VN 55-2 ^)진o=yHuYXWswK1w!;ԔYX A iIXY)B8rTG)%Y'Bː0hl:9%.7ݩ 1HBKr2$I2s+ReT@: (p ~%]%q+-OwJxnm{PXUCIQi>驎JO)qCqJ-m*-ǖR=8!'$tϏZ9e,o{iqi* IȁR)~UQTrT!2[Ǝʛ*IQZ g*s=.Q}'!$)TslM_ *LgY?Ws5qɩ)(-#Q\|t2coGܚtjf@~ N7͆٦I,]< u̔785S~Jiʁ < TkM5>&:⥲Y^79$qwƠh$)q`0Wǻ}UUG**^iNƾa?oIi5G?´( (;c>IqO&b3,/r TV:j{Q\:F *4 5+y ?BurUJuٮP~JR]I8=@mHn@j솈R閳ӜWaOFCO2\@ꐬ˞ٔS2s(pghU]i6$8^uNXgP*9E34Sۮ}>2u5qɦ3ܢ"T7+)?|NI L=-l eyAIЖO@URіXZSO 8چ TʽڠlVURٚ V}JMr#Z5;ASʒI{df"yÎ$c_0 ,o">R6/PI$ujtQ@QEQ@/OۛamSBBQ3YƦշNז$>[[ 0ROPvv7mwټ\q*Qy3m-\{ n*qU=r!pnBw$cZߨ6?QKnrol䃜cGQsHCj@W#MW-r"f32ˎmQy(@}:oi1ۗ%m[6_|-ԫdZPOn0}H &cJ^%Ngy&6J0 ;=ьºnjmIFèu8k#If+ylnH< w4\#ќ Wr~50wCxߍA5l2[6}lqm t2〜uWzo˧ߍzo˧ߍ6+LRTASxN(|?):6sW\M9t\M9t>{b^P5,x+X@iݖޣ. JFIFC    $.' ",#(7),01444'9=82<.342C  2!!22222222222222222222222222222222222222222222222222Sc"A !1AQa"q#2$BR5Ubt$!1Q"2Aq ?ͭpb;:6IlW1UUO9="jL֭TyIcp3".- sSI_-QV{^2lhI5Nq֎@fl虠eʥ6P,_$_tqEȋO0'𮻝1`v?am>_ՌsV@8vyIǦ1h-sX]%7ǶY]96G=sXe.l%)G +P\8­S"ħ)AJ8Yv ՚YyPRV߭oStӪtěm 3օ.ixˡN2+!`m\Zt 8{u\ JR9##隬V`%L"4l䖚JR0Ud#B`Zk-Y mlx%:VKkH(z΄׻CӲVP͡=†$)M48Txr9:Ы]LrLTq<3tk}&F ^7TUɛ1vY-xc *-| ~l!$𤨨8V.3BټKa+QCG<;l6 J*V3fĪ܎uUq>߅2dIqƽ jJKIVauGRT8%$ jKtDƂôʁ@;gmOԔRZ͚ o:L['#tBQF>vǧδ[d7SnrC2#Ιw`3 ѷ)3#:YVRV@;gS/[|rir6K\OOvZz8b- ;t.n˷[\%Io 8!˥g6vF1p~$RndZ0KK~:!I)lX3c>} ^D,% I@r3j"BVI{ZO %{󑓥3-4uq]S$!K FNܹifӮC3O 2s3ƴlintYJOǿS2 yϕ qs]<$g8A}*m(Rkk@˹NiT=˛ϟ<[JFvjQ ZG|m(vmb SOH#!%h1!%SYK@ P !G<>ZF2 ‚@yTY .[5$XdCo!.Ž7CդX!eK- D\ٷ Q@Z9Z 8ŗ'; ͟svn[i7Ĵ8lCVv3@C*MVV7I m}ea+e!О$U=\)שqӈh}R9}ԩ *ԙ7(+Y `e9Ui] V@,As@yƷ[ڍ8c;),-K`$d)'%\}kl|{ԄHkW2qTiLqh";K++Y?3`EclBn|H; #F N2FE\ؤgx))ϕv=UzhoAPJyRcV7Vh/XvLdd})(()x6(vS`M,ݐǠc|u\ XVܶ@{=8>&A,2S#$wj;&G JvOŕ|Z۝\{wJI:sCu/f G A^vakQI!Jc|6ƎW_kF1!= 9:.64T#pG % 1\ \_~OJ>F58lbHJ᳀r{S5iR TWO5T;_*36ӵkN~YJGYu՗kLKڔCiX$Y5&f3QZ! 5LFBF=8)RLudpCWP7'&3$s̢T}c5)RA+o:PdۅܶgܑG}k[$][L-H4l Z}i5<rKFk 7?aG.g0'Pi46P? wyd-u_I}C4.xvҴ~4>_ʢ>]i#zHؑmsX~_+;.*i3i44m~OJr[>T,=GYi  1Sz J8FCR%h,i6ng zEW׎<[a1jwqR~+b\Azyo)Sa御[F~|I@t*GN cُriq1֏p4q=w\sr[dc %rx\dsL +ې81#GԦ2F9rmrtAqӐٯ#9j_b_o399'yv!sB"f7s)G3}ҫۃn|#)<]O[4Qʒmg V Tr3x>ޔ.ka"B;9otVɧռB?\{P6u}|0x΃?_轓 dZ_+$ݮ%V+0S|Ěݙ爐c2a=TrsF+%xG } Âw:}jxR񊽖nig=ܧo;= I].5n}99zmUT N; H.m;#>=X$YP4d0<k纈fރ[U$c圞ƅ8R.}X5׼k4VzmDhqw'Ͷe$UʀGz_n0{ݽKnΡ2>IDCt]."䰪ʄ IN ӠhH)[ærz@jRaV=*9ncϘ% $LntK td-=׳`Em*B0d! ouʙ,ۍ_zd`>P =m#†\n|ޡ eHn6KQsz";ۿK\Ѭ)GrP#s $:Abh`+}A{gR=6ͽn$?RJ]i1m2,$Sls?1٭I3+ԁ\]*g]ɧLF.l$ :Oh_ }O$D^9P|)+{cXUIwPeuI xs;eH2Oy6Fۏ;>tXU\js$fv)ȓ>ZYorbY HIMl w{֪p}$n ܍aڢQV$m1d cBx<3ũ@KUx3 =HR͘c{Q1]4%c3*#PۛJQ$Qg<};,~~ۘ]ȡBxh.ˊ;c].(dլe<@7 g}(ٟ{NĞ0;k#cZd5>k֚8h*߬+x"]}#מH!YFIz{JʅRi4[>#Szz⽇:I=+)2 ٠F f/bϺ>""%CJFIFC    $.' ",#(7),01444'9=82<.342C  2!!22222222222222222222222222222222222222222222222222kE"G  !1AQa"2q#4B%UCERcdrs!!1Q2A" ?4kha3.VKK spN^-w8i#Y6b6E"9DPEk j-.mk ">3rݒ}_/!Cx>ozUȽqz);k}.\[CH֥b{h3(wCɐn2{V×"6V#AČRSC?jpUpcumJ-GOY"N,fA.y;Ni:m-⁈O7#+Mx&iK^ZokWv^m`vi (÷6)IdF6Z5KqJc5_]wUzo+?*ԾC݇U `x1֮fmJ~FPcϼU?-.cd~ݎ*ydٝ}bw⃊URm==JJ2ITE_`u?%'' 5(͎%BGΪF`%y7蟻h `d b9?/βo )l xj\s2`71 *%rȍF@3^3cW42<]lj"1d'=)o-F#%ez \M#"h"2cn'j6'X77fi+-ͣY$@NeD3 9R.M|xn Eh~g(K)W|E{Nҕ0@R @s>="2Wx7!1~j 2s;cL-ڴV{Dç1k ]z};|Ơu8R]vk/lvՌc#}3*5ƣI4wy*9B CzzQ6H5S&%*cNۍ- b)7ʩ=ǺΓV[q$Fr:SFc( c>:Iķ dSOʋ i^^$xC1f? 0[M]ם?QBkKS=۰ Ԍp>/jg'}}hxOΕ3İ5P!T_6L 3.I0۷(D##< ^xCL%0Jу֯aokvbԬz[cD%;=ڤHAaP{FtJEF-.c6V#$.qAiC񡋑$ t4, Il!QL*MS#t_n@g•Py=dD͑.q{NG0@#Q5qEg-.缯ƾ~%0jI X*3ۖ >9d/'#UT>Ym4>n(d)̣A*m^9?e7W H+o':RNOLT_;~?'/3~?֕Mʽ^z' ^苣Y}\G1ǴN:?O*'٠FT `bI` (R9D͒8JFIFC    $.' ",#(7),01444'9=82<.342C  2!!22222222222222222222222222222222222222222222222222Fc"4!1A"Qa2q#3B!1AQ ?+h揁DJX:U%4[pЮH7e[ |q2#))7%vZ_stD6XV})l-燠'n@Ѧ%UY*gqޚ.$:M7aKSRHկj:r)XYX,~U'09P_Jtmv>tRd1 ;U,%1y"1wf"09F0׽7[nYm8IK}X!_?nk[We`z/iFKK-cg+%*8sv  hN߁韽Z hD~OZCR` N;q?| ZNZS.vg6R0E&\8P폐 j7FI w̔f-QL4ekK48 P2=?I R*,0<#*=:0u-+Oڷ8H[TJs)`ZHNү P²;1 }osޯ1$7!mm" o&nglbhx<+'"-9pڻo ]0~`^Biqn3L*"O&uYfAvc@I`\UNU}7ڨT@*FF~mHdu!6PIڣL+ pF*ba3#=MiK39m̤S""9uRh+rHْ䷶<QXwc>x*'As$s/qSUo(#Cχ->IaFP@bdnϷJWUxYۣgy4% D`* 霟ޓ}&M^^l(Àm5%DU.*yP>TDz >š,PInzz12E`)nm)y; X/ M?W9H@>m=mVRx.~0Ï6c=V)'b9r;gok "quq1!23؍R5nlu$;h9Bp6'&s\ nHUw?:RTɷ٘oDN18=ޛ*U`c8baʍ[ F Os#,q9<HUq^_U+#a>f_-亜Z2o;֦<)Am "X9I]IO%+hcQWCk^"%H:lmoG<$n o+E)z: QWpKM6.@.69}{VwWQ\2;2á;<3*lm++lܰp;w(qS~{Y>/uqg .`$;kCw^k:z;Vٮ OF 2m}bۛ̯$`jOʫ_>!+ mdQV|˥xOMG[T^qˢ=:j/kD.xo8!cvQY2.$ _Z+IFʍ$Iǎts%Ԛl!^E=HEԑG}Aob82£Pn!0*@vߦQYHL>2D(>W2J,cYN|ߋ~QS|KD__åT+`}o5b|ck^j4`E_*m]7M`tWJ2Nz( ٠F Y.Z*g3=$JFIFC    $.' ",#(7),01444'9=82<.342C  2!!22222222222222222222222222222222222222222222222222e^"=!1AQ"aq2#U5crBRS$Eb(!1AQ"#aq ?p/khYuv:Fd-Ƶa`8.-l,V$M뒰lAVne~k5\Zt}*u*8yH^>t})zNH'>t}+ oeHJg: 5 VuVճ>: ZݥH*Rƾ@@v^m=bR#&`UFZX))tTLT3F82C4l!Wqͷi/$P59&Oݳv\?ij!B@&L5W:pp[GċKO6 i1[b^\5\ q됒#E<^p@ 9#kzSi}7ЄLDE>s2 SԚU6%NP%30 C( _U^@ '󢌨$ZIí,,ʗ'mEImQO0h:^Ke2U L1IvP׽Er)b74i&}9{,JFZwф4{ܑ'|>͡9LDGQ5?:Iѫ]aԿ%@,xP>&•0ڐ$'7AO/Z, YOgMڷ%+lR+8Epl'`Rk(Rx[ )6mP-V BH%s5pKN 49ү&'iVm3YD`E:ˋN4f BJo*R V[1T'[;@IRytHZB E%g_qp9N32AP'JYRaIX%6|(xK0^mDvB($#e06`rbUu# <-[[eN8*'˚>ʡ#}2ZSS[.I2#啨O"ԭ P  hIھN2ʎAe#`a.+E#)+JVZ/.$yʂfy֫zЅO($FH8$\*󎐲6M*UHɵCwJ)Yڈ_A*UQZ̞PcisQ ltGSJjtj,'[vZnz1KygtJ'}XHBN;FI?JT> 1Ƹ9=iVO)GD( 26RE֨NZ?٠FhfK, - $XJFIFHHC    $.' ",#(7),01444'9=82<.342C  2!!22222222222222222222222222222222222222222222222222%"N!1AQ"aq2#BR3br$4%CScsDT&6EFV)!1AQ"2BaqR ?:B=_Li~ aV@=yRϑpgquq::À#$gkŀʐ*^NW nӲ#~I~NF'T@OS{ߋx䊒*rs@֓bŖr.Vz?ۯ5?$*&K—4/U_j&3슢ۃ;fV?٢Q3V@>P[],cF r9/4A#XȒ3R&ۮcʉ'VH}mmBèJBe.>Yc4$Ruc⫎s\! ϴsR[tpA?cbiA^NDPQ^3~5B-|2DAoVanRG"6NSPK O$Aߖ9M[2#dŽǥO}}Z 7C\%'$qMa-+±Qt(Ik#qUo4=GO3]^,h_}6ByzR|ZN.΁@ku&`ȣ \9<ޚ-Ymؓp0]4Jlpوcҳ"ldCR/Mşj~@U&կAxbBzzo𨆃j3`T%N/EЬЬsxMAH_C?5q'Q3XXqB= E#WRsАEbm]ok# UYAh5_%H5烣ysTbnȪfÀIJ|vN1iYUǝeR[ۊ.}|ƀQ\䁒j屚|x08&]UEO+( (Z2nɩƄ«6x"V72IUa0F|~*bMhzA)Kf`QtqJ7DX8T`,Ys6i i|r|>nd0ANTiWP6q'֭FmBOc-Y pOd =M1AAy$i-xn"dVqE"Xϕ@' 梖Rqڭ1 ګ&A^ך( ɭ=*]ʠݸFx\Q<X*0%sJdH+I%Ң2q4 !wTi|QOTXЗ`UzWNw[ÕN{׬Ǟ yz7Y"!riVVF'c9XTG"N_u+\ VhtHr%s[F}l-1v݈V4B<yk@ +ΓvE'~Ҟ+E| H钶 ZڟlQݥ/![RَưIy|Y4Lw5VoF:0Qk :O٬AOoǐ'Msirr{ԽqAJJY^3JʒB|VvqV U1r*!$s̼opPFgԘB[d}F8ޔ~:nP{INV')*w\XYU[C<n=8pq،ҔٚkNL3CK9V/mjT*Ⱥլ?jM)9nA Q3K0l+j{S^e)(22iH.Ʌ ?';Q4ca? IZ"BvAOCL8PT7NxW]/\xJ\aVR kX+{wlA[MJzs/,=Hd*GSuX5尽The-&;yxὢ*H?^=Mk54lUWJ'ȭ%l5T*T2EuےODW8Eo3h#,<AƼmb+k>ΨփM7QHN=(t7eV+mCSDUiĆO Sܵj~ /;|Y# *<yX*GBcjYVMB r^I0iM*;F1K}Dw[F6SMQ^ޮXnU'i=\}S.4r2<bx̧:DΫ0` Fi (޷enkCnEm2wsVTgnν(Sv M$yN95Uvǝ[DP.ᾛ9 ۏT {+pAQ{6k'X"W|Iݖ$gnh2 %|vS2rc𱶓(crֱۗ\#9|&ko>oH'jPKmr\#G*20Sޡ[m?L2$"3ˊAJMV(#d4ym/KY5s V8+MкǴX587GX͎]wabL2Au$ch*,f&uM^׷T B2 )Q6sҋO%aP ޮ,~ɠt+FSD"q7$>.;hɨ[# XPjҴkIjDv toZ ('U^[ 0'Yhs+nR$RZ&9lǻwژR? |̸\Ӣp>VHA'Є=E@-R4~ 2ƣL犮3sڷp`<$\h'TgREC"ȫSZ rx30TZ2i혒1*@jV[JcVlQ ZW\DE!2tMIWPKYC5տb}Ɨ#.㨤W9WI#|"P{9jkcMZO[trbIiq+i`>94iqј.b-#:$-i6v=_kz Ό[\c>iT{ɹWq_Km0 |= Dg y p|dek]Fx EsRdwr2JQr,pshBefQ<0|oRhQmd_SYP3 u&@'++Pr$b~$ndk*]20 * b3=Zʙ2?xp|e9޵_j&"'^<]%DsiMu LbQՃGjFz?tKdT$%*፾J !Ă*v?鶄ogyCcc%} ;5hߏ,QI#]^ S"8Qjnz_QDÊ?g7үԇ $ƺ7N Ʋ9#$X$㹧ߣ\^ Fk3#xQHo\VM*R*c֏ZH%sK6Mr4]g5 Gwm9C -L {Eۢɤk`%w1|VEYNʧ7٥]A*q)$ix')viGsG-w(JB f9E-Pj*l!@⽎! ؍qhg&MgG& 犚2 Z8l>\V _Hv򪺄J4`rEZ` irED 5{Fw*,a]ҰoSA݌pvEp]cBs҇W5Q\5&%,^:s7Wu\W`ITaʪ2ב5`ht!1q2ġÐNqVV6ە=- gOPnƸTNcinMS?; WG e *=Wx֟X PտYFLx ؇c57 2n_㚴͟JIw4Kni p /-K~4b+4t=޹B$6I}rx5lq_?Z;BZ%kF1OTB P&JI%7!}\xy*J^N{p B!9'ʙ<#{r0@9mxK#ǨH95IMPI:BD!6@tJҌqsZSSߡMVdk@c v٢卢cTMV̩E`&`Dg9c޶݀ 63l+VHi2ZFV#kl|jWX`Kyw5Y;[;G(u7c)HYf մk0w=xu;h$ VH{[+_!32d:d͑OZ%¥.