FAYETTEVILLE, Ark. (KNWA / KFTA) – Friday afternoon at the Western Arkansas District Courthouse in Fayetteville, the prosecution and defense teams each concluded their interview with a computer forensics expert from the US Department of Justice.
At 5 p.m. Judge Timothy L. Brooks gave the jury the option of leaving for the weekend or continuing to complete the testimony of High Technology Investigative Unit (HTIU) Director James Fottrell. The jury chose to let him finish his time at the bar.
Duggar’s lead defense attorney Justin Gelfand continued his cross-examination of the witness when the jury returned from lunch shortly after 1:30 p.m.
He raised various points, noting that a USB drive plugged into an HP computer was never seized or found by officers during the search warrant executed on the Duggar parking lot in November 2019.
Forensic evidence shows that a USB drive containing two Word documents and a Powerpoint file was inserted into the HP at one point. Later, during the redirect with Attorney William Clayman, the subject returned to this missing element.
Defense attorneys for Duggar argued that someone else downloaded or placed the child pornography on the 33-year-old’s work computer, noting that no child pornography was found on the phone or Duggar’s laptop.
But federal prosecutors have detailed logs showing minute-by-minute activity on Duggar’s computer that alternated between sending personal messages, downloading child pornography, and recording photos of notes.
On Thursday, Fottrell testified that an open source Linux operating system and an encryption capable browser were installed behind a partition on the used car dealer’s desktop computer.
The partition essentially split the computer’s hard drive into a public side which was linked to the business and included the tracking program, and a second secret side which used Linux and the browser, experts said.
This allowed anyone using the computer to evade an accountability program installed to report Duggar’s wife to any inappropriate internet activity, such as searching for pornography.
Fottrell said sexually explicit photos and videos of children were found on the Linux side of the computer, the Northwest Arkansas Democrat-Gazette reported.
On Friday, Fottrell provided details obtained from a backup of Duggar’s iPhone, made on a MacBook Pro laptop, which placed the phone in the parking lot on the exact dates and times the illegal material was downloaded, viewed and shared on the dealership’s desktop computer. .
Senior Homeland Security forensic analyst James Follett said on Friday that a car receipt naming “Josh” as the sales agent was found behind the bulkhead where child pornography was uploaded, the Democrat reported. Gazette. And the password to access the hidden section was a variation of the passwords Duggar had used on other devices for at least five years.
Duggar, featured on TLC’s “19 Kids and Counting”, was charged in April. Prosecutors said child pornography was downloaded to the computer in May 2019.
TLC pulled the reality show in 2015 following revelations that Duggar assaulted four of his sisters and a babysitter. Duggar’s parents said he confessed to the touching and apologized. U.S. District Judge Timothy Brooks ruled earlier this week that jurors could hear details of that abuse in the child pornography trial.
In 2015, Duggar publicly apologized for his porn addiction and cheating on his wife, calling himself “the greatest hypocrite of all time.”
Duggar’s trial begins as his father, Jim Bob Duggar, runs in a special election for a vacant seat in the Northwestern Arkansas State Senate. Jim Bob Duggar has also featured prominently on the TLC show and previously served at Arkansas House. The primary election for the open seat is December 14.
The Associated Press contributed to this report.
Suggest a correction