throbber

`
`
`
`
`
`
`
`
`D.N. UWY-CV21-6058206-S
`
`RANDOLPH E. RICHARDSON, II,
`ADMINISTRATOR FOR THE ESTATE OF
`ALEXANDER JANIAK
`
`v.
`
`FAMILY STUDY CENTER, INC. ET AL.
`
`
`
` SUPERIOR COURT
`
`J.D. OF WATERBURY
`
`AT WATERBURY
`
`
`
`NOVEMBER 23, 2022
`
`MOTION FOR ORDER
`
`The Defendant, Christopher Sorenson, through counsel, moves the court for an Order to
`
`substitute Maggie Gaffney and Teel Technologies as the forensic investigators who will perform
`
`the inspection, investigation, unlocking and data extraction of the plaintiff’s decedent’s personal
`
`cellphone. Consistent with the defendant’s request for production, inspection and examination of
`
`the phone dated February 25, 2022, (attached as Exhibit One), discussion of plaintiff’s
`
`objection and defendant’s reply (Entries 138, 144) at this court’s hearing of June 16, 2022, and
`
`with the agreement of counsel, the plaintiff’s decedent’s cell phone was delivered to James
`
`Oulundsen, forensic investigator at IRIS, LLC for his inspection/investigation.
`
`
`
`Mr. Oulundsen of IRIS, LLC inspected the phone at his offices in East Hartford,
`
`identified it as a Samsung Galaxy S7 Edge (Model SM-G935V), but could not unlock the phone,
`
`and recommended that the phone be sent to Cellebrite, Inc., New Jersey, to request that the
`
`phone be unlocked, or the security pattern identified, by use of Cellebrite’ s “advanced unlocking
`
`services.” This court granted an order to send the phone to Cellebrite for the advanced unlocking
`
`services. (Entry No. 156.10).
`
`
`
`

`

`
`
`
`
`Prior to accepting the phone for unlocking service, Cellebrite required that the “end user”
`
`of the phone sign and return a waiver agreement. The waiver agreement was forwarded to
`
`plaintiff’s counsel, who returned the waiver agreement with proposed edits, with deletion of
`
`certain provisions of the waiver agreement (including indemnification); undersigned counsel
`
`added language to the waiver agreement to state that data would be shared pursuant to court
`
`order. Plaintiff’s decedent’s mother Karen Janiak signed the revised waiver agreement, and
`
`through Mr. Oulundsen, it was submitted to Cellebrite at its New Jersey location for advanced
`
`unlocking services.
`
`
`
`Cellebrite of New Jersey has rejected the revised waiver agreement, and is requiring that
`
`its original waiver agreement be fully executed before it will accept the phone for unlocking
`
`services. Plaintiff’s counsel will not agree to have their clients sign the original waiver
`
`agreement on the original terms. Therefore, the plaintiff’s decedent’s cell phone remains locked,
`
`and the data extraction has not taken place. Undersigned counsel contacted Cellebrite directly,
`
`requesting a contact from its legal department to further attempt to negotiate the terms of the
`
`waiver agreement, but instead received a response from its sales representative in New Jersey,
`
`who confirmed that they would not perform the advanced unlocking service without the return of
`
`its original waiver form, fully executed.
`
`
`
`The inspection and data extraction from the decedent’s cell phone is reasonably
`
`calculated to yield CT Practice Book Section 13-1 electronic statements of the decedent, and
`
`communications from decedent or from others to decedent, including text messages, voicemails
`
`and internet searches. The decedent is alleged to have died by suicide. The plaintiff’s decedent
`
`was found deceased with the phone at his side, with no written note located. A request for data
`
`extraction of the phone was made as the information and data is needed to inform about the
`
`
`
`2
`
`