@yɔ̈/lk LA9Mf +9bb+"jztvH`uk$b|pIZ'; 'kQw4VuPMas>DQ3ʩ@YL IzMIp=kEˀZ,u=Cr;խ4mjծ1Cq{j+۪Fj.Ggq#ʷƉi&u3Il=UOʴg+L_~2b珵[K0eSv7;u?ms5Z%Lϴ‘/u6丽HhECⵒ/ VƷn|p8ksN$֪}Dfng("8ݟMDKגV(]O+dWYemp>Y5pODIbA4W0h,,h%XդDf>UMW: Or> %3JA\zyQH^_> 4ddx€%w((/Jsl~><Τ\y\B"2)|ڀ, ː;ы=GrV2(,Gg2 ,=jxvhwm>םMr֙{Ò[/WE $DvNHP8zD/AaۚEoyggk X4Ej^Y\1mE8ҥ}TxQ2g %V  N-v-Xl|+*-CŌX|ʔ0  0r3B-NḲzȪ\3tEGF%mVʯ;q~VГאW gfG# +@8# > QqġR8GS R ʙok*%ױLe=ұFƈ)O??ViehO7m;)cj2+/ udp0eU9! ya71ʁځ1*WDt2*+gQ]7R8d.zV k,Op㶲ʮ6Rg"X啔#Q9=;1HKi_WٕW3+z3M});s4Z 0@]M]UZa真QR^^It)/LHvkNy /rֵ ƙlI-63:. ji,jTko&mE+iFuTj%srӹ%JdS 2$CcKj+57)'Lڌ݁`| ! b`9GO#>54_ZadQ 6hT̸; +=aoYYW|蔗D{pƭ: @E;rKCL5;Fybnϕh+2k|^ NۻWS{4)}k%p+EZ7\,C9pΚ>Oh/]*`)Ks»qQ'L8S@`}q*B}3-lgOLOrOjdM?fguv4d?CPΣң!dr4p {KMøu-Y蝐2I>(09z"rնh[餷RۛBF,MWijDK,{5̾`'D6~\VF8]^']_BF}W]Cm >|SM=ln%(,\}\Q7ԧ 3{n;UZx_@qM0:fw[U2kDbҶp|y|P0)6$HǶN1(؎*NDkU<8h3B d>ho,R2'G]cEtϪ4Zќo(vS=gO˨ 9I"ʱ4R[*)=Hy1J13;w;'֘ =%>a*zo$uc򵎯kKmՁYHk]S5]&U_ `@j&V?ȨXE6,4ڏWIwȶHoi _hHNMeu$m6XBCWnHW\-Vs?aaOwqt-7PΗo (֙on`K<&Dﭓ걫L[Mg]+ZtMoܟ?L>\a9cwD!ݒaN2M6LiR ?d|jkHb/݊~!rY^_ ǐ#,SH訖Dep ;}?-6dʣc6ݥ*nTD=57@!RHwD9jѵ@lC7"HcH"P c6d?? rG1Umvi!b cL#r5^2Mkv(T69VC+rU@2$[8":2d>*:1,ǺܭeϝDmnqsV#on-3H7m=%zћ e\m3*dΌA!"rs§B}@jazcDDZc:}}R^ҷs;hW7vLסXh2ݬU$ 2G,gΘOF%JK6\ķ)m,Hl;8 }u!A2!13cr\RޣooK9ب2ARRk3j.2 1ﬖ|r,:Z[pd9? YD7dHYv޼~ک͜˒ ykwC"LȧuOIi G2BiǧEp07bfܩv6± n E/*NF*?W)e&ǡQ$hp7R^סa6fqᘈֹ+fd2J%QL $ M o3gTӍF j(|0%6$`\@o1Zkv6b䆓h\q1LK]ORj]N}F-m?lXG1 0qđ(6M'4W96_^5Х"KjZV?pv]`~աtHQrO<]Z^ޑ;OqӆΖE̐ y{Sg2VI7ٹ`+hOΫ>㔜ѾT.'_wrmoƶIo1`YkX%\Z-"+0Ա-ZTaܴXpם#޳mL%$=}||(s)vߨo';e[0E[SmYA跏̓ZD>H) }!. )v' Z䲨9$j;֢e?eK|zb-Xz^'JkZݡR{6)贄p|MxL5ǕBk}PJlدDt^z vbI2TsNZkGrF(RMoi,F +o6?"IDzzZhEIu|ymL\an֊HbwRCt:_BHHaUOx͜a\w_Bb6# AC7RĽ yv2kF:Iqgzt0-㹡vYCe,m-ԝݼ=k&V˨;m϶ݿҮCKoOGyǾryJR+`ul`0v# ί^ʫ!r%ךmb;y1lWu_E*'"Ww<!,3\.O0@u#ʎ޵<-I4G tF2(|T6՗q[^\ ,1<ϼv2Ql;Jյ[&9.Au`=1)դIUǰ_.+X"\r+b>eZ3#s^ 9~'.odZt^@x*U3U+>4.QG'teȀ(!ORh.bl#W<ջgF4 Q;K9ni3㊳+N@?uWrd-XɎ%xO&ZR#Uq/ǵ?v$O4A\lmp==٭ܨ ңd(Lm mM:(]E4 gh }  {3+n7K63x&CJmbǚEAn3El,-#}(NKv#{.ܨ?ªGXMrְ/tȬxtd``gvi n] 7Enk }{S)e_ i-\,R(K/v4M#jmf!rB/ ceqˆyfqg^h(U+*5>;.9C[|煞ҝkjEs!Et8>٭թOuo"Â;ލ޶|剅}452EI 3cDeXEUjer=jUeHQ ffY-x>H:ŭ G.H!tgжWq $[ -vW-->1-t2;rA<:V]Qoou1S`mg hV `6s(Ͷgq$ʒ/.\Gvh<̈!3HGTv&~u\['&@>uu}¬i |%jj5( c"B^Wn~4Fego23nka4D}} FrM_+H߸ 4nbV=ap*>&ˀ>S!"aQn'sA}d8"Q ̝ "|\~Tz(De1H}5PZGV5Fn Z_2*@2HQP Ax6L?99*&GH|M3^j|lwkҔHv&k/XQ_s E:wXJ(_hj*>O +]~9 x]moC3O5`yMU=j~ޡRdA'(Pt*\iwD"q //jODQGCkl0ʥt% c+$GQcgߊa8Hx1B@\C!w1Oųmql% vuPǁ3[ŀY)X_]3+&7ǥ[[Sw}DQρFeխS; \_0N}˜V?qL1&tiْY[o:'Lw7@sTMp*^Y=2j+kMnLvV?S7\Lشp!>$' ̋gkYӡbؑXii0~\VThklG̔)F7m]CX%j4@˱4/JjWfk :n?[6~=ugTu4rؾR؝?F]౔jse3`duCH'+)wpDWLyRelݠ G l^8WfTo,^΍NQj6):_>HhLcvpMO"Ĉ 0}3\[{-j 54ԶnFdRt}ڣ[1+02M9}QuJ,veC&twɸ[ux`~|SSJiV[g chFrMǂk7Y̑B4j0=C4 <ι]M[}>FcxؔoxIzdhї`<H8Ǒ[u?}Z74\Mpߺ['u/[mÈmAۭIkElG*D{GM3(ج#0#mY`qǺ>պM+w#.B,]Y!]/hR(zfΓDaƑ6:1 iO`ܷZgn|imI7qV (> ]ݵ̃ 6N9'%3T/{T" _m2>%Z\v݉ _ Sݘ=2d䀤 ^,2DFIil|? mѠ3HMqc xc[K5 z3*%9TNoBY-ᄞ7ZTK[i+! v<8/!bHjK/6k яHN`-˰{ܫc05P#P|X/~N7¸0ݹm#1Ԉ#;q6eb,x o\qkNpsRMu tG_R/LO˗/WQKFKh"/2.Ы9n87hIPw&-~<\i%ZRQ]? j<ٜJnmS*%ŋ'GkhQhu\Λ]>H5&v;oF8?ί BiZShV"1N9xAlw vm,TM臋@?1U[DK /#>,Rb^ƒMV=aVc?VTg^| 5D$P[?eO?3A䷉HUfVV 1,3rOiG:K[[Z[ >g~.pZwQ2LqJ!7cP"u~]EC 2׵kkVkFor݀8 :ޟ6sF쌜m ;6lXetoRU! )Lq .FD%hQ^$lV2*-ϵF֢<{+'זHӤj73zDGϣ+&q)q~UזcO)@[AM Mh y͜|yTK bxa]0ZĤMj9$ ِ? >&(|;NpEP\̚e&,q*5շBuI\>ߗ&I/}c3!b~C~`'(7gW unф~۹@**~?M&Kts.2+? VCB=K۩ X3h`r[$Ѝpck*==m_w8k+c&.&$.(9&o NN,ȱۓJjҴۭ^gtß%'+TZV$Arg4Փ{]>+ ,a!;`;YʓAF!`A1X;SMg@k9^mqgp- PC\BF Bgw;8Oz# isKPkC+ݰbea!0a'<\^@8AVsVhB{yT$GnyNe2v0'ӏO*ɮn|Ҟujӟ^<R Lg9}i"'x3$ZjZ|VhU<4ʈh . 3F܂he~-I'`iiGi.@uQ$2a >: GYYF5 #9xlj}8d?n|"Ɨvn6~57Mu\br`TnUq)tikic/4m3z&KI/pVL)(#,0IJ[QK˭kGqcYtݶ_B2q5;M7JwK9AR4'ymc` 35Gj P1 0zc]BС{ۆ[NGıV:K;@ Gc*_j+y 6d #z̿x 횆yK`g|IX rtxӴDs*\ަYA({pͻ[ FF|9U< m6oNv7:Es|{r qV624Qb;.3{HC[u&}B+\ >CljGxX'њHI5ݞBA5 $(n#qIthU=5f{1!G5jFJ@*Ȩ4N΃Ԍ}DuԴB8G#y&4ue3Ii6?ڍgb::IqnNW>A5kjFkxiWLgӊX)?|NJ8ŹXfzⲍ$SX5hen2Funnq%CQA. Ef$Jϛki{?qU%EwlcB+Wƀj.U[٘"܃.:M݆^=[*X>a>TZo#2 A{~] pSpZ4VM_}NLKLEplEoz}7MnPq5M7h[%;Hh03{Ε+;g,,J ?aGivTs}f]bda!?1ho}[^#?Ol=іMYjo~hf#siVmQkҦ{i="Gr^Ƥ]hѣ4d0Au.+7u[բr`Gp1GӴM=Ċ} _GR8a|;kXʼnde<;X6ĨY-ǫwl5̋ {6,5D2@sܠYKk?Єv9cn yN#_hcqFmzG"$Fk!nL]7DǦYj7qG Ip2}„$7\s<?"* xWrPsNXhpK=L7Ͱsn׶Wx9tr*iY]IkbQ%#׊M.PR@ML\,f4vy' jOA;+[$e}3@Cw2:J1R/5ͦm4Mu%č'<Ȯop!&ČA=r6s9m%2M$`oiDxT3Pϸ)`[Ρ:Ig5 DckVV)^%,;a'dtg,>S[W9=Y:#4cOJ{~&08 UE K,Ӯ~n;cKR\A|eb򙸐d[u-]ܛaPXcpTq=u7 X'C5^lr9ϭePxJ +ՕtdIm%Dw{C pr#7V'!*XdAN#.o*z^[;Ȍ? I3&2BH#~,{iuk|T~srqJS(0XSjQiNo* Qhp[œ#kGLX"GqV8d?+HʕՅ_Xu(7Dy IF7I?Rnegu=[ Hn@DjCb9~F11HJzťE^Z!W_S˱ ю~5_^Kt&{p pq.s5:Pgd@ΆPAa5ݒ@ Ktb9TU!s)Mek40a~Bo9@ A(7lAD4'9KF$e>Kw_x$[K|1? |y ߢlP0$[olte`3s<ܺۂ(m 59c+9dF;D^<͸i1Е٘3Nt$9 1ds`0瑰>VWQ,lqe: b-ZÀ6ĩϾ7q]a=uԯk=mнVyKkqRrn5i w9ě g5mn "t2I%JTjڻTI)u . YYRDۼ6Ь0FT4'%qĎVi5sC4p H hQh꺸|Kʛ #MXb`K3@2*Țh0ѥ1{,_Hly@Ɵritd[ f3\]d]YnwjCϵϩl5S,SVt!iL?e}+>yƹ)w`4eBHYPQ4=\un=ȧdr Ft=Eo=.Og[a}=U+I]^)0hu-J<l⡹P}CWvaPՃq쓁^6L0ڄ~F(=;{7v=SBQF9, ~b6?j6'5Ww$A0zNLt(;HoePi8κtװMnaUFm?*[D;`9Pcn+;iX8d:40Ȍng+sJvOx2./ Z}kE$Q?5n˺HCmG8eֳJnB)9QXBfr´[RKc)R>F @Bp>|ή_6+*Xx=Ջ -ayѽ iB܆6apsϝܦSk> \xbM Pյkֵ죟_'m.O{ \;YZL W;>g{N->ݚTH[qڬ1] :[C6Ė+(KOy!d?k+((nd/nh~4?qsW1G¼1NLscߑPGֶ/cq%"ѐQʭ! Uo<'UF24a6,E7P'H!&h֑I^ǟ֥M$@Bc0{&*괞 涌eE}r)g #xHk fC߃I<0+dK8Bh n:;>:뫵n )eǤgWMԉt5' }kp [x}4t=bL㧵\.x}?Tiuq?W2#֡7'Kz~)&8 !U·tfD&G[Ǔق42@PP]B<jkii2.0>]+mKb/V[ʶu/.~#ףc nJAg֍Ժ|wϭ^iN?FmȣרbZ8 ~Թ+w [ ES/9kseeV Nԣ.e IrjZyH 0?$?F}Bܘ-Kخ+F;u{byqȿF ?S^<2j[(V-Ūݣ3yrƦׇ'M0M\}<Jj e4J8 U`c֒_;+1 oO_ZKZD u-+a~GA,{wWkq0RdF8YkH ElM]̻x 0Dq9Fz; [;@Ǎ?فi:SAG8 v?+@$nnusN~U??y{4; Jn=ķSXC`tK|Œ:GK)C$v=.4FK6"|F`z[JH9=+F-3iJpIW(Ȏ-*1@Uiwqڋ@b{pPau5M Zf%,.JD}jOѺPt]jC$BϪ zL4e 7FVxtqU?gO#ܕ:O=-9;|YN/Ѡ9kMUl/>׶CO Q{6W‰X#O@[,η5 sMs1t;'KI3Q58=##\AV~ԱUf\{"$fii:b[ VJ^b8zU 1++ym#r[ض-Mʷ"#ǢBTMq$H&4ou 3dM xYݪ + z"wTS#{(EQ0>fkn*3dh`8 f`+#{nU~) -a'2(|Rd;?{[|ՙ!W1Ob<%]hɭ|(coz@ (&U4jIӻ{b-Ҽ%sXrw-`~\gCKzwCq>U 򚡿 /G њ0ܧkbu2 ;й;j01k ټy1i@C~8˲'?:r.vw1Y *ϕG6,3$e'qN@I¦ͨs2Zfa;1V ٴg b cʶğS]eTƼtfe!@Sp=?Uie C{'~0'V 4$Ɓwm~'rj9IfwS"N.䦫DQTUH1|5SS-ݾ=>b|D Ϟ*#1MO o?WAVV8:t7`S|D!io|ldw?]OE󧬉+KGpG}9" ^__\=N.2;Yk1w pK5ZduDב튉8DAJ,eUi~;P#&~uz$+@v.*Xf'GWA ſ3Sp971:zRUZRvy4zLu\SV C"' aEg! b9@?0(Հ:~T=ySE5=ȿ1jwF*9C(?O 1]Pt6Û=7(47M-kw"#P@|?XF) e[-ϸ )Fvo>Nc]\=r Nbm`*3{s]Pt.7?agMX#%iDdU W==ՋP}m 0?YYJ\3b6Kwq*1FAuee=m}V9YYOB7QbPGU;eeku,#YYRzV(; VN)[ #򬬫]ϲI핼a n޵(*'5z8.^C1н&HBⲲj 68jqʲ_eħ38沲o f,VVUa鑗R0kjՐF_Zc5O*I;VVPc e yy^ :'G sɛ_pMPB8P6@++)ee03֒oLAst?MeeLJ85LVVQ}u=1DeT3Aw0!;VGQ$VVW::28P|U@kScYYS.l͠g?*Av2JYYW9*HVVWQE-9wi=ijs#JYcc.'h|tǤ룪Z]n*=j_LU.kIT@ߧJCƔG`iU{|T5AZ l۝B4+k38&йƍa)N%fꉤL F@r|~cY'{dXnTQ]9<+rSm҈#Nx59% |9LY2G |M|7!E꫄4yb4`~mj}CE(s^)}W5d;UI,r$ysRSV^aH`0L`v2#~fƼE1O^ Rӳ%iov~Lmm- <8 PAQs}WRҪSG4񴆪fS r[q8n}GyVJ<7AO,|;T {Gr8ƔOFS LM) f?÷Q:z܏ıIq8Ud#9=uh}ej%Jl@8+<ΝteHjTQN'g9zn4hIYU(DYjÙܪˌw11uozRq1O:״RG"8!Q}>> GJɗ#ypZf;:^u{Tk̪eAzܺ*-+H $y X%^䧟:Է6B93yFri \=F=)~[7꣒Ed;gM(۫Z1G촡A9ֳ[}?~ Q #UU njέ^*04Vϰ,>##qbqI]ۙli֙E]%aIcY6Bέ{m3M-Ҏ>"[Xw4ld/"_ϻ^u%ELK/I 9]9hXV$ 2K@A#)v~*O^QpV_4T)Ҽ7v}ߦHTDRzN^X^'QѣBJpDdd983d[1j$ȹ?2~zS#4*gVFC4gOnGϼt Gxx;U eI8<{LUP^Ö<`& E32u]<Ku d#~K{A8;E}ƳnR=$nO!| 1E9%9q'+@q)t>Ѧ=Jx|w\ ##S)N8$T -4^d読r$ϲ>lxw{ZG6h֔ޤ XGѣFa k$~Z4h<σֿw[9ʫhѬn4KV>cuͱ)BfPF+A ͕$΍4S^( N/ 0|DTimes New RomanttP!  0D[SOes New RomanttP!  0 DArialNew RomanttP!  0"0DTahomaew RomanttP!  0"@DWingdingsRomanttP!  0 C0.  @n?" dd@  @@`` d \ `   **** ; <=   > ?!@"A#B$C%D&E'F(G)H*I+J,K-L.M/O0P1Q2R3S4T5U6V7W8X9Y:[NZ\^_`dfh R$SxQk/2C $R$1,v͒  R$]#ϧ -qp R$.痢-U s%R$qֈ7⋀`< 0R$1Wwn>m˥0 ;R$ @&h 4GR$͎6Ëh SR$ϲkB<&٬ `R$ЯcD>ޣ. bnR$(輟fnEkSy {R$f/bϺ>""%C ȆR$`bI` (R9D͒8\ cR$Y.Z*g3=$ R$fK, - $XhR$!;#i: I 0AA@867* g4?d?dxO!  0ppp@ g49d9d!  0p@ pp<4!d!d@w 0tP! ʚ;ʚ;<4dddd@ x 0@<4BdBd@ x 0@,80___PPT10 ?  %O  =KCrime Scene Investigation0   0PPP$   & There is not only the effect of the criminal on the scene to be considered, but also the manner in which the scene may have imparted traces to the criminal (Charles E. O Hara, Fundamentals of Criminal Investigation).>$0$($(   P  ' There is not only the effect of the criminal on the scene to be considered, but also the manner in which the scene may have imparted traces to the criminal (Charles E. O Hara, Fundamentals of Criminal Investigation).@((    P  What is a crime scene?(  As small as a computer or as large as a plane crash A crime scene is the largest area that may contain evidence for later investigation 03 T    What is physical evidence?(  Includes any and all objects that can establish that a crime has been committed or that can provide a link between a crime and its victim or a crime and its perpetratorP  (Why Forensic Science? ($  hForensic science is an important element of the total investigative process It begins at the crime sceneiPih  )/What does crime scene investigation consist of?0/($ 0 ;Crime scene investigation consists of certain preliminaries<P< < - /What does crime scene investigation consist of?0/($ 0 UCrime scene investigation consists of certain preliminaries Followed by documentationVPV V .!/What does crime scene investigation consist of?0/($ 0 mCrime scene investigation consists of certain preliminaries Followed by documentation Then the collection andnPn n /"/What does crime scene investigation consist of?0/($ 0 Crime scene investigation consists of certain preliminaries Followed by documentation Then the collection and Preservation of evidenceP   (  After these things occur, the crime scene can be reconstructed REMEMBER-- at all times certain legal considerations must be followed.0Z1I   Preliminary Actions(  kIt is the responsibility of the first officer on the scene to take steps to preserve and protect the area. &lZik *Preliminary Actions(  The priorities are: 0#Preliminary Actions(  +The priorities are: save and preserve life 2Z+ 1$Preliminary Actions(  KThe priorities are: save and preserve life provide first aid to any injured28Z8 L 2%Preliminary Actions(  {The priorities are: save and preserve life provide first aid to any injured arrest, detain, and remove any suspect present 2hZh{ +Preliminary Actions(  OEnsure that the scene is safe for investigators and forensic examiners to enterPO P 3&Preliminary Actions(  tEnsure that the scene is safe for investigators and forensic examiners to enter Secure and preserve the crime scene 0P%ZO%t ,At the Scene& ..($  'Secure and preserve the crime scene by:(Z( ( 4'At the Scene& .($  WSecure and preserve the crime scene by: keeping a record of anyone who enters or leaves*(Z0Z(0 X 5(At the Scene& .($  tSecure and preserve the crime scene by: keeping a record of anyone who enters or leaves record and preserve evidence*(ZMZ(M u 6)At the Scene& .($  Secure and preserve the crime scene by: keeping a record of anyone who enters or leaves record and preserve evidence identify and locate any witnesses and keep them separate until statements have been taken *(ZZ( 7*At the Scene& .($  Secure and preserve the crime scene by: keeping a record of anyone who enters or leaves record and preserve evidence identify and locate any witnesses and keep them separate until statements have been taken communicate with the senior officer who is investigating*(ZZ( DOnce the scene has been secured& & . # Lead investigator will 2$   9,DOnce the scene has been secured& & . # )Lead investigator will evaluate the area2$  * :-DOnce the scene has been secured& & . # ?Lead investigator will evaluate the area establish boundaries 2($(  @ ;.DOnce the scene has been secured& & . # Lead investigator will evaluate the area establish boundaries determine the perpetrator s path of entry and exit2Z$Z  r ?/Documentation   ;Three methods of crime scene recording are: 1. photography*,,$  < @0Documentation   HThree methods of crime scene recording are: 1. Photography 2. Sketches*,,$  I A1Documentation   RThree methods of crime scene recording are: 1. Photography 2. Sketches 3. Notes*,',$'  S B2 Photography  `A good photographic record helps: a. Document the facts and physical circumstances of the scene*"?"$?  a C3 Photography  A good photographic record helps: a. Document the facts and physical circumstances of the scene b. Record evidence that cannot be easily brought to court *"{"${   D4 Photography  ' c. Permit reconstruction of the crime*'$'  ( E5 Photography  a c. Permit reconstruction of the crime d. Reveal evidence that otherwise might have been missed.PaP a b F6 Photography  4 c. Permit reconstruction of the crime d. Reveal evidence that otherwise might have been missed e. Serve to refresh the investigator s mind at any time*$   O7 Photography  FTo be effective, photography should meet certain fundamental criteria:GG$ G P8 Photography  To be effective, photography should meet certain fundamental criteria: 1. It should occur immediately-- before other stages of the investigation*GKG$K   S9 Photography  To be effective, photography should meet certain fundamental criteria: 1. It should occur immediately-- before other stages of the investigation (scene must be in an untouched condition)*GuG$u   qH Photography 0  l2. Each scene should be photographed as completely as possible and be documented into notes and the sketch.mm  m T: Photography  vPhotographs should include a. Area where crime took place, as well as any adjacent areas b. Points of entry and exit*\$\  w U; Photography  Photographs should include a. Area where crime took place, as well as any adjacent areas b. Points of entry and exit c. Various angles*o$o   V< Photography  Photographs should include a. Area where crime took place, as well as any adjacent areas b. Points of entry and exit c. Various angles d. All walls and adjacent rooms (if inside)*$   W= Photography 0  Oe. Position and location of evidence and/or body relative to the entire scene PP  P X> Photography 0  e. Position and location of evidence and/ or body relative to the entire scene f. Close-ups of injuries, weapons, and other physical evidence   Y? Photography 0  e. Position and location of evidence and/or body relative to the entire scene f. Close-ups of injuries, weapons, and other physical evidence g. Surface under body after it is moved   Z@ Photography 0  e. Position and location of body relative to the entire scene f. Close-ups of injuries, weapons, and other physical evidence g. Surface under body after it is moved   rI Photography 0  Xh. All bloodstains i. all latent fingerprints after dusting and before they are liftedYY  Y sJ Photography  ^The use of videotaping is also becoming increasingly popular as an alternative to photographs.cA Sketches  0  {Sketches are made after the photographs by the crime scene investigator Complements the photos and notes made at the scene.