Search

Author name: Kenneth G Hartman

Digital Hashing for Lawyers: Understanding the Essentials for Criminal Defense

Digital Hashing for Lawyers: Understanding the Essentials for Criminal Defense Introduction In the digital age, where most of our communications, transactions, and even personal activities leave a digital footprint, understanding the nuances of digital forensics has become crucial for legal professionals, particularly criminal defense lawyers. One such nuance, often overlooked yet fundamental in the realm

Digital Hashing for Lawyers: Understanding the Essentials for Criminal Defense Read More »

Who said What? Coping with hundreds of hours of audio evidence

Who said What? Coping with hundreds of hours of audio evidence Recently, I have had multiple cases where a substantial portion of the evidence was from body-worn video or recorded phone calls. In one case, a dozen police officers spent several hours executing a search warrant and questioning the home’s residents. In another case, the

Who said What? Coping with hundreds of hours of audio evidence Read More »

Forensic analysts can be wrong about the USB Drives attached to a computer in evidence.

My friend and colleague, Kevin Ripa of the Grayson Group of Companies, has published some astonishing research [1] that shows Microsoft Windows can inaccurately report the serial numbers of the drives attached to the computer system and may even report the same incorrect serial number for multiple drives. This can lead a forensic analyst to

Forensic analysts can be wrong about the USB Drives attached to a computer in evidence. Read More »

Do you know of a tool that can identify if any sensitive data exists in this data storage system?

This question comes up in various forms, for example, when an employee is stealing intellectual property from their employer or if there was a breach of medical records. Most recently, it was a colleague that asked, "Do you have any script that looks inside of a local directory for PHI or PII?" By PHI, we

Do you know of a tool that can identify if any sensitive data exists in this data storage system? Read More »

Scroll to Top