Our computer forensics and e-discovery expert witnesses have been interviewed on national and local news television broadcasts such as CNN as Subject Matter Experts.
Computer Forensic Expert Dave Kleiman on CNN - Email Hacking
Computer forensics expert witness Dave Kleiman was featured on CNN In Session discussing the Sarah Palin email hacking case. David Kernell is accused of breaking into Palin's email account by using Yahoo's email password reset utility. In this interview for In Session, Kleiman, author and technical editor of Perfect Passwords, discusses how to use incorrect answers to Yahoo's security questions. By using false answers, it makes it much harder for someone to guess your answer and be able to reset your password. CNN's Vinnie Politan interviewed computer forensics expert Dave Kleiman and discussed how to track down a hacker and how to better protect yourself. Poor passwords are often the weakest link in an otherwise strong security system. Perfect Passwords Book
Computer Forensic Expert Dave Kleiman on CNN - FaceBook
Computer forensics expert witness Dave Kleiman appeared on CNN In Session to discuss the Devonni Benton murder trial. The only person to identify the shooter is Brandon Hall who picked him out from a photo lineup. Apparently Hall sent a Facebook message to Benton's girlfriend stating "I could have been mistaken, but I saw the Mohawk and Devon was the only one.." Hall denied sending the Facebook message. Since Hall denies sending the message (that CNN has a copy of), is it possible that someone hacked into Hall's account and sent the message? Kleiman, says that while it is possible to hack into a Facebook account, it is probably beyond the skill level of the ordinary user. In fact, it is quite possible to prove if Hall is telling the truth by sending a subpoena to Facebook and obtaining the IP addresses used to log into his account. Law enforcement has the power of a criminal subpoena which will get a response within a few days. In civil litigation, a subpoena can provide the same information, but it can take up to 30 days to obtain. An IP address can link a person to a physical address. If it was actually Hall that was logged into his Facebook account at the time the message was sent, it seems likely he was the sender. Conversely, if the IP address recorded by Facebook when the message was sent was not Hall's, then it would cast doubt on the authenticity of the message.
Computer Forensic Expert Dave Kleiman on ABC News - Lake Worth
Computer forensics expert witness Dave Kleiman was featured on ABC News, WPBF 25 Florida, discussing an alleged computer security breach at the City of Lake Worth, Florida. Kleiman conducted an independent analysis of audit logs, security logs, and computers used by ex-employees in an effort to determine if there was unauthorized access. His forensic analysis revealed a lack of evidence indicating that there had been any intrusion.
When we examine a computer system to see if it has been 'hacked' or if there are unauthorized access, we will typically examine log files, registry artifacts and other items of forensic interest. Independent expert Kleiman showed that there was no evidence that any computer was wrongfully used to access the city's network. The City of Lake Worth manager Susan Stanton claims that the terminated employees failed to carry out their duties.
Computer ForensicS Expert Dave Kleiman on ABC News - Identity Theft
Computer forensics expert witness Dave Kleiman was featured on ABC News, WPBF 25 Florida, discussing with Alexis Rivera the fact that modern-day copier machines have hard disk drives that could be used for Identity Theft. Often copier machines are leased, and unbeknownst to the user, when the copier is returned, hundreds, sometimes thousands of documents can be retrieved from the copier machine hard disk drives.
Contact Us by Email:
We do respond to emails daily (usually within a few hours)
Contact Us by Phone:
Computer Forensics LLC
1880 North Congress Ave. Suite 333
Boynton Beach, Florida 33426
For most engagements, available travel fee free in West Palm Beach, Miami-Dade, Fort Lauderdale-Broward, Stuart-Martin, Port Saint Lucie, Fort Pierce, Treasure Coast, and Vero Beach-Indian River Florida
Only 1 Hour travel to Orlando-Orange County, Daytona Beach-Volusia, Cocoa Beach-Palm Bay-Titusville-Melbourne-Brevard, and Kissimmee-Saint Cloud Florida
See our Subject Matter Experts national news television appearances NEWS
Locate our Computer Forensic Expert Witnesses in FindLaw's Case Law section U.S. v. MORTON - U.S. v. SCHALES
Collaboration appeared to be the best defense to cyberattacks on private enterprises at the Chief Information Security Officer and Chief Legal Officer (CISO/CLO) Summit on Monday, entitled "Defending the Enterprise," sponsored by Guidance Software Inc. and FireEye Inc.