||$ | dB Sketches  0  VSketches have several advantages: 1. can display areas photos cannot (ie. floor plan)*"5"$5 &G   eC Sketches  0  Sketches have several advantages: 1. can display areas photos cannot (ie. floor plan) 2. ties together multiple views and eliminates distortion*"p"$p &G  I fD Sketches  0  " 3. eliminates unnecessary detail*"$"  # kE Sketches  0  ] 3. eliminates unnecessary detail 4. illustrates location of evidence not visible in photos*]$]  ^ lF Sketches  0   3. eliminates unnecessary detail 4. illustrates location of evidence not visible in photos 5. can be used to accurately plot measurements made at the scene*$   mG Sketches  0  cConsists of: Rough sketch-- made at the scene (no changes are made after investigator leaves scene)* W $W  d tK Rough Sketch 0  imust include accurate dimensions of the scene. must show the location of all objects relevant to the casejj$ j uL Rough Sketch 0  No changes should be made to the original sketch after the investigator has left the scene. location of objects is done through triangulation.$  wN Triangulation0  )take 3 measurements from 2 fixed points. **$ * vMFinal (finished) Sketch0  Final sketch-- prepared from the original sketch and notes Includes: name of investigator date and time of sketch crime classification and case number*ERE R  xOFinal (finished) Sketch0  mname of any assistants address of crime scene directional notation (North) scale legend location of evidencenn n yPFinal (finished) Sketch0  2Accuracy is the most important part of the sketch.33$ 3 /d<=>G H I J K LMNQR[\]^_`abghijno p!3  0` ff3۽qf̥` ffy`%` Mj*3..R|:` qnZX-mo` +T3f3f` eaQ/-%sj` ƢL|xN3` TTjo` ykDweI>?" dd@,?nAd@    @ `  n?" dd@   @@``PR    @ ` `6p>> ..))L.(  (T Z g~  "gZ ~  T?d @?"UK2  T?d @?"  ZŖ?d @?"U[   s lBBC`DEhFtd @`*N<<B$< $ $< T``*6<$<066$HNN 0**78@`@`" I  Zh?d @?"ou   Z?d @?"b    Z?d @?"t z    ZӒ?d @?"  d   Z>?d @?" N J   c BoCDE<FFd @$$bcor>l $@`" i    c BC~DEFd @!!3Ol6  *06<<ZHTZ%flxnx~i~~ o DH@`"~  c DBCDEXFbd @6B`x%a,zW<<6=*H .0@`"=~2  c BCZDEF @!!Vm+~`6  $6*f6<BUNT8TZ9ZZ?DH@`"~a  c BfCDE F*d @f HHHBff@`" Y   s |BZC`DEpF|d @0`HHT0Z$TB* $ BT0`0`0 BHH$H06B0NB0 0 0 ;<@`@`" M   s BZClDEFd @!!Z fl6lN`ZHT*B6 0000BZZ B0$*0BH0NHNTB`*f`Z N B BEH@`@`" M T  c BfCDE F*d @fHHHBff@`"^Q  s |BTC`DEpF|d @*`BNT6TB* * BT*`*`0 BHH*B66H*T*TH60 0 ;<@`@`"dE  s BZClDEFd @!!Zfl<lT`ZTZBT$H<660 0BZZB0$*0 N*TBBZ6`*``TNBBEH@`@`"^  s lBBC`DEhFtd @`6HB0B6 $<T`` 066$00$BNB 0   78@`@`"4 v%  c B" CDE F* @ " H`GN  @`" g#  s BTC_DEtFd @$_<MN5T*TH* $;S$_$_0 BHH*B50G*M$MA0 0 0 =@@`@`"v    s BZClDEFd @"" `l*lBfTNZBT0B0 $ 6N ` ` H6$ 0B$N6NHHT0`$`ZT H HGH@`@`"   s dBGCZDEdFpd @GZG<G$< $ $<N6ZGZGZ*6<*<B<H<N*HB 0 58@`@`"`  z2  T?y @?" 2  T?d @?"Z 82  Z?d @?"   s |BZC`DEpF|d @B`NBZ*N<*<N0ZB`B`*<HH$H0BH<N<T*HB***;<@`@`",  s BHClDEFd @!!Z fl0lB`HBB*<0**$0BZZ B0$$6<0BHBT6`f` Z N B BEH@`@`".v   T? @?"; ! T?d @?"  " " T?d @?"|I # c BC(DE F(y @( T < HHN0XB@"! * $ c B<CDE,F6 @ $0N< N/$_@`"I % 6  " ` !  PUSQdkYkHrh7h_   & & 0  S"? `   8USQdkYkHre,g7h_ ,{N~ ,{ N~ ,{V~ ,{N~   ' 6  #" `s `   h*0    ( 6  #" `s    j*0    ) 6(  #" `s `   j*0   T  <2޽h ? ff3۽qf̥80___PPT10. / Balance/ 6 0 .x.)).(  (T Z g~  "gZ ~  T?d @?"UK2  T?d @?"  ZŖ?d @?"U[   s lBBC`DEhFtd @`*N<<B$< $ $< T``*6<$<066$HNN 0**78@`@`" I  Zh?d @?"ou   Z?d @?"b    Z?d @?"t z    ZӒ?d @?"  d   Z>?d @?" N J   c BoCDE<FFd @$$bcor>l $@`" i    c BC~DEFd @!!3Ol6  *06<<ZHTZ%flxnx~i~~ o DH@`"~  c DBCDEXFbd @6B`x%a,zW<<6=*H .0@`"=~2  c BCZDEF @!!Vm+~`6  $6*f6<BUNT8TZ9ZZ?DH@`"~a  c BfCDE F*d @f HHHBff@`" Y   s |BZC`DEpF|d @0`HHT0Z$TB* $ BT0`0`0 BHH$H06B0NB0 0 0 ;<@`@`" M   s BZClDEFd @!!Z fl6lN`ZHT*B6 0000BZZ B0$*0BH0NHNTB`*f`Z N B BEH@`@`" M T  c BfCDE F*d @fHHHBff@`"^Q  s |BTC`DEpF|d @*`BNT6TB* * BT*`*`0 BHH*B66H*T*TH60 0 ;<@`@`"dE  s BZClDEFd @!!Zfl<lT`ZTZBT$H<660 0BZZB0$*0 N*TBBZ6`*``TNBBEH@`@`"^  s lBBC`DEhFtd @`6HB0B6 $<T`` 066$00$BNB 0   78@`@`"4 v%  c B" CDE F* @ " H`GN  @`" g#  s BTC_DEtFd @$_<MN5T*TH* $;S$_$_0 BHH*B50G*M$MA0 0 0 =@@`@`"v    s BZClDEFd @"" `l*lBfTNZBT0B0 $ 6N ` ` H6$ 0B$N6NHHT0`$`ZT H HGH@`@`"   s dBGCZDEdFpd @GZG<G$< $ $<N6ZGZGZ*6<*<B<H<N*HB 0 58@`@`"`  z2  T?y @?" 2  T?d @?"Z 82  Z?d @?"   s |BZC`DEpF|d @B`NBZ*N<*<N0ZB`B`*<HH$H0BH<N<T*HB***;<@`@`",  s BHClDEFd @!!Z fl0lB`HBB*<0**$0BZZ B0$$6<0BHBT6`f` Z N B BEH@`@`".v   T? @?"; ! T?d @?"  " " T?d @?"|I # c BC(DE F(y @( T < HHN0XB@"! * $ c B<CDE,F6 @ $0N< N/$_@`"I % 649  #" `s `   h*0    & 6>  #" `s    j*0    ' 0=  " `     RUSQdkYkHroRh7h_  ( <C  "Z   PUSQdkYkHrh7h_    ) 6H  #" `s `   j*0   T  <2޽h ? ff3۽qf̥80___PPT10. /,6 0 @ <(     0,I  P   I  b*     0I     I  d*   d  c $ ?  I   0I   0 I  8USQdkYkHre,g7h_ ,{N~ ,{ N~ ,{V~ ,{N~    6tI  _P  I  b*     64I  _  I  d*   H  0޽h ? 3380___PPT10.vO 0(0(    0t"  P   "  `*     0"     "  b*     6`"  _P  "  `*     6"  _  "  b*   H  0޽h ? 3380___PPT10.vOgV  6 0 " (  r  S H % `     S  & `   "p`Ppp  C HA0outside house with tapePH  0޽h ? ff3۽qf̥___PPT10i.O+D=' G = @B +g7 0 p(  r  S Q (Pp   l  C S ' `     H  0޽h ? ff3۽qf̥y___PPT10Y+D=' G = @B + 6 0 `r( f x  c $de % `   x  c $police in woods at crime sceneP &H  0޽h ? ff3۽qf̥___PPT10i.}O+D=' G = @B + 6 0  0(  x  c $_ % `   x  c $h` & `   H  0޽h ? ff3۽qf̥___PPT10i.}O+D=' G = @B + 6 0 00( )pM@ x  c $xg % `   x  c $Ph & `   H  0޽h ? ff3۽qf̥___PPT10i.}O+D=' G = @B + 6 0 @0(  x  c $u % `   x  c $8v & `   H  0޽h ? ff3۽qf̥___PPT10i.}O+D=' G = @B + 6 0 P0( )pM@ x  c $ % `   x  c $4 & `   H  0޽h ? ff3۽qf̥___PPT10i.}O+D=' G = @B + 6 0 `(  x  c $ % `   x  c $H & `   n  C FA.covered body on street }H  0޽h ? ff3۽qf̥___PPT10i.}O+D=' G = @B + 6 0 p0(  x  c $h % `   x  c $ & `   H  0޽h ? ff3۽qf̥___PPT10i.}O+D=' G = @B + 6 0 0(  x  c $ % `   x  c $d & `   H  0޽h ? ff3۽qf̥___PPT10i.}O+D=' G = @B + 6 0  0(   x   c $ % `   x   c $ & `   H   0޽h ? ff3۽qf̥___PPT10i.}O+D=' G = @B + 6 0 00( )pM@ 0x 0 c $p % `   x 0 c $H & `   H 0 0޽h ? ff3۽qf̥___PPT10i.}O+D=' G = @B + 6 0 40(  4x 4 c $D % `   x 4 c $ & `   H 4 0޽h ? ff3۽qf̥___PPT10i.}O+D=' G = @B + 6 0 80(  8x 8 c $P, % `   x 8 c $- & `   H 8 0޽h ? ff3۽qf̥___PPT10i.}O+D=' G = @B + 6 0 |:(  |r | S hL % `    | S R & `   "p`PpH | 0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6 0 @F(  @x @ c $Y % `    @ c $a & `   "p`PpH @ 0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6 0 HF(  Hx H c $4k % `    H c $pr & `   "p`PpH H 0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6 0 PF( )pM@ Px P c $lz % `    P c $c & `   "p`PpH P 0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6  0  X(  Xx X c $$ % `    X c $} & `   "p`Pp^ X C 6Amed examininerpPr w H X 0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6  0 *"0h(  hx h c $̡% `    h c $& `  "p`Ppl h C DA ,crime scene sketch oj H h 0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6  0 @pF(  px p c $% `    p c $̗& `  "p`PpH p 0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B +- 6  0 D<Px(  xx x c $% `    x c $H& `  "p`Pp x C ^A Fbodies arranged at the crime scenePgH x 0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6  0 *"`(  x  c $ j% `     c $o& `  "p`Ppl  C DA ,shell casing at scene H  0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6 0 pF(  x  c $v% `     c $|& `  "p`PpH  0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B +) 6 0 @8(  x  c $% `     c $X&    "p`Pp  C ZA Bcrime scene pic blood oj walkway  E H  0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6 0 F(  x  c $X% `     c $& `  "p`PpH  0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6 0 F(  x  c $x% `     c $(e& `  "p`PpH  0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6 0 F(  x  c $\% `     c $& `  "p`PpH  0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6 0 F(  x  c $% `     c $t& `  "p`PpH  0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B +a 6 0 4( )pM@ 4l 4 C @% `   l 4 C & `  H 4 0޽h ? ff3۽qf̥y___PPT10Y+D=' G = @B + 6 0 .