Computer Forensic Expert Dave Kleiman on CNN - Email Hacking
Computer forensics expert witness Dave Kleiman was featured on CNN In Session discussing the Sarah Palin email hacking case. David Kernell is accused of breaking into Palin's email account by using Yahoo's email password reset utility. In this interview for In Session, Kleiman, author and technical editor of Perfect Passwords, discusses how to use incorrect answers to Yahoo's security questions. By using false answers, it makes it much harder for someone to guess your answer and be able to reset your password. CNN's Vinnie Politan interviewed computer forensics expert Dave Kleiman and discussed how to track down a hacker and how to better protect yourself. Poor passwords are often the weakest link in an otherwise strong security system. Perfect Passwords Book
Computer Forensic Expert Dave Kleiman on CNN - FaceBook
Computer forensics expert witness Dave Kleiman appeared on CNN In Session to discuss the Devonni Benton murder trial. The only person to identify the shooter is Brandon Hall who picked him out from a photo lineup. Apparently Hall sent a Facebook message to Benton's girlfriend stating "I could have been mistaken, but I saw the Mohawk and Devon was the only one.." Hall denied sending the Facebook message. Since Hall denies sending the message (that CNN has a copy of), is it possible that someone hacked into Hall's account and sent the message? Kleiman, says that while it is possible to hack into a Facebook account, it is probably beyond the skill level of the ordinary user. In fact, it is quite possible to prove if Hall is telling the truth by sending a subpoena to Facebook and obtaining the IP addresses used to log into his account. Law enforcement has the power of a criminal subpoena which will get a response within a few days. In civil litigation, a subpoena can provide the same information, but it can take up to 30 days to obtain. An IP address can link a person to a physical address. If it was actually Hall that was logged into his Facebook account at the time the message was sent, it seems likely he was the sender. Conversely, if the IP address recorded by Facebook when the message was sent was not Hall's, then it would cast doubt on the authenticity of the message.
Computer Forensic Expert Dave Kleiman on ABC News - Lake Worth
Computer forensics expert witness Dave Kleiman was featured on ABC News, WPBF 25 Florida, discussing an alleged computer security breach at the City of Lake Worth, Florida. Kleiman conducted an independent analysis of audit logs, security logs, and computers used by ex-employees in an effort to determine if there was unauthorized access. His forensic analysis revealed a lack of evidence indicating that there had been any intrusion.
When we examine a computer system to see if it has been 'hacked' or if there are unauthorized access, we will typically examine log files, registry artifacts and other items of forensic interest. Independent expert Kleiman showed that there was no evidence that any computer was wrongfully used to access the city's network. The City of Lake Worth manager Susan Stanton claims that the terminated employees failed to carry out their duties.
Computer ForensicS Expert Dave Kleiman on ABC News - Identity Theft
Computer forensics expert witness Dave Kleiman was featured on ABC News, WPBF 25 Florida, discussing with Alexis Rivera the fact that modern-day copier machines have hard disk drives that could be used for Identity Theft. Often copier machines are leased, and unbeknownst to the user, when the copier is returned, hundreds, sometimes thousands of documents can be retrieved from the copier machine hard disk drives.
Contact Us by Email:
Contact Us by Phone:
Computer Forensics LLC
1880 North Congress Ave. Suite 333
Boynton Beach, Florida 33426
For most engagements, available travel fee free in West Palm Beach, Miami-Dade, Fort Lauderdale-Broward, Stuart-Martin, Port Saint Lucie, Fort Pierce, Treasure Coast, and Vero Beach-Indian River Florida
See our Subject Matter Experts national news television appearances NEWS
Locate our Computer Forensic Expert Witnesses in FindLaw's Case Law section U.S. v. MORTON - U.S. v. SCHALES
Skip to 4:06:50 to hear the short, non-controversial "public hearing" on the Wisconsin "revenge porn" bill. Notably, the representatives noted that the bill was drafted with input with Mary Ann Franks. I find that interesting, given that I called the bill overbroad and noted that it does not in fact follow the model statute proposed by Professor Franks. My post criticizing the bill is here: W
Andrew Tutt has an article up on SSRN about online speech entitled The New Speech, forthcoming in the Hastings Constitutional Law Quarterly. The abstract is below:Could the government prevent Facebook from deleting an individualâ€™s Facebook account without first following government-prescribed procedures? Intervene to require Google to conduct its search engine rankings in a certain manner, or su
The Second Circuit recently held that a two-level enhancement for distribution of child pornography can only be applied if the defendant "knowingly plac[ed] child pornography files in a peer-to-peer sharing folder." United States v. Reed, No. 11-4820 (2d Cir. 2013).Under Section 2G2.2(b)(3), the Sentencing Guidelines allow a five-level enhancement for distribution "for the receipt, or expecta
In Commonwealth v. Baker, No. 1 MAP 2012 (Pa. 2013), the Pennsylvania Supreme Court analyzed whether a 25-year minimum prison sentence is unconstitutional when applied to a defendant's second conviction for possession child pornography. Finding it not to be grossly disproportionate, the court affirmed the conviction.The defendant was first convicted for possession in 2001, and later in 2007, polic
Frank Lin, a 3L at the University of Oregon, has a new law review article out entitled "Siri, Can You Keep a Secret? A Balanced Approach to Fourth Amendment Principles and Location Data."I asked him to comment on his motivation for the article and he responded as follows:I was drawn to this topic because privacy is one of the most important issues facing the American public today and it is one tha
The District of Columbia installed "300 acoustic sensors across 20 square miles of the city" nearly a decade ago in a project called "ShotSpotter". The system has detected 39,000 gunshots in the system's eight-year history. According to the Washington Post,ShotSpotter is also linked to a system of closed-circuit cameras, which police hope will capture the aftermath of shootings in real time. To gu
[[ The case is United States v. Mayo, No. 2:13-CR-48 (D. Vt. Nov. 6, 2013). (the link here is to the order denying suppression - more on that below).Defendant's Motion to SuppressGovernment's Opposition to MTSDef. Response to Gov't Opposition to MTSDef. Post-Suppression Hearing MemoGov't Post- Suppression Hearing MemoDef.'s Supplemental Filing re: the Katzin&nbs
In United States v. Keith, No. 11-10294 (D. Mass. 2013), the court held that after AOL submitted to the National Center for Missing and Exploited Children (NCMEC) an image possibly containing child pornography, NCMEC violated the Fourth Amendment by opening the image.AOL maintains a database of hash values of images that have been classified by AOL employees as child pornography. When employees ar
On November 5th, Florida State Senator Jeff Brandes (R- Dist. 22) introduced legislation that would amend Floridaâ€™s Computer Crimes Act (Fla. Stat. Â§ 815.01â€“07) (the "FCCA"). While only just introduced and likely subject to further amendments, the Bill (SB 364) provides a few noteworthy changes to the state's current computer crimes statute.I was able to speak with Senator Brandes about