Im back at the Laura Babcock trial today in Toronto. Follow along for updates.
Retired OPP Det. Sgt. Jim Falconer will be back in the witness box this morning resuming his testimony about what was found on devices seized from Millard's home.
We're in session right now, just waiting for the jury to be brought in.
The jury is in, we're now getting underway. Det. Sgt. Falconer will be giving more evidence about what was found on devices found at Millard's home.
Falconer is explaining the backups he made of each device seized from Millard's home.
He studied those backups, instead of the original files on the devices themselves.
He's still more so describing the ins and outs of the process, rather than any of the data itself. This step is a bit dry, but essential for this kind of evidence.
Falconer is now describing the two types of software he used to "validate" the data found on the devices from Millard's home.
The phone named "Dell's iPhone" was an iPhone 3GS.
Falconer says the data found on that phone had not been encrypted.
Falconer's presentation says SMS messages found on this phone backup ranged from Feb. 2010 to Feb. 2011. There were "thousands" of messages on the phone, he says.
He says that there were "regular occurrences" to references of "Dell, Dellen or Dillon."
Falconer now describing how iTunes works when it comes to iPhone backups. Might seem basic for some, but again integral in case some people in the courtroom don't understand.
Another backup had messages from Feb. 2010 until Feb. 2012. Messages regularly reference "Dell" or "Dellen," Falconer says.
We're now looking at another iPhone backup overview. Here, the iPhone has changed to an iPhone 4S.
SMS messages on this phone ranged from Feb. 2010 to Feb. 2013. There are numerous references to "Dell" or "Dellen" on it.
Now we're looking at an overview for a device called "Mark's iPad."
Crown Ken Lockhart is doing the examination in chief, here.
Though it's named "Mark's iPad," the email associated with the Apple ID is dell.millard@hotmail.com.
Falconer says the first backup of this iPad happened on July 4, 2012, 10:43 a.m. That's around the time the Crown alleges Babcock was killed.
Info on the iPad came from July 2012 to Jan. 2013, in the form of Skype calls, messaging, and iMessages.
The presentation says both Mark Smich and his then-girlfriend Marlena Meneses were using the iPad at that time.
Falconer says there was data on the backup that came from before July 4, and that came from other people who weren't Smich or Meneses.
Lockhardt says we're "going to examine the usage of this iPad much more closely" later on.
Falconer says there were Skype accounts on the iPad with usernames Marlena.mark1 and Marlena&Mark.
While Falconer is testifying, Millard is sitting at a table taking notes on a computer.
Again, this is all just the "introduction phase" to this data. We'll be going way deeper today as this progresses.
Now looking at another iPhone backup. This one has the owner name "Andrew's iPhone" and has a michalski_andrew@hotmail.com apple ID.
It was also connected to Michalski's Facebook account.
The messages from this backup range from March 2011 to Jan. 2013. They reference "Andrew, Kowalski, or chalski."
Now looking at another iPhone backup, coming from the laptop found in the bedroom at Millard's home. The owner name is "Rubix's iPhone."
The apple ID is "sweet_chiquita8t9@hotmail.com." Here, there are references to "Tina/Christina/Chris." This backup has messages from August 2012 to March 2013.
We're now getting an explanation of various file types we'll see. SMS messages (texts), MMS messages (multimedia texts) chat or iMessages (coming from message services), JPEGs (picture files), PNGs (screen captures), MOVs (movie files), contacts, notes, and calendars.
Millard is now looking at screen captures of messages from backups found on devices from his home on a laptop.
Falconer is now explaining what each one of those file types is.
"There was a huge amount of data that was necessary to review," Falconer says, adding there was a team of five people going over it. "It took them several months to do it."
Falconer is now giving an overview of storage folders from computers found at Millard's home. They had a lot of photos and videos, he says.
He says there's photos and videos on there spanning a time period of about a decade.
For reference of how long this presentation will be: we're on slide #33. There are over 300 slides. There's a ton of data and messages that will be shown in this courtroom today.
We're now seeing a screen capture of folders from Millard's hard drive. There's dozens of them on the screen. There are folders marked Berlin, France, boatTrip, etc.
There's also a folder on the screen marked "PedoandCats."
Court now seeing a photo of Millard and what appears to be Christina Noudga, while Falconer explains more about data collection.
Falconer is now explaining how you can see GPS coordinates in the metadata of photos, to determine where they were taken, and when.
Video files have this data too, but screen captures don't, he says.
We're now seeing a chart comparing photos found from Windows storage folders with thumbnails and folders from an iPhone backup.