&(  x  c $x% `     c $3& `  "p`Ppp  C HA0outside scene no bodies  H  0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6 0 F(  x  c $89% `     c $@& `  "p`PpH  0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6 0 F(  x  c $\H% `     c $0P& `  "p`PpH  0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6 0 F(  x  c $䧒% `     c $dƒ& `  "p`PpH  0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6 0 ( ( )pM@ x  c $P% `     c $L& `  "p`Ppj  C BA*knife found at scene BH  0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6 0  F( )pM@ x  c $% `     c $͒& `  "p`PpH  0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6 0 0F(  x  c $Ӓ% `     c $ے& `  "p`PpH  0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B +a 6 0 8(  8l 8 C ܽ% `   l 8 C & `  H 8 0޽h ? ff3۽qf̥y___PPT10Y+D=' G = @B +a 6 0 <(  <l < C H% `   l < C  & `  H < 0޽h ? ff3۽qf̥y___PPT10Y+D=' G = @B + 6 0 @F( x x  c $’% `     c $lAI & `  "p`PpH  0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6 0 P(  x  c $II % `  I    c $|? & ` I  "p`Pp`  C 8A sketch template` $H  0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6 0 ` F(   x   c $SI % `  I     c $ ZI & ` I  "p`PpH   0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6 0 pF(  x  c $$bI % `  I    c $hI & ` I  "p`PpH  0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6 0 *"(  x  c $? % `  ?    c $qI & ` ?  "p`Ppl  C DA ,crime scene sketch oj IH  0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6  0 $F(  $x $ c $PyI % `  I   $ c $j? & ` I  "p`PpH $ 0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B + 6! 0 ,F(  ,x , c $I % `  I   , c $I & ` I  "p`PpH , 0޽h ? ff3۽qf̥___PPT10i.O@^@1+D=' G = @B +a 6 0 D(  Dl D C I % `  I  l D C ȕI & ` I  H D 0޽h ? ff3۽qf̥y___PPT10Y+D=' G = @B +a 6 0 H(  Hl H C I % `  I  l H C dI & ` I  H H 0޽h ? ff3۽qf̥y___PPT10Y+D=' G = @B +a 6 0 @\( Ⱦ1 \l \ C ԢI % `  I  l \ C I & ` I  H \ 0޽h ? ff3۽qf̥y___PPT10Y+D=' G = @B +a 6 0 L(  Ll L C tI % `  I  l L C LI & ` I  H L 0޽h ? ff3۽qf̥y___PPT10Y+D=' G = @B +a 6 0 `d(  dl d C ȰI % `  I  l d C I & ` I  H d 0޽h ? ff3۽qf̥y___PPT10Y+D=' G = @B +a 6 0 l( )pM@ ll l C I % `  I  l l C I & ` I  H l 0޽h ? ff3۽qf̥y___PPT10Y+D=' G = @B +Z 0 lj(  lX l C     I  l S #   0  I  lThe processes of Forensic Computing can be divided into three main areas: 1. Image Capture - The Imaging process is fundamental to any computer investigation. Our Legal Disk Imager creates an exact replica of the original media of the target, or suspect machine. The process of imaging will not alter any information on the target machine. The normal procedure of taking the image to WORM media allows the investigator to search for evidence without jeopardising the integrity of the original data. The Legal Disk Imager will automatically take two images to separate WORM media and perform a compare to ensure that a verified image has been taken. 2. Image Processing - The processing software consists of two modules, GenX and GenText, running automatically to index and extract text from all areas of the target image. Options are also available to perform a full extraction of files from the image if required. 3. Investigation - Once the processing has taken place full searches of all areas of the disk takes only seconds. Multiple searches for any combination of characters can be made. Frequently used words may also be set up as a library under a 'group' name for enhanced searching. Postcodes or phone numbers can be identified easily. h         H l 0޽h ? 3380___PPT10.O  0 D < t (  tX t C     I <  t S p   0  I  h Human resources Police were finding it very difficult to collect incriminating evidence to prosecute a known pimp. They raided his flat and came across a laptop. The investigating officers called in our forensic computing experts who used evidential procedures to extract data evidence. They found a spreadsheet which detailed all the pimps activities and the money he was taking! Money on disk Having been called out to repair a colour laser printer, the engineer became suspicious when he found half printed bank notes clogging up the printer. Police thus alerted contacted us to process the computer equipment seized on the suspect's premises. This included printers with internal buffer hard drives. We were able to image, index and map these. Subsequent analysis of the output data revealed incriminating images of bank notes, helping the police to prosecute the gentleman in question. Hidden bits The remains of a floppy disk were submitted by a wife who suspected her husband of cheating on her. The floppy disk had been deliberately cut to shreds. Using advanced media reconstruction methods, our hardware engineers were able to rebuild portions of the original data structure, revealing extracts from steamy love letters addressed to the husband's mistress. Disk swap A would be blackmailer thought himself safe when his computer was seized for imaging. He had typed the letters on a word processor but had saved them only to floppy disk which the Police did not have. He was most distressed when the letters turned up saved amid the temporary swap file on the hard drive of his Windows 95 FAT 32 computer system. Tapes rarely lie... An imaginative business owner was importing duty free alcohol and cigarettes and was then reselling these through his business. In the process of suppressing the information for his VAT returns he had to maintain two sets of accounts. Investigating his computer system revealed nothing - but extracting old backup data from an overwritten backup tape allowed the authorities to achieve a successful prosecution. Narcotics More than 50 PCs, laptops and a UNIX system were imaged successfully, resulting in one of the biggest drugs prosecutions in UK legal history. Fraud The suspect deleted the evidence, but Imager revealed spreadsheet fragments and incriminating letters which secured a conviction. Pornography A contacts database was concealed inside the images of a graphics library. Searching with Emulator revealed names and telephone numbers, and led to a successful prosecution. Theft A business suspected of handling stolen computer parts was caught when traceable files were read from a "new" hard disk. i Pi 4    H t 0޽h ? 3380___PPT10.O6 0 F(  X  C     I   S pC   0  I  H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 3380___PPT10.Od, 0 DR(  D^ D S     I  D c $   0  I  H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H D 0޽h ? 33- 0 LR(  L^ L S     I  L c $!   0  I  H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H L 0޽h ? 33. 0 TR(  T^ T S     I  T c $d   0  I  H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H T 0޽h ? 33/ 0 \R(  \^ \ S     I  \ c $`s   0   H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H \ 0޽h ? 330 0  lR(  l^ l S      l c $   0   H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H l 0޽h ? 