`

`
`
`plaintiff’s decedent’s state of mind, his activities leading up to his death, whom he was in contact
`
`with and what was communicated by text or social media, any electronic writings, data related to
`
`his intentions or research of suicide methods via social media or internet sources, and is
`
`reasonably calculated to lead to the discovery of admissible evidence.
`
`
`
` In an effort to accomplish the unlocking of the cell phone and data extraction,
`
`undersigned counsel has consulted with another qualified digital forensic investigator, Maggie
`
`Gaffney of Teel Technologies. See Exhibit Two, curriculum vitae Maggie Gaffney, attached.
`
`Ms. Gaffney represents that Teel technologies can attempt to perform the unlocking service, and
`
`if successful, will perform the data extraction and prepare reports of the data extracted. See
`
`Exhibit Three, affidavit of Maggie Gaffney, Teel technologies, attached. The agreements
`
`required for the services by Teel are attached. See Exhibit Four. The cost of the services will be
`
`paid on behalf of the defendant.
`
`
`
`Wherefore, the defendant respectfully requests that the court: 1) authorize Maggie
`
`Gaffney and Teel technologies to perform the inspection, unlocking and data extraction of the
`
`plaintiff’s decedent’s cell phone; 2) require the owner of the phone, the plaintiff or Karen Janiak,
`
`to execute the attached agreements required by Teel technologies, and 3) order that the phone be
`
`delivered to Teel technologies to commence the unlocking and data extraction of the phone, and
`
`prepare reports for distribution pursuant to the court’s orders.
`
`
`
`
`
`
`
`3
`
`

`

`
`
`
`
`DEFENDANT,
`CHRISTOPHER SORENSON
`
`
`
`
`
`
`
`
`
`/s/417118
`By:
`Pamela D. Miller, Esq.
`Ryan Ryan Deluca LLP
`1000 Lafayette Blvd., Suite 800
`Bridgeport, CT 06604
`Juris No. 438500
`Phone: 203-549-6650
`
`
`
`
`CERTIFICATE OF SERVICE
`
`I certify that a copy of this document will immediately be mailed or delivered
`
`electronically on November 23, 2022, to all attorneys and self-represented parties of record and
`
`that written consent for electronic delivery was received from all attorneys and self-represented
`
`parties receiving electronic delivery.
`
`Name and address of each party and attorney receiving this document:
`
`Antonio Ponvert, III, Esq.
`Koskoff, Koskoff & Bieder, P.C.
`350 Fairfield Avenue
`Bridgeport, CT 06604
`Attorney for Plaintiff, Randolph E. Richardson Admin for the Estate of Alexander Janiak
`KGillick@Koskoff.com; ssteinfeld@Koskoff.com;
`aponvert@koskoff.com
`
`Richard A. O'Connor, Esq.
`Rebecca Brindley, Esq.
`Stockman O'Connor Connors PLLC
`32 Church Hill Road, Suite 201
`Newtown, CT 06470
`Attorney for Defendant, John G. Gelinas, Jr., M.D., P.C.
`roconnor@stockmanoconnor.com; rbrindley@stockmanoconnor.com;
`kpakalnis@stockmanoconnor.com; bbeckman@stockmanoconnor.com
`
`
`
`4
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`David F. Bennett, Esq.
`Law Offices of David F. Bennett
`69 Kenosia Avenue
`Danbury, CT 06810
`Attorney for Defendant, Family Study Center, Inc
`bulldog799@aol.com
`
`
`
`/s/417118
`
`Pamela D. Miller, Esq.
`
`
`
`
`
`5
`
`

`

`EXHIBIT ONE
`EXHIBIT ONE
`
`
`
`
`
`

`

`
`
`D.N. UWY-CV21-6058206-S
`
`RANDOLPH E. RICHARDSON, II,
`ADMINISTRATOR FOR THE ESTATE OF
`ALEXANDER JANIAK
`
`v.
`
`FAMILY STUDY CENTER, INC. ET AL.
`
`
`
`
`
` SUPERIOR COURT
`
`J.D. OF WATERBURY
`
`AT WATERBURY
`
`FEBRUARY 25, 2022
`
`REQUEST FOR PRODUCTION, INSPECTION AND EXAMINATION
`
`Pursuant to Practice Book § 13-9 (a), the undersigned defendant, Christopher Sorenson,
`
`through counsel, hereby gives notice that the plaintiff is requested to produce on March 14,
`
`2022, at 1:00 pm, at the offices of I.R.I.S. investigations, LLC, 54 Connecticut Blvd., East
`
`Hartford, CT, 06108, or otherwise a date and time to be agreed upon, the following electronic
`
`property used by the decedent, Alexander Janiak, to afford the defendant an opportunity to
`
`inspect, copy, test and sample the property of Alexander Janiak:
`
`1. Samsung Galaxy phone, cell phone, located with Alexander Janiak on April 21, 2019,
`
`or otherwise used by Alexander Janiak from August 1, 2018, through April 21, 2019,
`
`along with information on the model and serial number, and any login/password
`
`information.
`
`2. Microsoft Surface device, Chromebook and or laptop/tablet used by Alexander Janiak
`
`from August 1, 2018, through April 21, 2019; along with information on the model
`
`and serial number, and any login/password information.
`
`3. Any camera or other electronic devices used by Alexander Janiak.
`
`
`
`For the phone of Alexander Janiak, the defendant makes distinct requests for information
`
`

