<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[Hard Drive - Law Office of W.F. ''Casey'' Ebsary Jr]]></title>
        <atom:link href="https://www.centrallaw.com/blog/categories/hard-drive/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.centrallaw.com/blog/categories/hard-drive/</link>
        <description><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr's Website]]></description>
        <lastBuildDate>Sun, 19 Jan 2025 15:06:18 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Tampa Computer Trial Attorney – Lawyer on Computers in Court]]></title>
                <link>https://www.centrallaw.com/blog/tampa-computer-trial-attorney-lawyer-on-computers-in-court/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/tampa-computer-trial-attorney-lawyer-on-computers-in-court/</guid>
                <dc:creator><![CDATA[W.F. ''Casey'' Ebsary Jr.]]></dc:creator>
                <pubDate>Fri, 15 Aug 2014 21:14:00 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                    <category><![CDATA[Cyber]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                    <category><![CDATA[Flash Drive]]></category>
                
                    <category><![CDATA[Hard Drive]]></category>
                
                    <category><![CDATA[sms]]></category>
                
                
                    <category><![CDATA[Cell Phone]]></category>
                
                
                
                <description><![CDATA[<p>Law Enforcement and attorneys for the other side have a team working against you. Why not have your own Forensics Team working for you? More than ninety percent (90%) of documents are now created electronically, and less than thirty percent (30%) of those electronic documents are ever converted to paper. Rules on preserving electronically stored&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<figure class="wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Computers in Florida Courts - Forensics 1-877-793-9290" width="500" height="375" src="https://www.youtube-nocookie.com/embed/rwl8mh0Vt8k?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<p>Law Enforcement and attorneys for the other side have a team working against you. Why not have your own <strong>Forensics </strong>Team working for you? More than ninety percent (90%) of documents are now created electronically, and less than thirty percent (30%) of those electronic documents are ever converted to paper. Rules on preserving electronically stored information and strategies to recover that data make having a Forensic <strong>eDiscovery </strong>team more important than ever before.</p>


<div class="wp-block-image">
<figure class="alignright size-full is-resized"><img loading="lazy" decoding="async" src="/static/2023/12/image-15.jpeg" alt="Fingertip" class="wp-image-2524" style="width:154px;height:200px" width="154" height="200"/></figure></div>


<p>Police have specialized equipment analyzing original digital media such as <strong>hard drives</strong>, disks, and <strong>flash drives,</strong>and <strong>optical disk drives </strong>in the computer forensics lab. There is special hardware and software that retrieves evidence from <strong>cell phones</strong>, including<strong> text messages (SMS)</strong> and pictures. For computers, specialized software is used to examine the computers and extract the evidence. We can too.</p>



<p>We use a team of <a href="/criminal-defense/computer-crimes/">attorney(s)</a> and forensics expert(s) to help sort through data used in prosecution of <strong>federal indictments </strong>and state charges, <strong>fraud, hacking, theft of trade secrets</strong>, and other forms of <strong>cybercrimes</strong>.</p>



<p>With surge in popularity of <strong>mobile devices</strong> we can now forensically retrieve Information from mobile devices. We also provide help in searching corporate <strong>e-mail</strong>, personal e-mail, <strong>Short Message Service </strong>(SMS) text messages, personal notes, calendar entries, photographs, address books, and inbound and outbound <strong>call logs</strong>. This type of information can be invaluable to prove certain facts for a case.</p>



<p>Remember – an <a href="/lawyers/w-f-casey-ebsary-jr/">expert</a> can help preserve the chain of custody and this data can then be used in litigation.</p>



<p><a href="/criminal-defense/computer-crimes/">Computer in Court? Tell Me Your Story (813) 222-2220</a></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Decryption of Hard Drive Blocked]]></title>
                <link>https://www.centrallaw.com/blog/decryption-of-hard-drive-blocked/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/decryption-of-hard-drive-blocked/</guid>
                <dc:creator><![CDATA[W.F. ''Casey'' Ebsary Jr.]]></dc:creator>
                <pubDate>Thu, 23 Feb 2012 23:24:00 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Decrypt]]></category>
                
                    <category><![CDATA[Decryption]]></category>
                
                    <category><![CDATA[Encrypt]]></category>
                
                    <category><![CDATA[Encryption]]></category>
                
                    <category><![CDATA[Fifth Amendment]]></category>
                
                    <category><![CDATA[Hard Disk]]></category>
                
                    <category><![CDATA[Hard Drive]]></category>
                
                    <category><![CDATA[Password]]></category>
                
                    <category><![CDATA[Self Incrimination]]></category>
                
                    <category><![CDATA[TrueCrypt]]></category>
                
                
                    <category><![CDATA[5th Amendment]]></category>
                
                
                
                <description><![CDATA[<p>TrueCrypt and the Fifth Amendment Federal Defense Attorney&nbsp;just won a case where the&nbsp;defendant&nbsp;was ordered to&nbsp;decrypt&nbsp;a&nbsp;hard drive&nbsp;the government had lawfully seized. Feds tried to force a defendant to give up a&nbsp;password&nbsp;used to&nbsp;encrypt&nbsp;several hard drives using&nbsp;TrueCrypt. Case Excerpts: “The Fifth Amendment protects Doe’s refusal to decrypt and produce the contents of the media devices because the act&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="155" height="200" src="/static/2023/11/image.jpeg" alt="Fingerprint" class="wp-image-2131"/><figcaption class="wp-element-caption">TrueCrypt and the Fifth Amendment</figcaption></figure></div>


<h2 class="wp-block-heading" id="h-truecrypt-and-the-fifth-amendment">TrueCrypt and the Fifth Amendment</h2>



<p><strong>Federal Defense Attorney&nbsp;</strong>just won a case where the&nbsp;<strong>defendant&nbsp;</strong>was ordered to&nbsp;<strong>decrypt&nbsp;</strong>a&nbsp;<strong>hard drive&nbsp;</strong>the government had lawfully seized. Feds tried to force a defendant to give up a&nbsp;<strong>password&nbsp;</strong>used to&nbsp;<strong>encrypt&nbsp;</strong>several hard drives using&nbsp;<strong>TrueCrypt</strong>.</p>



<p>Case Excerpts: “The Fifth Amendment protects Doe’s refusal to decrypt and produce the contents of the media devices because the act of decryption and production would be testimonial . . . .”</p>



<p>“We hold that Doe properly invoked the&nbsp;<strong>Fifth Amendment privilege</strong>. In response, the Government chose not give him the immunity the Fifth Amendment and 18 U.S.C. § 6002 mandate, and the district court acquiesced. Stripped of Fifth Amendment protection, Doe refused to produce the unencrypted contents of the hard drives. The refusal was justified, and the district court erred in adjudging him in civil contempt. The district court’s judgment is accordingly REVERSED”</p>



<p>Congrats to Attorney Chet Kaufman </p>



<p><strong>Decryption an Issue? Call Casey at (813) 222-2220</strong></p>
]]></content:encoded>
            </item>
        
    </channel>
</rss>