331 0 0tR(  t^ t S      t c $   0   H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H t 0޽h ? 332 0 @|R(  |^ | S      | c $   0   H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H | 0޽h ? 333 0 PR(  ^  S       c $p  0   H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 334 0 `R(  ^  S       c $)   0   H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 335 0 pR(  ^  S       c $=   0   H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 336 0 R(  ^  S       c $`}   0   H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 337 0 R(  ^  S       c $   0   H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 338 0 R(  ^  S       c $<   0   H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 339 0 R( D--T-- ^  S       c $   0   H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 33: 0 R( 8-D--T- ^  S       c $X   0   H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 33; 0 R(  -8-D-- ^  S       c $   0   H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 33< 0 R( - -8-D- ^  S       c $:   0   H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 33= 0 R(  ^  S     =   c $p   0  =  H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 33> 0 R( ޽h ^  S     =   c $H,=   0  =  H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 33? 0  R( t-- - ^  S     =   c $X^=   0  =  H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 33@ 0 0R( t-- ^  S     =   c $=   0  =  H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 33A 0 @R( Xt- ^  S        c $=   0    H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 33B 0 PR(  ^  S        c $l=   0    H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 33C 0 `R(  ^  S        c $=   0    H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 33D 0 pR( 8 ^  S        c $   0    H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H  0޽h ? 33E 0  R( Z  ^   S         c $    0    H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H   0޽h ? 33F 0 (R(  (^ ( S     "  ( c $<   0  "  H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H ( 0޽h ? 33G 0 0R(  0^ 0 S     "  0 c $"   0  "  H FORENSICS IS A FOUR STEP PROCESS Acquisition Track or Observe a Live Intruder? Assess Extent of Live Intrusion? Preserve  Evidence for Court? Close the Holes and Evict the Unwanted Guest? Support for Sheriff, State Police or FBI Arrest? Support for Court Ordered Subpoena? Identification Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key. FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types) THE EVIDENCE LOCKER Restricted Access and Low Traffic, Camera Monitored Storage. Video Surveillance & Long Play Video Recorders Baggies for screws and label everything! Sign In/Out for Chain of Custody 3Evaluation What the Lawyers Do This is what lawyers (or those concerned with the case) do. Basically, determine relevance. Presentation of findings is key in this phase. Findings submitted for evaluation as evidence will not only be evaluated for content but for  chain of custody problems. 4Presentation Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged. -PP#PPPPPP)P-#    )  \  '   (  H 0 0޽h ? 33r@)]^@JCFsz0 t & D;D?j$Fh 9%sƷ'B#9&(, (8._1 H*X495<>A*DCGI4h>xHR\fpzcQ TWYg\_)b(8H6LNd9g litnp6Xy1Oh+'0T hp  PowerPoint PresentationBalancedrsmontgomery17Microsoft PowerPoint@P!@@@F>@ "GSg  )'    """)))UUUMMMBBB999|PP3f333f3333f3ffffff3f̙3ff333f333333333f33333333f33f3ff3f3f3f3333f33̙33333f333333f3333f3ffffff3f33ff3f3f3f3fff3ffffffffff3ffff̙fff3fffff3fff333f3f3ff3ff33f̙̙3̙ff̙̙̙3f̙3f333f3333f3ffffff3f̙3f3f3f333f3333f3ffffff3f̙3f3ffffffffff!___www4'A x(xKʦ """)))UUUMMMBBB999|PP3f3333f333ff3fffff3f3f̙f3333f3333333333f3333333f3f33ff3f3f3f3333f3333333f3̙33333f333ff3ffffff3f33f3ff3f3f3ffff3fffffffff3fffffff3f̙ffff3ff333f3ff33fff33f3ff̙3f3f3333f333ff3fffff̙̙3̙f̙̙̙3f̙3f3f3333f333ff3fffff3f3f̙3ffffffffff!___www######################################################################################################################DK##############################################################################################################################################################KDJ##############################################################################################################################################################K#D##########################################)#######)#######)#######)#######)#######)#######)#######)#######)#######KDK#K#J#K#J#K#D#K#D#J###)#######)#######)#KDK###)#######)#######)#######)#######)############################################################################D#J#D#D#D#D#D#D###D##########################DK##############################################################################################################KDKDKDK#KDK#KDJ#K#J#K#D#K#D#K#D#D###############KDK############################################################################################################K#JDK#KDK#KDK#KDK#KDK#KDK#KDK#KDD#################J#D######################################*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###KJKDKJD#K#D#K#K#KDK#KDKDKJKDKJKJKJKDK###*###*###*#KDK###*###*###*###*###*###*###*###*###*######################################################################K###########D###D#D#J#D#K#J#K#J#K#KDK#K#K##########DK##############################################)#######)#######)#######)#######)#######)#######)#######)###KD######D#D#K#D#K#J#KDK#KDKDKJKDKJKDKJKDKD##)#######KDJ#####)#######)#######)#######)#######)####################################################################D#########D#D#D#D#J#J#K#JDK#KDK#KDK#KDK#D###########K#D######################################*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###K#D#D#D#K#J#K#J#KDKDKDKDKJKDKJKDKJK#K###*###*###*#KDK###*###*###*###*###*###*###*###*###*######################################################################K#############D#D#D#J#J#K#J###########K############DK###########################D#D#D#D#J#D#J##*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*D##*###*###*###*###*#K#*###*###*###KDK#*###*###*###*###*#D#K#J#K#J#K#K#KDK#KD#################################################################################D#####################################J#D###############D#D#D#D#J#D#J#J#K#K#K#K*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#K#*#*#*#*#*#*#K#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#KDK#*#*#*#*#*#*#*#K#K#KDK#KDKDKDKDKJKDKJKD####################################################CmJJIJJnJmmnJnmsmmmsmsmsmsmnsmnsmmmsJJIJ"I"J"J)Q##############DK###############D#D#D#D#J#D#K#J#K#J#K#KDK)#*#*#*#)#*#*#*#)#*#*#*#)#*#*#*#)#*#*#*#)#*#*#*#)#*#mJmJJJrmsmmsmmsmsnsnsnssssmmsJJCJIJ(P)Q0WW)#*#*#*#)#*#*#KDJ#*#*#*#)#*#*#KDK#KDK#KJKDKJKDKJKDKJKDKJ#####)#######)#######)#######)#######)#######)######CJJJJmJmmsJmmsmsmsmsnsmsmmsnsmmJJ")"J"J/QQQ)JQ~#####)#######)#K#D###)#######K#J#J#KDK#K#K#D#J#D#D######*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#mJmJmmmmsmmJsmsmsnsnsssmJJJ(J)QQWQQ0W"Js~Q*#*#*#*#*#*#*#KDK#*#*#*#*#*#K#KJKJKDKJKDKDK#K#K#K#D#K######)#######)#######)#######)#######)#######)#######)JmJmJmJmJmJmJmJsmmmsmsmsmsnmsJmCJ"J)P/W0Q))JQJC"J/0###)#######)##DK###)#######)#######)#######)#######)####*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#nmsmnJsmnmsmnmsmsJsmsmssssJJ)J)QQyQXQJ(s)QJJCDJXX*#*#*#*#*#*#*#KDK#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#D#*#*#*##*#)#*###*#)#*###*#)#*###*#)#*###*#)#*###*#)#*###*#)mnJnmmJmmnJnmnJmJmJsJmJmmsJmCJ)QQXQQ))Qs))QJ)J"J"JQX#*#)#*###*#)#*#J#D#)#*###*#)#*###*#)#*###*#)#*###*#)#*##*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#smsmsmsmsmsmsmsJsJsJsmmJmJJJQQyQyJJ)J)yQQ)Q)QQQWXXyW*#*#*#*#*#*#*#KDK#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*####*###*###*###*###*###*###*###*###*###*###*###*###*JmmsJmJnJmJnmnmmJmJrJJJsJQQXQX0))J"J")QQ)Q0XQyWXQQ)J###*###*###*##DK###*###*###*###*###*###*###*###*###*###**#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#smsnsmsmsJsmsmsmnmnJJJQQyQQQXXXQP"JJJ)yXyXyWQJP"J"mC*#*#*#*#*#*#*#KDJ#*#*#*#*#*#*#*#*D*#*#*#*#*#*#*#*#*#*#*##*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*nsmsmrJmJmJmJsJmJmJsQyQQJQ)QXX0))QQyXyQQQQJJ"JCJmmD#*#*#*#*#*#*#*#K#D#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#**#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#nsmmmmmmmmmmJsQyQQQQ)QPPQX~X~yyQQJJCJCJCmJmmmJCC*#*#*#*#*#*#*#KDK#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*##*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*JmJmmImmmJQQQQQ)J(QPQ)QQyXyQQJJ"CC"J"C"CCC"CCC#*#*#*#*#*#*#*DK###*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#**#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#mmmJmsJmxxQQJPQQPQQyyQsJJ"C"CCJCC"C"""C"CC""CC*#*#*#*#*#*#*#KDK#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*##*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*JmmsssQWWx)PPQQysyssmCCCC"J"C"C"CC"CCmmsCC#*#*#*#*#*#*#*#J#D#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#****#***#***#***#***#***#***#***#***#***#***#***#***#smÙyQyQyyysxyQsJCmCDCJDJCJCC"CCJs¼mC***#***#***#**KDK#*#***#***#***#***#***#***#***#***#***##*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*JssxQxQyyysm"C"C⮒fC"C"C"J"CC"C™DC#*#*#*#K#KDK#KDK##DK#KD*#*#*#*#*#*#K#*#*#*#*#*#*#*#*#*#**#***#***#***#***#***#***#***#***#***#***#***#***#**ßÙtsDmCmJCݮBf<"CCD"JDDC"mm"*#***#*DK#KDKDKDJ#KDKDKDK#***#***#***#***#***#***#***#**#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*sݼsJJCmDJCCBDCJ"D"CCCDC#*#*#*#D#D#D#D#K#D#D#D#D#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*****************************************************rmJsCmJmDCCfBCmCCDCJ"J"C"mm"*******#******KDK#**K#D#************K*******************#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*"J"JssDJDJDJCmC""CCCCmsCC#*#*#*#*#*#*#*DK###*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*****************************************************mCJCsJJDDCJCCCmCCCCCCC"CCCDCJCJCCCJC**************KDK#**************************************)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*CmCJCJ"D"C"J"smC"C"CC"C"CCCCCCC"C)*#*#*#*)*#*#*#J#D#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*****************************************************mmsJsnJCCCmC"CJmJmCmCCCCJCJDmDnJnJ**************KDK#**************************************#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*CJJJnݼsmJnstKJ"m"CCJCDDJ#JDKDJDK#*#*#*#*#*#*#*DK###*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*****************************************************mDmDnsC"tstJJmJJCCmmnsm"C"nJKJnJKDnD**************KDJ#***#************************************#***#***#***#***#***#***#***#***#***#***#***#***#*CJDJJsmmnJJstsJ"nCDmC"CCDDJDKDJDJDJ**#***#***#***#K#D#**##***#***#***#***#***#***#***#***#*****************************************************mmnJsss"nnD"DtsJJJJCCCCC!mDCJ"CDnDnJKJnJKJ**************KDK#***#**********************************#***#***#***#***#***#***#***#***#***#***#***#***#***"JJKJsKJ"JsJDstsJ"n"C"CCC!CC"DCCJDJDKDKJJJn#***#***#***#*DK##**#***#***#***#***#***#***#***#***#*******************************************************JJrJsQtsC"DDtJJJDC"CC!mC"D"CDmDJJnJKDnK**************KDK#*********************D********K*************#*******#*******#*******#*******#*******#*****JsJPJtns"CsJJstsJ"m"C"CCC""JDJDKDKDKDJ******#*******#J#D****#*******#*******#*******#*#*****#*****************************************************ssJssnC"C"DtJDJDCC"CC"C"CJnJnJnJnJnJ**************KDK#**K***************************K*******#***#***#***#***#***#***#***#***#***#***#***#***#***JmIJQtsnnDJttsJ"JC"CJDJDKJnDJDK#***#***#***#*DK##**#***#***#***#***#***#***#***#***#*******************************************************rJmJssnmnCCtJDDC"C"CDnJnJnJnJnJ**************KDJ#**D***************************K***********************************************************IJJtssCDmCCstn"J""CDnJnJnJnDJ**************#K#D**#***************************#***********************************************************smJsssnmDmmJtKJJmCJCCCCCJJnnnJnJnJ**************KDK#**K***************************K***********#*******#*******#*******#*******#*******#*******smJrsmsmnmJmtK#nCDCJCJCC""JCJJnDnJnDJJn****#*******#*DK##**#*******#*******#****D**#*******#*******************************************************mrnsnnnmnJmJCJCJCmCJCJC"<DDnJnJnJnJnJnJ**************KDK#*D****************************************************************************************sJrmsmsnnnnsmsDnDD"CCCCICJCJ"!C"DJnJKDnDnJnDJ**************#J#D*D****************************************************************************************nnmsnmmmnnJmCD"JCICJCJCmCJDnnnJnKnKnKnJ**************KDK#*#**********************K************J#*******#*******#*******#*******#*******#*******#***mnJnnnsmsJmmm"C"DC"C"CCICC"CmJnJnJnJnJnJn#*******#*****DK##*J****#*******#*******#*******#***********************************************************nnnsssmsJJ"DCDCJCmmCCCm"DDnJnJnJnnnKnK**************KDJ#*D****************************************************************************************nnmmnsnsmmCDCJDJCDnmmCm"CCJCmDDJnJnJnJn**************#K#D*D****************************************************************************************mmsssmmDJDJDJCnsmmnJnDmDmJmCmDmJnJnJ**************KDK#*#**********************************K*****************************************************mmnmnDnmsmmCD"DCDDDmmCCnnnDmDmDJCJCJDmDJDm**************DK###J****************************************************************************************mnmݼnJnmnDD"DCJDJCnnmCCDsnnKnKnmnJJDmJmDmD**************KDK#KD****************************************************************************************nJnmݻnsJmJmCD"DCCCmJCnJnJnJnnnJnJmDJDJDm**************#J#D#*************************#***************************************************************mnsmݒsmmmmCJ"DCDCnrCCJnnsnnKsnsJnnnJnJmD**************KDK#K*************************************#*******#*******#*******#*******#*******#*******#***CmmnnmmCC"DCDCCmCCDDnJnJnJnJnJnJnJnDm#*******#*****DK###*****#*******#*******#*******#***********************************************************mmnDssnJDmDmDJCnsm"CCJDmJsnnmsJnJnnnJnJ**************KDJ#K**************************#**************************************************************DmmmCmmnnnsJJDJDJCDJmCCmJDCJDnJnJnJnJnJnDn**************#K#K#*********************************#*******************************************************mmCmmnssnnDJDnDJDJ"""JmsnsJJDmJnJnnnKnnnJ**************KDKJK*************************************#***#***#***#***#***#***#***#***#***#***#***#***#***JmsCCJnnsnsnsDDDJDDDDCD""mnsmnJJCDDmDmJnJnDn#***#***#***#*DK#K#*#***#***#***#***#***#***#***#***#*******************************************************DnsCJmnnnnDKDJDmDJDnDDJsnsnnnDJCmDnmsnnJ**************KDKDK*******************************************)*******)*******)*******)*******)*******)*****mJnmCnsnnsJJDJDJCDCJDnJnJnnsnsnsJJCDCmDmDn******)******K#KDK#***)*******)*******)*******)*******)*****************************************************nmsnnnnnnDnDJDDCJDmJnnsnsnsnsnsnnJmCmDmD*************###*JK*************************************#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***##**#***#***#***#***#***#***#***#**K#K**#***#***#***#***#***#***#**##***#*****************************************************************************************K********************************DKD********************************D*******#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#DDK#***#***#***#***#***#***#***#***#***#***************************************************************************************K********************************#KJ**************************************#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#####***#***#***#***#***#***#***#**##K**#***#***#***#***#***#***#***#***#***************************************************************************************KDKJKJKJ************************KDKDK#K#****************************KJ********#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#***#KDK#KDK#KDK#***#***#***#***#*DK#J#D##**#***#***#***#***#***#***#*#*#***#********************************************************************************************JKJKJKJKJKJKDKJ***********JKDK#D*************************************#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#K#K#K#K#K#J#K#J#K#*#*#J#K#D#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#****************************************************************************************************JKDKJKDKDKDKDK#KDK#KDD#D*****************************J*******#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*DK#JDK#J#K#J#K#J#J#D#J#*#*#*#*#*#*#*#*#*#*#*#*#*#K#*#*#*************************************************************************************************************KJKDKDKDKDKDKDK#KDK#K#J#K#*******************J******#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#J#K#D#J#D#J#D#D#D#D###D###D#*#*#*#*#*#*#D#*#*#**)***#***)***#***)***#***)***#***)***#***)***#***)***#***)***#***)***#***)***#***)***#***)***#***)***#***)***#***)**K#KDK#KDK#K#J#K#D#K#D#K#D#D#D#D#*#**D#***#**#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#D#K#D#J#D#J#D#D###D#################*#*#****)***#***)***#***)***#***)***#***)***#***)***#***)***#***)***#***)***#***)***#***)***#***)***#***)***#***)***#***)***#***)***#***)***#*#D#K#D#K#D#D#D#)###***##*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#####*#**#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#**#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*#*#*#*)*##*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#**#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*##*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#**#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*####*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###**#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*##*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*##*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#yyyy**#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*##############################################################################y#############################*#*#*#*#*#*#*#*#*#*#yyy#y#*yy#y*y#yyy##*#*#yyyy**yyy**yyy*y*#y*yyy**#*yy#*y#*y#*#yyy##yyy#yy#y*yy#y*yy#yyy*y#yyy#y#*y#*#*#*#*#*#*#*#*####################y###y#y##yy#y#yy##y#####y####yy##y#y##y#y##yy##y####yy##y##y##y##y#y###y#y#yy#yyy#yyy#yy##yy##y#################*#*#*#*#*#*#*#*#*#y*#*#*y#*yy#y*yy#*#*#*#*y#y*#*#yy*#yy*#*yy#*y#yy*y#*y#*y#yy*#yy#yy*yy#*yy#*y#*#*#*#*#*#*#*#*###################y#####y#yyy#yyyyyy######yy##y###yyyyyy##yyyyyy###yy##y#y#y#yyyyy#yy##y#yy##y#yyyyy#yy##yy##y###################*###*###*###*###y##*##yy#yyy#yy*y#y##*###yy##*#y#y#y#y#yy#y#y###*yyy*y#*yy*y*y#y#yyy#yyy#y#yyy#y#yy*###*###*###*###*###################y####y#y#y#y#yyyy###yyy######y#####yyy###yyy##yyyy###yyy#####yyyyy##y###y##yyy###yyy#yyy#y##yy#y##yyy#yyy#y##yyy##yyyy###################*###*#)#*###*#)#*##y*y*###*##*###*#)#*###*#)#*y#y#*###*#)#*###*#)#*###*#)#*##y#)#*###*#)#*###*#)#*###*y#*##*#)#*###*#y*##*#)#*###*#)#*###*#)#*###*#)#####################yyy######y####################yyyy#############################y#########################y##y#############y##y################################*###)###*###)###*###)###*###)###*###)###*###)###*###)###*###)###*###)###*###)###*###)###*###)###*###)###*###)###*###)###*###)###*###)###*###)###*###)###*###)#################################################################################################################################################################*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*###*#######################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################)#######)#######)#######)#######)#######)#######)#######)#######)#######)#######)#######)#######)#######)#######)#######)#######)#######)#######)#######)###################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################՜.+,0    On-screen Showw= CTimes New Roman宋体ArialTahoma WingdingsBalanceCrime Scene Investigation“There is not only the effect of the criminal on the scene to be considered, but also the manner in which the scene may have imparted traces to the criminal” (Charles E. O’Hara, Fundamentals of Criminal Investigation).“There is not only the effect of the criminal on the scene to be considered, but also the manner in which the scene may have imparted traces to the criminal” (Charles E. O’Hara, Fundamentals of Criminal Investigation).What is a crime scene?What is physical evidence?Why Forensic Science? 0What does crime scene investigation consist of?0What does crime scene investigation consist of?0What does crime scene investigation consist of?0What does crime scene investigation consist of? Slide 11Preliminary ActionsPreliminary ActionsPreliminary ActionsPreliminary ActionsPreliminary ActionsPreliminary ActionsPreliminary ActionsAt the Scene…..At the Scene….At the Scene….At the Scene….At the Scene….'Once the scene has been secured…….'Once the scene has been secured…….'Once the scene has been secured…….'Once the scene has been secured…….Documentation Documentation Documentation Photography Photography Photography Photography Photography Photography Photography Photography Photography Photography Photography Photography Photography Photography Photography Photography Photography Photography Sketches Sketches Sketches Sketches Sketches Sketches Sketches Rough Sketch Rough SketchTriangulationFinal (finished) SketchFinal (finished) SketchFinal (finished) Sketch  Fonts UsedDesign Template Slide Titles=%_vZ 0drsmontgomerydrsmontgomery  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgijklmnoqrstuvw~Root EntrydO)PicturesCurrent UserpSummaryInformation(=TPowerPoint Document(ZDocumentSummaryInformation8h