`

`contained therein. First, the defendant requests access to any and all communications including,
`
`but not limited to, emails, calls, voicemails, texts, video chats, photos, and social media
`
`messages and posts between the decedent and his family members, including his mother Karen
`
`Janiak, father Michael Janiak, brother Nicholas Janiak, and sister Tessa Janiak from and
`
`including August 1, 2018, through and including April 21, 2019.
`
`Second, the defendant requests access to all communication including emails, calls,
`
`voicemails, texts, video chats, photos, and social media messages and posts occurring from and
`
`including August 1, 2018, through and including April 21, 2019, between the decedent and any
`
`other individuals.
`
`Third, the defendant requests unlimited access for all photos, videos, texts, video chats,
`
`emails, posts and applications, such as Snapchat, WhatsApp, TikTok, Instagram, Facebook,
`
`Twitter, and any others used or accessed by Alexander Janiak, from and including August 1,
`
`2018, through and including April 21, 2019.
`
`For the Microsoft Surface device, Chromebook and or laptop/tablet used by Alexander
`
`Janiak from August 1, 2018, to April 21, 2019, the defendant requests access to the hard drive to
`
`any documents or files created or saved, and photos or videos created or saved from and
`
`including August 1, 2018, through and including April 21, 2019.
`
`For all of the requested devices, the defendant requests access to all internet search
`
`history and web sites/pages identified or saved from and including August 1, 2018, through and
`
`including April 21, 2019.
`
`The defendant intends to use I.R.I.S. Investigations, LLC, Information Retrieval
`
`Investigative Services, 54 Connecticut Blvd., East Hartford, CT, to conduct the inspection and
`
`examination of the electronic property of the decedent.
`
`

`

`Wherefore, the defendant requests production, inspection, and examination of the
`
`decedent’s Samsung Galaxy phone, cell phone, Microsoft Surface device, Chromebook and or
`
`laptop/tablet.
`
`DEFENDANT,
`CHRISTOPHER SORENSON
`
`
`
`By: __/s/ 417118_____________________
`Pamela D. Miller, Esq.
`Ryan Ryan Deluca LLP
`1000 Lafayette Blvd., Suite 800
`Bridgeport, CT 06604
`Juris No. 438500
`Phone: 203-549-6650
`
`
`
`
`
`
`

`

`CERTIFICATE OF SERVICE
`
`I certify that a copy of this document will immediately be mailed or delivered
`
`electronically on February 25, 2022, to all attorneys and self-represented parties of record and
`
`that written consent for electronic delivery was received from all attorneys and self-represented
`
`parties receiving electronic delivery.
`
`Name and address of each party and attorney receiving this document:
`
`Antonio Ponvert, III, Esq.
`Koskoff, Koskoff & Bieder, P.C.
`350 Fairfield Avenue
`Bridgeport, CT 06604
`Attorney for Plaintiff, Randolph E. Richardson Admin for the Estate of Alexander Janiak
`KGillick@Koskoff.com; YWilburn@Koskoff.com
`aponvert@koskoff.com
`
`Richard A. O'Connor, Esq.
`Rebecca Brindley, Esq.
`rbrindley@stockmanoconnor.com
`Stockman O'Connor Connors PLLC
`32 Church Hill Road, Suite 201
`Newtown, CT 06470
`Attorney for Defendant, John G. Gelinas, Jr., M.D., P.C.
`roconnor@stockmanoconnor.com; kpakalnis@stockmanoconnor.com;
`bbeckman@stockmanoconnor.com
`
`David F. Bennett, Esq.
`Law Offices of David F. Bennett
`69 Kenosia Avenue
`Danbury, CT 06810
`Attorney for Defendant, Family Study Center, Inc
`bulldog799@aol.com
`
`
`____/s/ Pamela D. Miller________________
`Pamela D. Miller, Esq.
`
`
`
`
`
`
`
`