InfoPreserve Inc., a cloud-based storage provider, announced new Active Cloud Archive features using dtSearch Engine's data support and full-text search capabilities; and more legal technology industry news May 20-21.
A conference on cybersecurity, e-discovery, and digital investigations (CEIC) offers hands-on labs, lectures, and an exhibit hall to develop practical skills in digital investigations and will debut Guidance Software's next EnCase Enterprise product.
In an appeal that could make law on jurisdiction in international IP cases, Ninth Circuit Judge M. Margaret McKeown wondered if the trial judge went too far, effectively shutting down Hong Kong's Oron.com over its dispute with pornography distributor DataTech Enterprises.
3-D printing technology, which makes it possible to create an item by simply downloading a design file and printing it out as a plastic object, is likely to trigger legal conflicts surrounding copyrights, trademarks, and patents.
The Federal Trade Commission sent letters to more than 90 businesses, informing them that they could potentially be in violation of the Children's Online Privacy Protection Act when changes to the law go into effect on July 1.
When Pete Townshend wrote "Goin' Mobile," first produced by The Who on their 1971 album "Who's Next," little did he realize the tune would portend how lawyers, even those "Over 50," would receive their news and information. Recognizing the importance of mobility, LTN and its parent company ALM are adopting mobile as a preferred means to deliver the news.
In United States v. Wurie, No. 11-1792 (1st Cir. 2013), the First Circuit held that the search of a cell phone incident to arrest categorically violates the Fourth Amendment. As a result, the court reversed the defendant's motion to suppress, vacated the conviction, and remanded the case.
While performing routine surveillance, a Boston police officer observed a man conducting what appeared to be
The Northwestern University Law Review's newest issue (a special edition recognizing Northwestern Law faculty member Martin Redish) offers an interesting piece by Andrea M. Matwyshyn titled "Hacking Speech: Informational Speech And The First Amendment." Dr. Matwyshyn is an assistant professor of legal studies and business ethics at the University of Pennsylvania’s Wharton School, a faculty affil
This case focuses a bit more on the civil side of the Computer Fraud and Abuse Act (CFAA). In Modrowski v. Pogatto, the Seventh Circuit Court of Appeals demonstrates the importance of the value requirement of a civil suit under the CFAA. 18 U.S.C. § 1030(g) states, in relevant part, that
[a]ny person who suffers damage or loss by reason of a violation of this section may maintain a civil acti
The Associated Press announced today that the Justice Department obtained two months of telephone records from more than twenty AP office telephones just over a year ago. The DOJ notified the AP of the investigation on Friday. AP's President and CEO has "demanded the return of the phone records and destruction of all copies."
According to the AP, the process for obtaining records from n
In United States v. Savader, 13-MJ-359 (E.D.N.Y. May 7, 2013), Magistrate Judge Gary R. Brown denied bail to Adam Savader because of the nature of his crimes (cyberstalking and internet extortion) and due to the "weaponized" nature of the cache of compromising pictures the defendant possesses. The court's reference to weaponization derived from the fact that the images of the 15 victims were in c
The National Security Agency recently released a 642-page guide titled "Untangling The Web: A Guide To Internet Research" under a Freedom of Information Act request. As the major purpose of the guide is to "help you understand how to use the Internet more efficiently," there isn't much in the document worth noting - perhaps made clear by the fact that the 642 pages are almost entirely unredacted
In United States v. Rigmaiden, No. 2:08-cr-00814-DGC (D. Ariz. May 8, 2013), a federal district judge in Arizona denied all of the defendant's motions to suppress. The motions were related to searches, the FBI's use of Stingray, access to stored communications and IP addresses, etc. It is long, but worth the read. An excerpt (relating to the Fourth Amendment argument):
Given the unique circ
Stephanie K. Pell has posted a new paper on SSRN entitled: "Jonesing for a Privacy Mandate, Getting a Technology Fix--Doctrine to Follow." Hat-tip to Chris Soghoian for mentioning it on Twitter. The article abstract is below:
While the Jones Court held unanimously that the government’s use of a GPS device to track Antoine Jones’ vehicle for 28 days was a Fourth Amendment search, the Just
There was a time when people ended a relationship and moved on with their lives. Nowadays, with digital cameras and the Internet, it is much easier to seek revenge for all of the wrongs you experienced. For those of you unaware, "revenge porn" is the term applied when a person posts nude images of someone they know on the Internet - often doing so after the end of a relationship.