`

`EXHIBIT TWO
`EXHIBIT TWO
`
`
`
`
`
`

`

`Maggie Gaffney
`gaffney.maggie@gmail.com
`(413) 246-2918
`
`
`
`WORK EXPERIENCE
`
`Course Developer, Course Maintenance, and Instructor
`UAV Forensics
`Teel Technologies
`Norwalk, CT
`August 2022 to Present
`
`Instruct students in the following areas:
`1. Drone Mitigation
`2. Identifying and Acquiring UAV Memory
`3. Familiarity with UAV Commercial Extraction Tools
`4. Automated Data Extraction Methods
`5. Advanced Data Extraction Methods
`6. Advanced Data Analysis
`
`Course Developer, Course Maintenance, and Instructor
`Advanced Vehicle Forensics
`Teel Technologies
`Norwalk, CT
`January 2022 to Present
`
`Instruct students in the following areas:
`1. Understanding Connected Cars
`2. Identifying and Acquiring Vehicle Memory
`3. Familiarity with Vehicle Commercial Extraction Tools
`4. Automated Data Extraction Methods
`5. Advanced Data Extraction Methods
`6. Advanced Data Analysis
`
`Course Developer, Course Maintenance, and Instructor
`Basic Device Repair for the Digital Forensics Examiner
`Teel Technologies
`Norwalk, CT
`January 2020 to Present
`
`Instruct students in the following areas:
`1. Best practice repair methods
`2. Proper device handling
`3. Equipment and tools for repair
`
`Maggie Gaffney – Curriculum Vitae
`
`1
`
` Updated August 2022
`
`

`

`Maggie Gaffney
`gaffney.maggie@gmail.com
`(413) 246-2918
`
`
`4. Device disassembly and reassembly
`5. Surface mount component recognition
`6. Common component repair and replacements
`7. Basic functions of a digital multimeter
`
`Course Developer, Course Maintenance, and Instructor
`Embedded Hardware Acquisition and Analysis
`Teel Technologies
`Norwalk, CT
`July 2019 to Present
`
`Instruct students in the following areas:
`1. Physical acquisition methods for memory of unsupported IoT devices including, but not
`limited: Smart TV’s, Vehicle Navigation and Infotainment systems, drones, skimmers/
`shimmers, and more
`2. Foundation of how electronics work in relation to the acquisition techniques
`3. Various hardware and chip programmers to acquire embedded hardware memory
`4. Advanced data acquisition processes including JTAG, ISP, and Chip Off
`5. Embedded communication protocols such as: SPI, i2C, CAN-Bus, UART
`6. Exploitation of components to recover data from various sources like embedded code and
`the flash memory of controller chips.
`
`
`Course Developer, Course Maintenance, and Instructor
`SQLite Advanced Forensics
`Teel Technologies
`Norwalk, CT
`January 2019 to Present
`
`Instruct students in the following areas:
`1. SQLite advanced functions
`2. Advanced data recovery scenarios
`3. Manual SQLite data recovery
`4. SQLite payload examination
`5. SQLite data construct parsing
`6. Manual parsing of WAL and Journal Files
`7. SQLite record recovery of Incomplete and Orphaned records
`8. Using simulations to perform data testing, verification, and/ or decryption
`9. SQLite encryption
`10. Message spoofing
`11. Manual validation/verification of mispresented data of commercially available forensic tools
`12. Using Sanderson Forensic Toolkit for advanced SQLite data recovery
`
`
`Maggie Gaffney – Curriculum Vitae
`
`2
`
` Updated August 2022
`
`

`

`Maggie Gaffney
`gaffney.maggie@gmail.com
`(413) 246-2918
`
`Course Developer, Course Maintenance, and Instructor
`Board Level Repair for the Digital Forensics Examiner
`Teel Technologies
`Norwalk, CT
`August 2018 to Present
`
`Instruct students in the following areas:
`1. Best practice repair methods
`2. Proper equipment for repair
`3. Knowledge of PCBs and SMCs
`4. Precision soldering techniques and trace repair
`5. IC Removal, reballing, and reattachment
`6. Water damage repair
`7. Using multimeter
`8. Understanding schematics
`9. Troubleshooting unknown device damage
`
`Course Instructor
`SQLite Forensics
`Teel Technologies
`Norwalk, CT
`May 2017 to Present
`
`Instruct students in the following areas:
`1. SQLite at the byte-level
`2. SQLite data components
`3. Common locations to recover SQLite data
`4. Report data validation
`5. Reverse Engineer any SQLite database
`6. Familiarization of SQLite Forensics Toolkit
`7. Recovery of data from .SHM, .WAL and .journal files
`
`Course Instructor
`PC-3000 Flash and SSD Data Recovery
`Teel Technologies
`Norwalk, CT
`May 2016 to Present
`
`Instruct students in the following areas listed below:
`1. NAND flash memory structure and functionality
`2. Physical and Logical device problems and classification of damage
`3. Device Readout
`
`Maggie Gaffney – Curriculum Vitae
`
`3
`
` Updated August 2022
`
`

`

`Maggie Gaffney
`gaffney.maggie@gmail.com
`(413) 246-2918
`
`4. File System rebuild and data recovery using data preparation algorithms on raw NAND
`5. Error Correction Code and Bit Errors
`6. Monoliths data recovery with drive disassembly and soldering technical pins
`7. Techniques for diagnosis and determination of SSD malfunction
`8. Software and hardware implementation of SSD
`
`Course Instructor
`In System Programming (ISP) for Mobile Device Forensics
`Teel Technologies
`Norwalk, CT
`May 2015 to Present
`
`Instruct students in the following areas using the skills listed below:
`1. Determine support for ISP process
`2. Locate ISP connection points using back tracing techniques.
`3. Apply ISP process to connect to eMMC or eMCP flash memory for purpose of downloading
`memory from electronic media.
`4. Bypass lock codes and recover a complete data collection from phones not supported by
`JTAG or commercial tools using the ISP process.
`5. Use hardware/ software combination of tools to connect and download its contents.
`6. Fine precision and microsoldering skills needed to solder to surface mounted components of
`printed circuit board.
`
`
`Course Developer, Course Maintenance, and Instructor
`Advanced BGA Chip-Off Forensics
`Teel Technologies
`Norwalk, CT
`November 2013 to Present
`
`Instruct students in the following areas using the skill listed below:
`1. Properly remove BGA memory chip from various mobile devices.
`2. Prepare the memory for a read and use chip-reading equipment to acquire the data.
`3. Understand the structure of devices and best practices to prevent damage to a chip during
`removal and preparation.
`4. Fundamentals and differences between memory structures.
`5. Current trend of BGA memory use.
`6. Properly utilize the tools available to read the memory off the chip.
`7. Hands on chip removal segments with mobile devices.
`8. Best application of today’s tools and other techniques to decode the data.
`9. Advanced skills in data analysis and working with raw data.
`
`
`
`Maggie Gaffney – Curriculum Vitae
`
`4
`
` Updated August 2022
`
`

`

`Maggie Gaffney
`gaffney.maggie@gmail.com
`(413) 246-2918
`
`
`Course Instructor
`JTAG Forensics Acquisition and Analysis
`Teel Technologies
`Norwalk, CT
`November 2013 to Present
`
`Instruct students in the subjects listed below with the following skills:
`1. Repairing Damaged Devices
`2. Device Disassembly and Reassembly
`3. Applying the JTAG Technique Properly to Acquire Data.
`4. Access JTAG connections and apply techniques to bypass security and perform memory
`acquisitions.
`5. Obtain a physical acquisition from a locked/USB Debugging disabled Android phone.
`6. Determine the password and then recovering the user data using forensic tools.
`7. Access the inner-workings of devices and access the memory in a non-destructive way.
`8. Utilize JTAG tools and latest techniques to access the memory of devices and acquire data.
`9. Memory and JTAG configurations.
`
`Director of Services
`Teel Technologies
`Norwalk, CT
`November 2013 to Present
`
`Responsibilities
`1. Facilitate incoming requests for Digital Forensics and Data Recovery Services.
`2. Conduct physical, logical, and file system acquisitions on electronic media using various
`commercial data extraction tools.
`3. Conduct physical, logical, and file system acquisitions on electronic media using various
`advanced data extraction processes including, but not limited to Chip-Off, ISP, JTAG,
`Flasherbox, and bootloader methods.
`4. Conduct data analysis of digital media extractions
`5. Utilize commercial forensic tools, including but not limited to X-Ways, Oxygen, Forensic
`Explorer, Axiom, Final Mobile, Cellebrite UFED4PC and Physical Analyzer, Atola, PC-3000,
`Tableau and WiebeTech Forensic Products.
`6. Conduct live data acquisitions using various software and hardware
`7. Author reports of digital forensic investigations, data extractions, and data analysis.
`8. Testify as expert witness in Federal, State, and Local courts of jurisdiction.
`9. Conduct research and development for new data acquisition techniques
`
`
`Trooper - Computer Crimes Investigator/ Forensic Examiner
`Massachusetts State Police
`Springfield, MA
`January 2000 to September 2014
`
`Maggie Gaffney – Curriculum Vitae
`
`5
`
` Updated August 2022
`
`

`

`Maggie Gaffney
`gaffney.maggie@gmail.com
`(413) 246-2918
`
`
`
`Responsibilities:
`1. Conduct online undercover criminal investigations.
`2. Conduct Internet Peer-to-Peer investigations, using various P2P applications
`3. Conduct mobile forensic acquisition and analysis of Android, iOS, BlackBerry, and other
`mobile devices.
`4. Conduct forensic examinations on digital storage hardware such as hard drives, tablets, SIM
`cards, multimedia cards, flash drives, routers, and GPS devices.
`5. Conduct on scene computer previews with consent or during the execution of search
`warrants using TUX4N6, Encase Portable, Sumari Paladin, and other proprietary software
`and hardware.
`6. Utilize forensic tools, including but not limited to EnCase, FTK Imager, Microsystemation
`XRY, Cellebrite UFED Logical and Physical, Tableau Forensic Products, Multimedia Card
`Readers.
`7. Author reports of investigation and forensic analysis for law enforcement and state and
`federal prosecutorial agencies.
`8. Support law enforcement agencies such as the Department of Homeland Security, Federal
`Bureau of Investigation, Drug Enforcement Agency, Bureau of Alcohol, Tobacco, Firearms,
`and Explosives, United States Marshals Service, Massachusetts State Police and other law
`enforcement agencies.
`
`
`Trooper - Detective
`Massachusetts State Police
`Springfield, MA
`January 1995 to September 2014
`
`Responsibilities as Detective:
`1. Investigate major crime, including but not limited to homicide, larceny, robbery, gang and
`organized crime, narcotics, firearms, rape and sexual assault, child exploitation and child
`pornography, and computer crime
`2. Interview witnesses
`3. Interrogate suspects
`4. Author and execute search warrants
`5. Arrest criminals
`6. Author reports
`7. Organize case file
`8. Prepare case for trial
`9. Testify in state and federal court
`
`Responsibilities as Administrator:
`1. Department of Criminal Justice Information Services (DCJIS) representative in charge of
`ongoing maintenance, training, and re-certification.
`
`Maggie Gaffney – Curriculum Vitae
`
`6
`
` Updated August 2022
`
`

`

`Maggie Gaffney
`gaffney.maggie@gmail.com
`(413) 246-2918
`
`2. Intake, storage, logging, and tracking of all evidence for county unit.
`3. Order, activate, and oversee wireless devices
`4. Manage wireless account for Hampden County District Attorney's Office.
`5. Supervise execution and oversee distribution of funds for Child Sexual Predator COPS grant
`awarded from DOJ including order supplies and equipment, manage overtime, submit audit
`information, initiate criminal cases, and track statistics and status of all investigations under
`grant parameters.
`
`
`Trooper - Patrol
`Massachusetts State Police
`Russell, MA
`October 1993 to January 1995
`
`Responsibilities:
`1. Routine patrol
`2. Enforce criminal and motor vehicle law
`3. Respond to emergencies
`4. Investigate criminal complaints
`5. Prepare reports
`6. Testify in court
`
`Trooper - Trainee
`Massachusetts State Police
`New Braintree, MA
`June 1993 to October 1993
`
`Responsibilities:
`1. Receive trainings and certifications required to be a Massachusetts State Trooper, including
`but not limited to criminal law, motor vehicle law, patrol procedures, narcotics, firearms
`training, constitutional law, evidence location and handling, crime scene preservation.
`
`
`Loss Prevention Specialist
`Big Y Foods
`Springfield, MA
`October 1986 to May 1993
`
`Responsibilities:
`1. Protect company from internal and external theft
`2. Arrange payments for debt collection from customers
`3. Represent Big Y Foods in Small Claims Court proceedings
`4. Monitor company security and refrigeration alarm systems
`
`
`Maggie Gaffney – Curriculum Vitae
`
`7
`
` Updated August 2022
`
`

`

`Maggie Gaffney
`gaffney.maggie@gmail.com
`(413) 246-2918
`
`
`Security Officer/ Campus Police
`Springfield Technical Community College
`Springfield, MA
`August 1988 to December 1991
`
`Responsibilities:
`1. Patrol and secure campus
`2. Man security building
`3. Monitor alarm system
`4. Handle issues regarding traffic flow and parking problems
`5. Provide safe environment for students and faculty
`
`EDUCATION
`
`MS in Digital Forensics
`University of Central Florida
`Orlando, FL
`2018
`
`
`MS in Criminal Justice
`Western New England University
`Springfield, MA
`1996
`
`BS in Criminal Justice
`Westfield State University
`Westfield, MA
`1992
`
`
`Associate in Law Enforcement/ Criminal Justice
`Springfield Technical Community College
`Springfield, MA
`1990
`
`CERTIFICATIONS
`
`Basic Traffic Accident Investigation - Massachusetts State Police Academy
`October 1993
`
`
`Rape Investigation - Massachusetts State Police Academy
`March 1994
`
`Maggie Gaffney – Curriculum Vitae
`
`8
`
` Updated August 2022
`
`

`

`Maggie Gaffney
`gaffney.maggie@gmail.com
`(413) 246-2918
`
`
`
`
`Crime Scene Analysis - Hampden County District Attorney's Office
`March 1995
`
`
`Homicide Investigation - Massachusetts State Police Academy
`April 1995
`
`
`Practical Homicide Investigation - Vernon J. Geberth, P.H.I., Investigative Consultants
`October 1995
`
`
`Basic Homicide School - New England State Police Administrators Conference (NESPAC),
`May 1996
`
`
`Computer Crime Search and Seizure, Computer Search Warrant, Legal Issues - HTCIA
`April 1998
`
`
`Reid Technique of Interviewing and Interrogation - John E. Reid and Associates, Incorporated
`December 1998
`
`
`Computer Crimes Investigations - Massachusetts Criminal Justice Training Council
`February 1999
`
`
`Basic Data Recovery and Analysis (BDRA) - National White Collar Crime (NW3C)
`August 2001
`
`
`Advanced Data Recovery and Acquisition (ADRA-Inet) - National White Collar Crime (NW3C)
`April 2003
`
`
`Buccal DNA Collection - Massachusetts State Police Crime Laboratory
`April 2003
`
`
`Sexual Exploitation - National Law Center for Children and Families
`October 2007
`
`
`Land Navigation - Massachusetts State Police Academy
`October 2007
`
`
`First Responder's Digital Evidence Seizure - Massachusetts Attorney General's Office
`May 2008
`
`
`Telephone and Mobile Device Investigations - Massachusetts Attorney General's Office
`May 2008
`
`Maggie Gaffney – Curriculum Vitae
`
`9
`
` Updated August 2022
`
`

`

`Maggie Gaffney
`gaffney.maggie@gmail.com
`(413) 246-2918
`
`
`
`Internet Crimes Against Children (ICAC) Gnutella Investigations – USDOJ/ ICAC
`November 2010
`
`
`Secure Technique for Onsite Previews (STOP) - Cyber-Investigation 101 – NW3C
`January 2011
`
`
`Child Sexual Predators - National Center for Missing and Exploited Children (NCMEC)
`March 2011
`
`
`Combating Child Exploitation - United States Department of Justice
`May 2011
`
`
`Universal Forensic Extraction Device (UFED) Logical - Newberry Group Company
`February 2012
`
`
`Cellebrite Universal Forensic Extraction Device (UFED) Physical - Newberry Group Company
`February 2012
`
`
`Encase - Advanced Internet Examinations - Guidance Software
`July 2012
`
`
`Encase - Computer Forensics I - Guidance Software
`July 2012
`
`
`Encase - Computer Forensics II - Guidance Software
`July 2012
`
`Internet Crimes Against Children (ICAC) Ares Investigations – USDOJ/ ICAC
`October 2012
`
`Global Position Satellite (GPS) Interrogation - Cyber-Investigation 205 - NW3C
`April 2013
`
`
`Wireless Network Investigation - Cyber-Investigation 220 - National White Collar Crime (NW3C
`April 2013
`
`
`Advanced BGA Chip-Off and Analysis - Teel Technologies
`July 2013
`
`
`Mobile Device Repair and JTAG Forensics – Teel Technologies
`July 2013
`
`Maggie Gaffney – Curriculum Vitae
`
`10
`
` Updated August 2022
`
`

`

`Maggie Gaffney
`gaffney.maggie@gmail.com
`(413) 246-2918
`
`
`
`
`Apple iDevice Forensics - Cybercop 225 - National White Collar Crime (NW3C),
`September 2013
`
`
`Macintosh Triage and Imaging - Cybercop 215 - National White Collar Crime (NW3C),
`September 2013
`
`Internet Crimes Against Children (ICAC) Investigative Techniques - USDOJ/ ICAC
`September 2013
`
`
`Crime and Handheld Computing Devices - BK Forensics
`October 2013
`
`Certified Cellebrite Logical Operator (CCLO) - Cellebrite Mobile Synchronization
`June 2014
`
`
`Cellebrite Certified Physical Analyst (CCPA) - Cellebrite Mobile Synchronization
`June 2014
`
`In System Programming for Mobile Device Forensics - Teel Technologies
`May 2015
`
`
`Programming for Mobile Device Forensics – Teel Technologies
`July 2015
`
`
`PC-3000 Flash Memory Data Recovery - Ace Laboratory
`September 2015
`
`PC-3000 Flash Monolith Data Recovery - Ace Laboratory
`September 2015
`
`
`X-Ways Forensics - X-Ways Software Technology
`November 2015
`
`
`Memory Forensics - X-Ways Software Technology
`November 2015
`
`SQLite Forensics - Teel Technologies
`January 2016
`
`
`Certified BlackLight Examiner (CBE) - BlackBag Technologies
`January 2016
`
`Maggie Gaffney – Curriculum Vitae
`
`11
`
` Updated August 2022
`
`

`

`Maggie Gaffney
`gaffney.maggie@gmail.com
`(413) 246-2918
`
`
`
`
`BlackLight Tool Training (BTT) - BlackBag Technologies
`January 2016
`
`
`Certified Oxygen Examiner - Oxygen Forensics
`August 2016
`
`
`Certified Oxygen Instructor - Oxygen Forensics
`August 2016
`
`Practical Board Repair – iPad Rehab
`January 2017
`
`Advanced Flasher Box and Bootloader for Mobile Forensics – Teel Technologies
`January 2017
`
`Hardware Hacking and Reverse Engineering – Grand Idea Studio
`July 2017
`
`PC-3000 SSD Data Recovery - Ace Laboratory
`September 2017
`
`Scripting for Digital Forensics Investigators – INsig2
`January 2018
`
`3G Forensics Lab in a Box – Silicon Level Data Recovery
`September 2018
`
`PC-3000 HDD Data Recovery - Ace Laboratory
`November 2018
`
`TRUST Completion Certificate – Federal Aviation Administration
`June 2021
`
`FAA sUAS Remote Pilot – Federal Aviation Administration
`September 2021
`
`PROFESSIONAL ORGANIZATIONS AND/OR MEMBERSHIPS
`•
`International Association of Auto Theft Investigators (IAATI)
`•
`International Association of Computer Investigative Specialists (IACIS)
`• High Technology Crime Consortium (HTCC)
`
`Maggie Gaffney – Curriculum Vitae
`
`12
`
` Updated August 2022
`
`

`

`Maggie Gaffney
`gaffney.maggie@gmail.com
`(413) 246-2918
`
`
`•
`Internet Crimes Against Children (ICAC)
`• High Technology Crime Investigation Association (HTCIA)
`• Physical RAW Mobile Forensics Group
`• National Association of Legal Investigators (NALI)
`• SWFL Regional Technology Partnership
`
`
`PUBLICATIONS
`
`Windows Phone 8 Forensic Artifacts
`https://www.sans.org/reading-room/whitepapers/forensics/windows-phone-8-forensic-
`artifacts-35787
`
`ADDITIONAL SKILLS AND QUALIFICATIONS
`
`
`1. Effective Communication (written and oral), such as memorializing a multifaceted criminal
`investigation to a report format and/ or affidavit, then articulate the details of this
`investigation to a supervisor and/ or prosecutor, then work together to prepare this case for
`criminal prosecution.
`2. Organized with Ability to Multitask, such as managing the intake, storage, and security of all
`evidence for hundreds of criminal investigations including thousands of items seized by the
`Hampden County Detective Unit and other law enforcement agencies, complying with
`Massachusetts State Police Policy and Procedures and Rules and Regulations, and undergo
`the checks and balances through Staff Inspections.
`3. Observant with Attention to Detail, such as extracting and analyzing vast amounts of raw
`physical data and able to articulate the find

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket