<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Burgess Forensics</title>
	<atom:link href="https://burgessforensics.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://burgessforensics.com/</link>
	<description>Computer Forensics, Electronic Discovery &#38; Expert Witness</description>
	<lastBuildDate>Tue, 17 Mar 2026 22:06:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://burgessforensics.com/wp-content/uploads/2016/08/burgess-42x42.png</url>
	<title>Burgess Forensics</title>
	<link>https://burgessforensics.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Where Critical Evidence Hides: Email, Texts, &#038; Cloud Data Part II</title>
		<link>https://burgessforensics.com/where-critical-evidence-hides-email-texts-cloud-data-part-ii/</link>
					<comments>https://burgessforensics.com/where-critical-evidence-hides-email-texts-cloud-data-part-ii/#respond</comments>
		
		<dc:creator><![CDATA[Steve Burgess]]></dc:creator>
		<pubDate>Tue, 17 Mar 2026 22:06:42 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://burgessforensics.com/?p=15330</guid>

					<description><![CDATA[<p>Email, Texts, &#38; Cloud Data: Where Critical Evidence Hides, Part II        Copyright 2026, Steve Burgess In over four decades of digital forensics work, I&#8217;ve examined more than 20,000 devices and pieces of digital evidence. And in that time I&#8217;ve developed a reliable theory: the evidence that counts – that might win or [&#8230;]</p>
<p>The post <a href="https://burgessforensics.com/where-critical-evidence-hides-email-texts-cloud-data-part-ii/">Where Critical Evidence Hides: Email, Texts, &#038; Cloud Data Part II</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Email, Texts, &amp; Cloud Data: Where Critical Evidence Hides, Part II       </strong></p>
<p><em>Copyright 2026, Steve Burgess</em></p>
<p><a href="https://burgessforensics.com/wp-content/uploads/2026/03/Evidence-hiding-friendlycomputer.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15341 alignleft" src="https://burgessforensics.com/wp-content/uploads/2026/03/Evidence-hiding-friendlycomputer-209x300.jpg" alt="" width="144" height="206" /></a>In over four decades of digital forensics work, I&#8217;ve examined more than 20,000 devices and pieces of digital evidence. And in that time I&#8217;ve developed a reliable theory: the evidence that counts – that might win or lose a case is rarely sitting where the attorneys expected to find it.</p>
<p>It&#8217;s hiding. Not maliciously — well, sometimes maliciously — but more often just because nobody thought to look there.</p>
<p>Let me tell you about some of the places where the good stuff actually lives.</p>
<p><strong>The Email You Didn&#8217;t Ask For</strong></p>
<p>Attorneys ask for emails. That&#8217;s great. What they often forget is that email is not one thing — it&#8217;s a collection of things, each with its own quirks, its own storage habits, and its own forensic personality.</p>
<p>Consider Outlook. When you delete a message in Outlook, it doesn&#8217;t vanish. It goes to the Deleted Items folder. When you empty that folder, it still doesn&#8217;t vanish — not entirely. The message gets marked as deleted in the PST or OST file, but the data hangs around – not just in unallocated space – but also right in the file,  like a houseguest who doesn&#8217;t take hints. A forensic examiner can often recover those messages intact, complete with headers, timestamps, and attachments. Your client&#8217;s opponent who &#8220;deleted everything&#8221; may have deleted nothing of consequence at all.<a href="https://burgessforensics.com/wp-content/uploads/2026/03/email-header.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15340 alignright" src="https://burgessforensics.com/wp-content/uploads/2026/03/email-header-210x300.jpg" alt="" width="150" height="215" /></a></p>
<p>Then there&#8217;s webmail — Gmail, Yahoo, Outlook.com, and their cousins. Here&#8217;s where it gets interesting for attorneys. The messages don&#8217;t live on the user&#8217;s computer in the traditional sense. They live on the provider&#8217;s servers. That means you may need a subpoena or a preservation request to Google or Microsoft, and you need to move on that quickly, because providers don&#8217;t hold onto data forever out of the goodness of their hearts. Gmail keeps deleted messages in Trash for 30 days. After that, they&#8217;re gone from the server — though sometimes not entirely gone from a forensically imaged phone or computer that was syncing that account.</p>
<p>One more thing about email that trips people up: the headers. Nobody reads email headers. Attorneys definitely don&#8217;t read email headers. But headers tell you the actual IP address the message came from, the route it traveled, the mail servers it touched. And here’s the beauty of email saved in the provider’s servers – the user can’t really fake the dates and the precise timestamp, because those are assigned by the server, which is not in the user’s control. I&#8217;ve had cases where someone claimed an email was sent from one city when the header told me, very clearly, it was sent from another city entirely. Headers don&#8217;t lie. People do.</p>
<p><strong>Texts: More Than Just &#8220;Hey&#8221;</strong></p>
<p>SMS text messages are a goldmine. Most people treat them casually — the digital equivalent of talking out loud — which means they say things in texts they&#8217;d never commit to a formal email. I&#8217;ve seen business deals negotiated entirely over text. I&#8217;ve seen admissions, threats, and instructions that made attorneys&#8217; eyes go wide when we produced them. <strong><a href="https://burgessforensics.com/wp-content/uploads/2026/03/golden-text.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15339 alignleft" src="https://burgessforensics.com/wp-content/uploads/2026/03/golden-text-222x300.jpg" alt="" width="169" height="228" /></a></strong></p>
<p>The forensic wrinkle is device dependency. Unlike email, which typically has a server-side copy, SMS and iMessage messages often live primarily on the device itself. If that device hasn&#8217;t been preserved, you may be looking at a very uncomfortable conversation with your client about spoliation.</p>
<p>But don&#8217;t give up too quickly. A few things to remember:</p>
<p>iMessage has iCloud backup. If the user had iCloud backup enabled — and most iPhone users do, at least for a while — there may be a backup copy of the messages in the cloud. Apple will respond to valid legal process, although they may resist a bit. The preservation window isn&#8217;t infinite, but it exists.</p>
<p>Android devices with Google accounts often back up SMS data to Google&#8217;s servers as well, depending on device settings and the apps installed. Samsung has its own backup ecosystem. The point is: the phone is not the only place to look.</p>
<p>Carrier records are another option. Wireless carriers retain metadata — who texted whom, when, and from what number — for varying periods. AT&amp;T, Verizon, T-Mobile: they all have legal compliance departments that respond to subpoenas. You won&#8217;t get the content of the messages from the carrier, but you&#8217;ll get the records of communication, which can be extremely valuable for establishing a timeline or refuting someone&#8217;s claim that they &#8220;never contacted&#8221; the other party. And cell tower records can point where the user’s phone was when they were using it.</p>
<p><strong>The Cloud: Where Everything Lives Now, Even the Things You Forgot About</strong></p>
<p>Cloud storage is the gift that keeps on giving — to forensic examiners, anyway.</p>
<p><a href="https://burgessforensics.com/wp-content/uploads/2026/03/Pinned-cloud.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class=" wp-image-15336 alignright" src="https://burgessforensics.com/wp-content/uploads/2026/03/Pinned-cloud-211x300.jpg" alt="" width="184" height="262" /></a>Google Drive, iCloud, Dropbox, OneDrive, Box: people store documents, photos, videos, and files in the cloud without thinking much about it. They also forget what they&#8217;ve stored there. This creates a wonderful situation where the evidence is sitting in the cloud, perfectly preserved, while the person who put it there has completely forgotten it exists. I have been on the beneficial end of this situation more than once.</p>
<p>One case that comes to mind involved a business dispute where the defendant insisted he had no copies of certain proprietary documents. His hard drive, conveniently, had been wiped. His phone, also conveniently, was new. But his Google account had been syncing files from his old computer for two years. Those documents were sitting right there in his GDrive, timestamped and everything. Not wiped. Not new. Just waiting.</p>
<p>The lesson: always ask about cloud storage accounts as part of your discovery requests. Not just &#8220;do you use Dropbox&#8221; — ask about all of them. Google Drive. iCloud. OneDrive. Box. Evernote. There’s more. Even Adobe Creative Cloud if the case involves documents or design files. People have more cloud accounts than they realize, and they rarely think of them as places where evidence lives.</p>
<p><strong>Messaging Apps: The New Wild West</strong></p>
<p>Here&#8217;s where attorneys really leave evidence on the table.</p>
<p>WhatsApp, Telegram, Signal, Facebook Messenger, Instagram DMs, Snapchat, WeChat, Line — and whatever new platform launched last Tuesday. These are messaging apps, and they are increasingly where people conduct their most candid conversations. They feel private. They feel ephemeral. They often aren&#8217;t.</p>
<p><strong><a href="https://burgessforensics.com/wp-content/uploads/2026/03/Old-Wild-West-Message.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15337 alignleft" src="https://burgessforensics.com/wp-content/uploads/2026/03/Old-Wild-West-Message-210x300.jpg" alt="" width="184" height="263" /></a></strong>WhatsApp stores message databases on the device, and — critically — backs them up to either Google Drive or iCloud. Those backups are not encrypted with the same end-to-end encryption that protects messages in transit. That&#8217;s a significant forensic opportunity if you can get access to the backup.</p>
<p>Telegram stores messages on Telegram&#8217;s own servers unless the user specifically uses the &#8220;Secret Chat&#8221; feature. Regular Telegram chats are cloud-based and accessible from multiple devices. The fact that someone deleted a Telegram message on their phone does not mean the message is gone <em>everywhere.</em></p>
<p>Signal is the hard one. Signal is designed to be forensically resistant. It uses end-to-end encryption, stores messages locally, and gives users easy tools to set messages to auto-delete. However, the device itself can sometimes still be examined if we have access to it and the right tools. And sometimes people screenshoot Signal messages and those screenshots end up somewhere more recoverable. People undermine their own secure communications with impressive regularity.</p>
<p>Snapchat is a perennial source of confusion. &#8220;But it disappears!&#8221; No — it disappears from the app&#8217;s interface. Snapchat retains opened snaps on its servers for a period after opening, and unopened snaps for longer. Forensic examination of the device can also reveal plenty of evidence of Snap activity even after &#8220;disappearance.&#8221; And again: screenshots. Always screenshots.</p>
<p><strong>Location Data: The Witness Who Never Lies (Much)</strong></p>
<p>I&#8217;ll include this one because it relates to cloud data and it&#8217;s massively underutilized.</p>
<p>Smartphones are location-tracking devices that also make phone calls. The location data that accumulates in cloud accounts — Google Timeline, Apple&#8217;s Significant Locations, fitness apps, rideshare apps, photo metadata — can place a person at a specific location at a specific time with remarkable precision.</p>
<p>Phones don’t keep an audit trail of all locations – too many users screamed about that several years ago and the providers just stopped – but as above, it can be derived, inferred, and actually found from other artifacts.</p>
<p>I&#8217;ve worked cases where Google Timeline data provided a minute-by-minute account of where a phone traveled on a given day. Photo EXIF data embedded GPS coordinates and timestamps in every image. The phone didn&#8217;t just know where the person was — it was more than willing to tell us.</p>
<p>The catch: much of this data is tied to cloud accounts and requires preservation requests or legal process. Some of it is stored only on the device. Either way, if location is at issue in your case, ask your forensic expert about it early.</p>
<p><strong>A Word About Preservation</strong></p>
<p>Everything I&#8217;ve described above comes with an expiration date. Email gets purged. Carrier records get overwritten. Cloud backups get replaced by newer backups. Messaging app logs get deleted. The evidence isn&#8217;t gone yet — but it will be.<a href="https://burgessforensics.com/wp-content/uploads/2026/03/preserved-evidence.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15335 alignright" src="https://burgessforensics.com/wp-content/uploads/2026/03/preserved-evidence-207x300.jpg" alt="" width="173" height="251" /></a></p>
<p>The single most expensive mistake I see attorneys make is waiting too long to engage a forensic examiner. By the time the case heats up and someone thinks to ask about the text messages, the carrier retention window has closed, the phone has been traded in, and the iCloud backup has been overwritten fourteen times. I’ve seen this plenty of times and they attorney can only say, “if only…”</p>
<p>Digital evidence doesn&#8217;t wait for a convenient moment in your litigation schedule. Issue litigation holds early. Serve preservation letters early. Call a forensic expert early — ideally before the evidence knows it&#8217;s being looked for.</p>
<p>After 40 years and 20,000-plus look-sees, I can tell you that the cases that get won on digital evidence are usually the ones where someone moved fast. The cases that get lost on digital evidence are usually the ones where someone assumed the evidence would still be there when they got around to it.</p>
<p>It wasn&#8217;t.</p>
<p><em>Steve Burgess is a digital forensics expert witness and the founder of Burgess Forensics, one of the longest-established independent digital forensics practices in the United States. He has examined more than 20,000 cases over four decades and provides expert witness testimony in civil and criminal matters nationwide. He can be reached at burgessforensics.com.</em></p>
<p>The post <a href="https://burgessforensics.com/where-critical-evidence-hides-email-texts-cloud-data-part-ii/">Where Critical Evidence Hides: Email, Texts, &#038; Cloud Data Part II</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://burgessforensics.com/where-critical-evidence-hides-email-texts-cloud-data-part-ii/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Can You Trust What You See? The Rise of Deepfakes and What It Means for Justice</title>
		<link>https://burgessforensics.com/can-you-trust-what-you-see-the-rise-of-deepfakes-and-what-it-means-for-justice/</link>
					<comments>https://burgessforensics.com/can-you-trust-what-you-see-the-rise-of-deepfakes-and-what-it-means-for-justice/#respond</comments>
		
		<dc:creator><![CDATA[Steve Burgess]]></dc:creator>
		<pubDate>Mon, 16 Feb 2026 00:54:12 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://burgessforensics.com/?p=15317</guid>

					<description><![CDATA[<p>Can You Trust What You See? The Rise of Deepfakes and What It Means for Justice Copyright 2026, Steve Burgess I&#8217;ve been working with digital evidence since 1985, and I&#8217;ve seen a lot of changes. Back then, the biggest challenge was recovering data from a 10 MB hard drive—yes, megabytes, for you youngsters who think gigabytes are [&#8230;]</p>
<p>The post <a href="https://burgessforensics.com/can-you-trust-what-you-see-the-rise-of-deepfakes-and-what-it-means-for-justice/">Can You Trust What You See? The Rise of Deepfakes and What It Means for Justice</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Can You Trust What You See? The Rise of Deepfakes and What It Means for Justice</strong></p>
<p><em>Copyright 2026, Steve Burgess</em></p>
<p>I&#8217;ve been working with digital evidence since 1985, and I&#8217;ve seen a lot of changes. Back then, the biggest challenge was recovering data from a 10 MB hard drive—yes, <em>megabytes</em>, for you youngsters who think gigabytes are small. But nothing compares to what&#8217;s happening right now with artificial intelligence.<em><a href="https://burgessforensics.com/wp-content/uploads/2026/02/Old-guy-computer.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15322 alignleft" src="https://burgessforensics.com/wp-content/uploads/2026/02/Old-guy-computer-300x300.jpg" alt="" width="216" height="216" /></a></em></p>
<p>Here&#8217;s something that should concern everyone: we&#8217;ve reached a point where anyone with a smartphone can create fake videos, photos, and audio recordings that look and sound completely real. Not &#8220;pretty good&#8221; fakes that experts can spot. I&#8217;m talking about fakes so convincing that even professionals like me have trouble telling the difference. And trust me, after 40 years of staring at computer screens, my ability to spot weird pixels is legendary.</p>
<p>This technology is called &#8220;deepfake&#8221; AI, and it&#8217;s already being used in courtrooms, whether judges and juries realize it or not.</p>
<p><strong>What Are Deepfakes?</strong></p>
<p>Think of deepfakes as Photoshop on steroids. Photoshop that went to Gold’s Gym, got a PhD in computer science from University of Phoenix, and decided to cause chaos. But instead of just touching up a photo, this technology can:<em><a href="https://burgessforensics.com/wp-content/uploads/2026/02/CHIraffeguy.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class=" wp-image-15318 alignright" src="https://burgessforensics.com/wp-content/uploads/2026/02/CHIraffeguy-200x300.jpg" alt="" width="169" height="254" /></a></em></p>
<ul>
<li>Put your face on someone else&#8217;s body in a video</li>
<li>Make you appear to say things you never said</li>
<li>Create recordings of your voice saying anything</li>
<li>Generate completely fake images that look like real photographs</li>
</ul>
<p>The scary part? This used to require expensive equipment and expert knowledge. Now there are apps that can do it on your phone in minutes. The same phone you use to watch cat videos and argue with strangers on the Internet.</p>
<p><strong>Why This Matters in Court</strong></p>
<p>Imagine you&#8217;re on a jury. The prosecutor shows you a video of the defendant at the crime scene. It looks real. It sounds real. The metadata (the hidden information in the file) says it was recorded at the right time and place.</p>
<p>But what if that video was created by AI? What if the defendant was never actually there?</p>
<p>Or flip it around: what if you&#8217;re accused of something, and there&#8217;s a fake video showing you doing it? How do you prove it&#8217;s not real when it looks so convincing?</p>
<p>This isn&#8217;t hypothetical. These situations are already happening in courtrooms. Welcome to the future, where &#8220;the camera doesn&#8217;t lie&#8221; is officially retired as a saying.</p>
<p><strong>The Old Rules Don&#8217;t Work Anymore</strong></p>
<p>For decades, we&#8217;ve had pretty good ways to tell if photos and videos were tampered with. We could look at the file&#8217;s internal structure, check when and where it was created, and spot the digital fingerprints left behind when someone edits an image.<a href="https://burgessforensics.com/wp-content/uploads/2026/02/rules.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15324 alignleft" src="https://burgessforensics.com/wp-content/uploads/2026/02/rules-300x200.jpg" alt="" width="248" height="165" /></a></p>
<p>But AI-generated fakes don&#8217;t leave those fingerprints. They&#8217;re not edited versions of real photos or videos—they&#8217;re created from scratch. There&#8217;s nothing to compare them to because there was never an original.</p>
<p>It&#8217;s like trying to prove a painting is a forgery when there&#8217;s no original painting to compare it to.</p>
<p><strong>What&#8217;s Being Done About It</strong></p>
<p>The good news is that courts are starting to take this seriously.</p>
<p>In 2025, new federal rules were put in place that require stricter verification of digital evidence that might involve AI. Judges can now demand that experts test evidence with multiple detection tools before it&#8217;s allowed in court.</p>
<p>Some tech companies are also developing authentication systems. Think of it like a tamper-proof seal on a medicine bottle, but for digital files. These systems create a kind of digital signature the moment a photo or video is captured, proving it&#8217;s authentic.</p>
<p>The problem? Most phones and cameras don&#8217;t have this technology yet, and it could be years before it becomes standard. So, we&#8217;re in that awkward phase where the bad guys have a bunch of cool toys and the good guys are still waiting for their equipment to ship.</p>
<p><strong>How Do Experts Catch Fakes?</strong></p>
<p>I wish I could tell you we have a foolproof method, but we don&#8217;t. If I had one, I&#8217;d be drinking mojitos on a beach somewhere instead of writing this article. What we do is use multiple approaches:</p>
<p><strong>Run detection software.</strong> There are programs specifically designed to spot AI-generated content. They&#8217;re not perfect, but they can catch many fakes.</p>
<p><strong>Look for impossible things.</strong> Sometimes AI makes mistakes—lighting that doesn&#8217;t match, shadows falling the wrong way, people with eleven fingers, or physics that just don&#8217;t work in the real world. AI is smart, but it still occasionally forgets how gravity works.</p>
<p><strong>Check the story.</strong> Where did this evidence come from? Who had access to it? Does it make sense that this file exists?</p>
<p><strong>Compare with other evidence.</strong> If you have ten photos from an event and nine look normal but one looks suspicious, that&#8217;s a red flag.</p>
<p>The truth is, detecting deepfakes is getting harder as the technology improves. The detecting tech gets better, too. But it&#8217;s an arms race, and right now, the fakers are ahead. It&#8217;s like playing whack-a-mole, except the moles have PhDs and keep getting smarter.</p>
<p><strong>What This Means for You</strong></p>
<p>You might be thinking, &#8220;I&#8217;m not a lawyer or a forensics expert. Why should I care?&#8221;</p>
<p>Here&#8217;s why: we&#8217;re all going to be affected by this technology.</p>
<p>Maybe you&#8217;ll serve on a jury and need to decide if evidence is real. Maybe you&#8217;ll see a video of a public figure saying something outrageous (that they never actually said). Maybe someone will use this technology to fake evidence against you or someone you love. Or maybe you&#8217;ll just want to know if that video of your uncle &#8220;dancing&#8221; at the wedding is real or if someone&#8217;s playing a prank.</p>
<p>We&#8217;re entering a era where &#8220;seeing is believing&#8221; is no longer true. That&#8217;s a fundamental shift in how we understand reality and truth.</p>
<p><strong>What You Can Do</strong></p>
<p><strong>Be skeptical.</strong> Just because a video looks real doesn&#8217;t mean it is. This is especially important for dramatic claims or shocking content. If it seems too crazy to be true, it might be—but then again, it&#8217;s 2026, so who knows anymore.</p>
<p><strong>Check sources.</strong> Before believing or sharing something, try to verify where it came from. Is it from a credible source?</p>
<p><strong>Understand the stakes.</strong> In legal situations—whether it&#8217;s a court case, an insurance claim, or a business dispute—insist on proper verification of digital evidence.</p>
<p><strong>Stay informed.</strong> This technology is evolving rapidly. What&#8217;s true today might be outdated in six months.</p>
<p><strong>Looking to the Future<em><a href="https://burgessforensics.com/wp-content/uploads/2026/02/courtroom-futuristic.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-15319 alignright" src="https://burgessforensics.com/wp-content/uploads/2026/02/courtroom-futuristic-300x200.jpg" alt="" width="300" height="200" /></a></em></strong></p>
<p>I&#8217;ve been doing this work for over 40 years, and I&#8217;ve learned that technology always creates new challenges. But we adapt. We develop new tools, new methods, new ways of finding the truth. It&#8217;s what keeps forensic experts like me from having to learn how to do something sensible, like accounting, or racing cars.</p>
<p>Courts are updating their rules. Researchers are building better detection tools. Tech companies are working on authentication systems. It&#8217;s going to take time, but we&#8217;ll figure this out.</p>
<p>In the meantime, we all need to be more careful about what we believe and more demanding about proof. The old saying &#8220;don&#8217;t believe everything you see on the Internet&#8221; has never been more important.<em><a href="https://burgessforensics.com/wp-content/uploads/2026/02/Surprise-eyese.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15323 alignleft" src="https://burgessforensics.com/wp-content/uploads/2026/02/Surprise-eyese-200x300.jpg" alt="" width="138" height="207" /></a></em></p>
<p>Because in 2026, sometimes you can&#8217;t believe your own lyin&#8217; eyes. Which is a little ironic, because your eyes aren&#8217;t the ones lyin &#8211; it&#8217;s the computers. But try explaining that to a jury.</p>
<p><em>Steve Burgess has been working in digital forensics since 1985 and has examined evidence in over 20,000 cases. If you have questions about digital evidence or think you might be dealing with AI-generated content, Burgess Forensics can help. We also promise not to create any deepfakes of you. That&#8217;s in our mission statement.<br />
steve@burgessforensics.com     </em></p>
<p>&nbsp;</p>
<p>The post <a href="https://burgessforensics.com/can-you-trust-what-you-see-the-rise-of-deepfakes-and-what-it-means-for-justice/">Can You Trust What You See? The Rise of Deepfakes and What It Means for Justice</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://burgessforensics.com/can-you-trust-what-you-see-the-rise-of-deepfakes-and-what-it-means-for-justice/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Deepfakes, AI, and the New Frontier of Digital Evidence</title>
		<link>https://burgessforensics.com/deepfakes-ai-and-the-new-frontier-of-digital-evidence/</link>
					<comments>https://burgessforensics.com/deepfakes-ai-and-the-new-frontier-of-digital-evidence/#respond</comments>
		
		<dc:creator><![CDATA[Steve Burgess]]></dc:creator>
		<pubDate>Thu, 12 Feb 2026 00:34:39 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://burgessforensics.com/?p=15310</guid>

					<description><![CDATA[<p>Deepfakes, AI, and the New Frontier of Digital Evidence Copyright 2026, Steve Burgess It was true forty years ago and it&#8217;s truer today: &#8220;Just because it&#8217;s digital doesn&#8217;t mean it&#8217;s true.&#8221; We&#8217;re now facing a challenge that would have seemed like science fiction when I started doing civilian data recovery back in 1985: artificial intelligence [&#8230;]</p>
<p>The post <a href="https://burgessforensics.com/deepfakes-ai-and-the-new-frontier-of-digital-evidence/">Deepfakes, AI, and the New Frontier of Digital Evidence</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Deepfakes, AI, and the New Frontier of Digital Evidence </strong>Copyright 2026, Steve Burgess</p>
<p>It was true forty years ago and it&#8217;s truer today: &#8220;Just because it&#8217;s digital doesn&#8217;t mean it&#8217;s true.&#8221;</p>
<p>We&#8217;re now facing a challenge that would have seemed like science fiction when I started doing civilian data recovery back in 1985: artificial intelligence that can fabricate images, videos, and audio recordings so convincing that even experts can be fooled. Welcome to the era of deepfakes, and trust me, it&#8217;s already changing how courts handle digital evidence.</p>
<p><strong>What We&#8217;re Up Against</strong></p>
<p>Let me paint you a picture of where we are right now. AI-generated content has moved from research labs to consumer smartphones. Anyone with a decent app can now:</p>
<p><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15314 alignleft" src="https://burgessforensics.com/wp-content/uploads/2026/02/deepfake-dude-295x300.jpg" alt="" width="223" height="227" />&#8211; Swap faces in videos with frightening accuracy</p>
<p>&#8211; Clone voices from just a few seconds of sample audio</p>
<p>&#8211; Generate entirely synthetic images of people who don&#8217;t exist … and of those who do.</p>
<p>&#8211; Alter existing footage in ways that leave minimal technical traces</p>
<p>I&#8217;ve examined cases where manipulated video evidence looked so authentic that initial reviewers accepted it without question. The technology has democratized deception in ways we&#8217;ve never seen before.</p>
<p><strong>The Authentication Crisis</strong></p>
<p>Here&#8217;s what keeps me up at night: our traditional methods of authenticating digital evidence are struggling to keep pace.</p>
<p>For decades, we&#8217;ve relied on metadata analysis, file structure examination, and chain of custody documentation. Those tools still matter, but in many cases, they&#8217;re no longer enough. When AI can generate a video from scratch—complete with realistic metadata, proper codec structures, and no obvious manipulation artifacts—we need a fundamentally different approach.</p>
<p>The challenge isn&#8217;t just technical. It&#8217;s philosophical. We&#8217;re moving from a world where we asked &#8220;Has this been altered?&#8221; to one where we must ask &#8220;Is this even real to begin with?&#8221;</p>
<p><strong>The Metadata Problem</strong></p>
<p>In traditional forensics – and most of the time even now &#8211; metadata has been our friend. Creation dates, device identifiers, GPS coordinates—these data points help us verify authenticity and establish provenance. But AI-generated content can include perfectly plausible metadata that&#8217;s entirely fabricated.</p>
<p><strong>The &#8220;No Negative&#8221; Dilemma<a href="https://burgessforensics.com/wp-content/uploads/2026/02/film-negative.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15313 alignright" src="https://burgessforensics.com/wp-content/uploads/2026/02/film-negative-300x198.jpg" alt="" width="230" height="152" /></a></strong></p>
<p>Back in the day, photos had negative. Even in modern (digital) photography, there&#8217;s usually a kind of &#8220;negative&#8221;—an original file that shows a clear progression from capture to final image. With AI generation, there is no negative. The content springs into existence fully formed. How do you authenticate something that has no original?</p>
<p><strong>What Courts Are Starting to Do</strong></p>
<p>The good news? Courts are waking up to this challenge, and we&#8217;re seeing some interesting responses.</p>
<p><strong>Enhanced Authentication Standards</strong></p>
<p>Federal jurisdictions are raising the bar for digital evidence authentication. In June, 2025, the Judicial Conference of the US’s Committee on Rules of Practice and Procedure approved Federal Rule of Evidence 707, that ensures that AI-derived evidence is subject to the same Daubert standards as traditional expert testimony.</p>
<p>A judge might require the expert to run multiple AI detection algorithms on submitted video evidence—not because there was any specific reason to doubt it, but because the stakes were high enough to warrant extra scrutiny.</p>
<p><strong>Blockchain and Cryptographic Verification</strong></p>
<p>Courts are also showing increased interest in cryptographic authentication methods. Some organizations are now implementing systems that create cryptographic signatures at the moment of capture—essentially a digital seal that proves when and where content was created.</p>
<p>The Content Authenticity Initiative (backed by Adobe, Microsoft, public media, camera manufacturers, and others) is pushing standards for embedding authentication data directly into digital files. While not yet widely adopted in legal contexts, even in its sixth year, attorneys ask about these tools more frequently.</p>
<p><strong>Expert Testimony Evolution</strong></p>
<p>The role of digital forensics experts is expanding. It&#8217;s no longer enough to say &#8220;I examined this file and found no signs of manipulation.&#8221; Now we&#8217;re being asked:</p>
<p><a href="https://burgessforensics.com/wp-content/uploads/2026/02/Expert-on-the-stand-female-facing-left.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-15311 alignright" src="https://burgessforensics.com/wp-content/uploads/2026/02/Expert-on-the-stand-female-facing-left-300x196.jpg" alt="" width="300" height="196" /></a> What is the probability this content is AI-generated?</p>
<p>&#8211; Can you rule out deepfake creation methods?</p>
<p>&#8211; What authentication measures were in place at capture?</p>
<p>&#8211; Are there any positive indicators of authenticity beyond the absence of manipulation?</p>
<p>That last question is crucial. We&#8217;re moving from negative verification (looking for signs of tampering) to positive verification (finding affirmative proof of authenticity).</p>
<p><strong>The Detection Arms Race</strong></p>
<p>Here&#8217;s the uncomfortable truth: detection is always playing catch-up … and the law is yet is almost always further behind. By the time we develop tools to identify one generation of AI-generated content, the next generation is already better at evading detection.<a href="https://burgessforensics.com/wp-content/uploads/2026/02/arms-race.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class=" wp-image-15315 alignright" src="https://burgessforensics.com/wp-content/uploads/2026/02/arms-race-300x193.jpg" alt="" width="260" height="167" /></a></p>
<p>I use multiple AI detection tools in my practice—everything from Microsoft&#8217;s Video Authenticator to various academic research tools. They&#8217;re helpful, but they&#8217;re not foolproof. Detection accuracy varies wildly depending on the generation method, content type, and how much post-processing has been applied.</p>
<p><strong>What Actually Works</strong></p>
<p>In my experience, the most reliable authentication approaches combine multiple layers:</p>
<p>**Technical analysis**: Running the content through various detection algorithms and looking for statistical anomalies that suggest AI generation.</p>
<p>**Contextual verification**: Examining the chain of custody, device provenance, and whether the content&#8217;s existence makes sense given the circumstances.</p>
<p>**Comparative analysis**: Looking for consistency across multiple pieces of evidence. If someone has ten photos from an event and one looks AI-generated, that&#8217;s a red flag.</p>
<p>**Behavioral indicators**: Sometimes the content itself reveals impossibilities—lighting that doesn&#8217;t match the environment, shadows that fall the wrong direction, or subtle physics violations that our brains recognize even if we can&#8217;t articulate why something looks &#8220;off.&#8221;</p>
<p><strong>Best Practices for Attorneys</strong></p>
<p>If you&#8217;re handling cases with digital evidence (and let&#8217;s face it, what case doesn&#8217;t have digital evidence these days?), here&#8217;s what you need to know:</p>
<p>**Get evidence authenticated early.** Don&#8217;t wait until trial to discover your key video evidence might be AI-generated. Have it examined during discovery.</p>
<p>**Document the chain of custody meticulously.** With deepfakes, provenance matters more than ever. Know where the evidence came from and every hand it passed through.</p>
<p>**Preserve the original files.**  Maintain the original files in their native format with all metadata intact.</p>
<p>**Consider protective orders.** If you&#8217;re worried about evidence being used to create convincing fakes, seek protective orders limiting how digital evidence can be used or distributed.</p>
<p>**Budget for expert analysis.** Authenticating digital evidence in the age of AI isn&#8217;t cheap, but it&#8217;s a lot less expensive than losing a case because you relied on fabricated evidence.</p>
<p><strong>Looking Ahead</strong></p>
<p><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class=" wp-image-15312 alignleft" src="https://burgessforensics.com/wp-content/uploads/2026/02/Atty-looking-forward-copy-300x300.jpg" alt="" width="246" height="246" />This problem is going to get worse before it gets better. AI generation capabilities are improving faster than detection methods. Within a few years, we&#8217;ll likely face synthetic evidence that&#8217;s indistinguishable from authentic content using current detection methods.</p>
<p>But I&#8217;m not entirely pessimistic. The legal system has adapted to technological challenges before—from fingerprinting to DNA analysis to digital forensics itself. We&#8217;ll adapt to this too. And the tools are also improving fairly fast – sometimes with the help of AI itself.</p>
<p>The key is recognizing that we&#8217;re in a transition period. The old rules still apply, but they&#8217;re no longer sufficient. (But isn’t that always the case?) Courts are developing new standards, forensic methods are evolving, and the legal community is taking this threat seriously.</p>
<p><strong>The Bottom Line</strong></p>
<p>If there&#8217;s one thing I want you to take away from this article, it&#8217;s this: question everything. That advice has always been good practice in digital forensics, but now it&#8217;s absolutely essential.</p>
<p>Don&#8217;t assume video evidence is authentic because it looks convincing. Don&#8217;t trust audio recordings without verification. Don&#8217;t accept digital evidence at face value, no matter how legitimate it appears.</p>
<p>The technology to fabricate convincing digital evidence is here, it&#8217;s accessible, and it&#8217;s being used. Whether you&#8217;re prosecuting, defending, or presiding over cases, you need to understand this landscape and demand rigorous authentication of digital evidence.</p>
<p>Because in 2026, seeing—or hearing—is no longer believing. And that changes everything.</p>
<p>*Steve Burgess is a digital forensics expert with over 40 years of experience and has worked on more than 20,000 cases. Burgess Forensics has been serving attorneys with digital evidence analysis since 1984. If you have questions about authenticating digital evidence in your cases, we&#8217;re here to help.</p>
<p>The post <a href="https://burgessforensics.com/deepfakes-ai-and-the-new-frontier-of-digital-evidence/">Deepfakes, AI, and the New Frontier of Digital Evidence</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://burgessforensics.com/deepfakes-ai-and-the-new-frontier-of-digital-evidence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top 5 Mistakes Lawyers Make With Digital Evidence</title>
		<link>https://burgessforensics.com/top-5-mistakes-lawyers-make-with-digital-evidence/</link>
					<comments>https://burgessforensics.com/top-5-mistakes-lawyers-make-with-digital-evidence/#respond</comments>
		
		<dc:creator><![CDATA[Steve Burgess]]></dc:creator>
		<pubDate>Fri, 30 Jan 2026 21:53:16 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://burgessforensics.com/?p=15295</guid>

					<description><![CDATA[<p>Top 5 Mistakes Lawyers Make With Digital Evidence  &#8211;      Copyright 2026, Steve Burgess After forty years working with attorneys on digital evidence, I&#8217;ve seen the same mistakes cost cases time and again. Here are five of the most common – and how to avoid them. Mistake #1: Waiting Too Long to Preserve Evidence Digital [&#8230;]</p>
<p>The post <a href="https://burgessforensics.com/top-5-mistakes-lawyers-make-with-digital-evidence/">Top 5 Mistakes Lawyers Make With Digital Evidence</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><b>Top 5 Mistakes Lawyers Make With Digital Evidence  &#8211;      </b><b>Copyright 2026, Steve Burgess</b></p>
<p><span style="font-weight: 400;">After forty years working with attorneys on digital evidence, I&#8217;ve seen the same mistakes cost cases time and again. Here are five of the most common – and how to avoid them.</span></p>
<p><b>Mistake #1: Waiting Too Long to Preserve Evidence</b></p>
<p><span style="font-weight: 400;">Digital evidence disappears. Every time someone uses a device, it writes over old data. Even just turning a computer, tablet, or phone on writes new data and can irretrievably overwrite important logs and other files. Cloud accounts purge. Phones get reset. Employees leave with their devices.<a href="https://burgessforensics.com/wp-content/uploads/2026/01/Clockwatcher-copy.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15300 alignright" src="https://burgessforensics.com/wp-content/uploads/2026/01/Clockwatcher-copy-300x300.jpg" alt="" width="185" height="185" /></a></span></p>
<p><span style="font-weight: 400;">In one employment case, an attorney contacted me three weeks after filing. By then, IT had wiped the defendant&#8217;s laptop and reassigned it. Emails, browsing history – all gone. The case settled for pennies.</span></p>
<p><span style="font-weight: 400;">What to do? Send a preservation letter immediately – before you file, if possible. Be specific: phones, computers, cloud accounts, backup drives. Then follow up. If they drag their feet, file for a preservation order.</span></p>
<p><b>Mistake #2: Letting Your Client Handle the Evidence</b></p>
<p><span style="font-weight: 400;">Your clients mean well. They forward screenshots, print text messages, save files to thumb drives. But every time they touch that evidence, they change it. Metadata gets altered. Timestamps shift. Valuable metadata disappears when a file gets saved for you as a PDF.<a href="https://burgessforensics.com/wp-content/uploads/2026/01/Juggling-papers-computer.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15299 alignleft" src="https://burgessforensics.com/wp-content/uploads/2026/01/Juggling-papers-computer-300x300.jpg" alt="" width="190" height="190" /></a></span></p>
<p><span style="font-weight: 400;">I worked a family law case where a mother scanned threatening texts from her ex-husband as PDFs. The texts were real, but the metadata showed they were created the day before the hearing. The judge excluded them. She lost custody. A forensic extraction would have authenticated those messages in five minutes.</span></p>
<p><span style="font-weight: 400;">Don&#8217;t let clients collect their own evidence. Bring in a forensic expert early to properly image devices with full chain of custody. It costs a fraction of what you&#8217;ll lose if evidence gets excluded.</span></p>
<p><b>Mistake #3: Relying on Screenshots</b></p>
<p><span style="font-weight: 400;">Screenshots are convenient and visual. But from a forensic perspective, they&#8217;re basically worthless as evidence.<a href="https://burgessforensics.com/wp-content/uploads/2026/01/1800-brownie-with-computer.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15298 alignright" src="https://burgessforensics.com/wp-content/uploads/2026/01/1800-brownie-with-computer-300x300.jpg" alt="" width="175" height="175" /></a></span></p>
<p><span style="font-weight: 400;">A screenshot is just a picture. It doesn&#8217;t prove when something was created, who created it, or whether it&#8217;s altered. Anyone with photo editing software can fake one in seconds.</span></p>
<p><span style="font-weight: 400;">In one business fraud case, an attorney submitted Slack screenshots as his centerpiece evidence. The defense expert showed the timestamps didn&#8217;t match, the formatting was off, and the metadata was wrong. Screenshots excluded. Case collapsed. The screenshots were real – but without authentication, useless.</span></p>
<p><span style="font-weight: 400;">Get actual data from the source. Forensically image the phone, the computer, or the flash drive. Subpoena the platform. Capture the full metadata. Screenshots can illustrate a point, but they can&#8217;t prove it.</span></p>
<p><b>Mistake #4: Ignoring the Metadata</b></p>
<p><span style="font-weight: 400;">Metadata is the hidden information in every file – creation dates, edit times, GPS coordinates, device identifiers. It&#8217;s the DNA of digital evidence.</span></p>
<p><span style="font-weight: 400;"><a href="https://burgessforensics.com/wp-content/uploads/2026/01/Ignoring-evidence.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15297 alignleft" src="https://burgessforensics.com/wp-content/uploads/2026/01/Ignoring-evidence-209x300.jpg" alt="" width="137" height="197" /></a>Many lawyers ignore it or don&#8217;t know how to read it. That&#8217;s a problem, because metadata often tells a different story than the file itself.</span></p>
<p><span style="font-weight: 400;">In one contract dispute, the plaintiff submitted a PDF agreement dated March 15. The defendant&#8217;s expert checked the metadata and found it was actually created April 3 – two weeks after the claimed signing date. It had also been edited on April 5. Case dismissed.</span></p>
<p><span style="font-weight: 400;">Always check metadata before relying on digital files. If you don&#8217;t know how to read it, hire someone who does.</span></p>
<p><b>Mistake #5: Calling the Expert Too Late</b></p>
<p><span style="font-weight: 400;">Most attorneys call me when they&#8217;re already in trouble – evidence deleted, authenticity challenged, judge threatening sanctions. By then, it&#8217;s often too late.</span></p>
<p><span style="font-weight: 400;">I worked with an attorney who gathered evidence for six months on his own. When he finally brought me in before trial, we discovered half the &#8220;evidence&#8221; was inadmissible. Broken chain of custody. Altered metadata. No authentication. The case settled for much less than it should have.<a href="https://burgessforensics.com/wp-content/uploads/2026/01/Too-late.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15296 alignright" src="https://burgessforensics.com/wp-content/uploads/2026/01/Too-late-200x300.jpg" alt="" width="124" height="186" /></a></span></p>
<p><span style="font-weight: 400;">A forensic expert can identify what evidence exists, preserve data properly, authenticate documents for court, and testify to methodology under FRCP’s Rule 702. Early involvement doesn&#8217;t just protect your evidence – it strengthens your entire case.</span></p>
<p><b>The Takeaway</b></p>
<p><span style="font-weight: 400;">Treat digital evidence like physical evidence. You wouldn&#8217;t let your client collect their own blood samples. The same goes for phones, computers, emails, and cloud-based data.</span></p>
<p><span style="font-weight: 400;">Preserve early. Don&#8217;t let clients handle evidence. Get actual data, not screenshots. Check metadata. Involve an expert before trouble hits.</span></p>
<p><span style="font-weight: 400;">Your case will thank you.</span></p>
<p>The post <a href="https://burgessforensics.com/top-5-mistakes-lawyers-make-with-digital-evidence/">Top 5 Mistakes Lawyers Make With Digital Evidence</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://burgessforensics.com/top-5-mistakes-lawyers-make-with-digital-evidence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>20 Digital Forensics Facts for Attorneys</title>
		<link>https://burgessforensics.com/20-digital-forensics-facts-for-attorneys/</link>
					<comments>https://burgessforensics.com/20-digital-forensics-facts-for-attorneys/#respond</comments>
		
		<dc:creator><![CDATA[Steve Burgess]]></dc:creator>
		<pubDate>Mon, 24 Nov 2025 20:07:15 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://burgessforensics.com/?p=15275</guid>

					<description><![CDATA[<p>20 Digital Forensics Facts for Attorneys copyright 2025 Steve Burgess Deleted ≠ gone: Most deleted files remain recoverable until overwritten. Every case is a data case: Even “non-digital” disputes usually contain text messages, emails, or documents. Forensic imaging: A “bit-for-bit” or forensic working copy preserves evidence without altering the original. Chain of custody: In many [&#8230;]</p>
<p>The post <a href="https://burgessforensics.com/20-digital-forensics-facts-for-attorneys/">20 Digital Forensics Facts for Attorneys</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 style="text-align: center;"><strong>20 Digital Forensics Facts for Attorneys</strong></h3>
<p style="text-align: right;"><strong>copyright 2025 Steve Burgess</strong></p>
<ol>
<li>Deleted ≠ gone: Most deleted files remain recoverable until overwritten.</li>
<li>Every case is a data case: <a href="https://burgessforensics.com/wp-content/uploads/2025/11/Deleted-aint-gone.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class=" wp-image-15279 alignleft" src="https://burgessforensics.com/wp-content/uploads/2025/11/Deleted-aint-gone-300x164.jpg" alt="" width="271" height="148" /></a>Even “non-digital” disputes usually contain text messages, emails, or documents.</li>
<li>Forensic imaging: A “bit-for-bit” or forensic working copy preserves evidence without altering the original.</li>
<li>Chain of custody: In many cases, essential to maintain evidentiary integrity and courtroom admissibility.<a href="https://burgessforensics.com/wp-content/uploads/2025/11/Chain-of-custody.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class=" wp-image-15278 alignright" src="https://burgessforensics.com/wp-content/uploads/2025/11/Chain-of-custody-300x161.jpg" alt="" width="255" height="137" /></a></li>
</ol>
<p>.</p>
<ol start="5">
<li>Metadata matters: Creation dates, edits, GPS tags, author information, and other metadata often expose truth.<a href="https://burgessforensics.com/wp-content/uploads/2025/11/Metadata-matters.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-15277 alignleft" src="https://burgessforensics.com/wp-content/uploads/2025/11/Metadata-matters-300x164.jpg" alt="" width="300" height="164" /></a></li>
</ol>
<ol start="6">
<li>Timestamps can shift: System clock errors or time-zone changes can mislead investigators.</li>
</ol>
<ol start="7">
<li>Mobile devices: Contain texts, call logs, app data, health data, photos, and location trails.</li>
</ol>
<ol start="8">
<li>Cloud &amp; social media: Require proper authentication; screenshots alone are weak evidence.</li>
</ol>
<ol start="9">
<li>Encryption &amp; passwords: Legal access may require subpoenas or warrants; never guess or force.</li>
</ol>
<ol start="10">
<li>Spoliation risk: Even good-faith access or copying can alter metadata; always image first.</li>
<li>File format forensics: Different file types (PDF, DOCX, JPEG) embed distinct hidden data.</li>
</ol>
<ol start="12">
<li>Logs tell stories: System, email, and access logs can reconstruct user actions &#8211; and possibly reveal unauthorized access.</li>
</ol>
<ol start="13">
<li>Emails are not always what they seem: Headers reveal routing and spoofing attempts.</li>
</ol>
<ol start="14">
<li>Video &amp; photo forensics: Compression artifacts, error levels, and metadata help expose tampering.</li>
</ol>
<ol start="15">
<li>Cloud syncs create duplicates: Deleted files may survive in backups or mirrored accounts.<a href="https://burgessforensics.com/wp-content/uploads/2025/11/Cloud-creates-dupes.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-15276 alignright" src="https://burgessforensics.com/wp-content/uploads/2025/11/Cloud-creates-dupes-300x164.jpg" alt="" width="300" height="164" /></a></li>
</ol>
<ol start="16">
<li>Expert reports: Should clearly document tools, hashes, and methodology for repeatability.</li>
</ol>
<ol start="17">
<li>Hash values: Digital “fingerprints” that confirm evidence integrity (MD5, SHA-1, SHA-256).</li>
</ol>
<ol start="18">
<li>Forensic duplicators: Hardware tools create certified copies with built-in write blockers.</li>
</ol>
<ol start="19">
<li>Legal collaboration: Early involvement of forensic experts reduces spoliation and increases admissibility.</li>
</ol>
<ol start="20">
<li>Everything starts with data of some sort: computer, phone, tablet, email, documents.</li>
</ol>
<p>The post <a href="https://burgessforensics.com/20-digital-forensics-facts-for-attorneys/">20 Digital Forensics Facts for Attorneys</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://burgessforensics.com/20-digital-forensics-facts-for-attorneys/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Screenshots Are Barely Evidence: How to Authenticate Digital Data in Court</title>
		<link>https://burgessforensics.com/screenshots-are-barely-evidence-how-to-authenticate-digital-data-in-court/</link>
					<comments>https://burgessforensics.com/screenshots-are-barely-evidence-how-to-authenticate-digital-data-in-court/#respond</comments>
		
		<dc:creator><![CDATA[Steve Burgess]]></dc:creator>
		<pubDate>Mon, 24 Nov 2025 02:51:50 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://burgessforensics.com/?p=15271</guid>

					<description><![CDATA[<p>Screenshots Are Barely Evidence: How to Authenticate Digital Data in Court By Steve Burgess, Copyright 2025 Screenshots are convenient. They’re quick, visual, and easy for clients to share — but in the courtroom, convenience can be a trap. Screenshots alone rarely meet the evidentiary standards for authenticity, and relying on them without proper verification can [&#8230;]</p>
<p>The post <a href="https://burgessforensics.com/screenshots-are-barely-evidence-how-to-authenticate-digital-data-in-court/">Screenshots Are Barely Evidence: How to Authenticate Digital Data in Court</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Screenshots Are Barely Evidence: How to Authenticate Digital Data in Court</strong></p>
<p><em>By Steve Burgess, Copyright 2025</em></p>
<p>Screenshots are convenient. They’re quick, visual, and easy for clients to share — but in the courtroom, convenience can be a trap. Screenshots alone rarely meet the evidentiary standards for authenticity, and relying on them without proper verification can put your entire argument at risk.</p>
<p><strong>Why Screenshots Fall Short</strong></p>
<p>A screenshot is just an <em>image</em> — a flat picture of what was on a screen at a moment in time. It doesn’t prove when that content was created, who created it, or whether it was altered. Anyone with basic photo editing software (or AI tools) can change a screenshot in seconds.</p>
<p>Even unaltered screenshots are <strong>missing critical metadata</strong> — the hidden timestamps, source identifiers, and digital signatures that courts rely on to establish authenticity.</p>
<p><strong>In other words:</strong> a screenshot can illustrate a point, but it can’t authenticate it.</p>
<p><strong>What Courts Expect: Authenticity and Chain of Custody</strong></p>
<p>Under <strong>Federal Rule of Evidence 901</strong>, digital evidence must be authenticated — shown to be what its proponent claims it is. That usually means demonstrating <strong>how</strong> it was obtained and <strong>verifying</strong> that it hasn’t been altered.</p>
<p>A proper digital forensic process includes:</p>
<ol>
<li><strong>Verified source acquisition</strong> (using forensic imaging tools)</li>
<li><strong>Hash validation</strong> to prove the data hasn’t changed.</li>
<li><strong>Metadata preservation</strong></li>
<li><strong>Documented chain of custody</strong></li>
</ol>
<p>Without these, a screenshot’s evidentiary value drops to near zero.</p>
<p><strong>Real-World Example</strong></p>
<p>In one civil dispute, an attorney submitted screenshots a client saved from her phone as proof of her opponent’s threats. The opposing expert demonstrated that the timestamps didn’t match the date of the alleged event. In this case, the oldest source <a href="https://burgessforensics.com/wp-content/uploads/2025/11/Jetsons-house-copy.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-15272 alignright" src="https://burgessforensics.com/wp-content/uploads/2025/11/Jetsons-house-copy-200x300.jpg" alt="" width="200" height="300" /></a> had been synced to the client’s iCloud account, where the creation dates of the screenshots were found. The screenshots were excluded, and the case’s credibility took a hit.</p>
<p>Had the data been properly extracted from the device using forensic methods, the messages would have been admissible — and far more persuasive.</p>
<p><strong>Better Alternatives: Forensic Data Extraction</strong></p>
<p>When possible, always collect digital communications and files through verified forensic tools that:</p>
<ul>
<li>Capture <strong>full context</strong> (sender, recipient, timestamps, attachments)</li>
<li>Preserve <strong>metadata and hash values.</strong></li>
<li>Generate <strong>verifiable reports</strong> admissible under Rule 901 and 702
<ul>
<li>Rule 901 says that the evidence must be authenticated or identified to show it is what it purports to be.</li>
<li>Rule 702 says that (1) the expert must be qualified; (2) the testimony must address a subject matter on which the factfinder can be assisted by an expert; (3) the testimony must be reliable; and (4) the testimony must “fit” the facts of the case.</li>
</ul>
</li>
</ul>
<p>For example, forensic imaging of a phone, computer, or cloud account can provide the complete, untampered data set — not just what’s visible on-screen.</p>
<p>In the case of emails (or worse, screenshots of emailed screenshots), not only is the source image unverified, but the email itself would not have been authenticated.</p>
<p>The header information a user sees in an email may include a date, time, subject, sender, and recipient. But these things can be manufactured by something as simple as Microsoft Word, and in any case, do not contain the underlying data to verify that the header information is what it appears to be.</p>
<p><strong>How to Handle Screenshots You Already Have</strong></p>
<p>If your client only has screenshots, don’t panic — but don’t rely on them blindly.<br />
Here’s what to do:</p>
<ol>
<li><strong>Preserve the originals</strong> (“Zip” them to preserve the metadata it already has, then email them to yourself &#8211; don’t edit or crop).</li>
<li><strong>Note the source and circumstances</strong> (who took it, when, on what device).</li>
<li><strong>Engage a digital forensics expert</strong> to verify or locate the original data source.</li>
</ol>
<p>Often, we can use the screenshots as leads to locate the original files or messages, turning an unreliable image into admissible evidence.</p>
<p><strong>Key Takeaway</strong></p>
<p>Screenshots are a useful visual aid, but <strong>not a substitute for authentic digital evidence.</strong><br />
To protect your case, always verify and preserve data properly — ideally with the help of a qualified forensic expert.</p>
<p>&nbsp;</p>
<p>The post <a href="https://burgessforensics.com/screenshots-are-barely-evidence-how-to-authenticate-digital-data-in-court/">Screenshots Are Barely Evidence: How to Authenticate Digital Data in Court</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://burgessforensics.com/screenshots-are-barely-evidence-how-to-authenticate-digital-data-in-court/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Dodge Pegasus Spyware</title>
		<link>https://burgessforensics.com/how-to-dodge-pegasus-spyware/</link>
					<comments>https://burgessforensics.com/how-to-dodge-pegasus-spyware/#respond</comments>
		
		<dc:creator><![CDATA[Steve Burgess]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 18:16:16 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://burgessforensics.com/?p=15211</guid>

					<description><![CDATA[<p>How to Dodge Pegasus Spyware, copyright 2025 by Steve Burgess Pegasus was a superfast magical horse from Greek mythology that could fly over barriers, see everything from above, avoid detection, and had a really cute family in Disney’s Fantasia. The other Pegasus is a kind of Trojan horse software that infects cell phones, gets installed [&#8230;]</p>
<p>The post <a href="https://burgessforensics.com/how-to-dodge-pegasus-spyware/">How to Dodge Pegasus Spyware</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>How to Dodge Pegasus Spyware, copyright 2025 by Steve Burgess</strong></p>
<p>Pegasus was a superfast magical horse from Greek mythology that could fly over barriers, see everything from above, avoid detection, and had a really cute family in Disney’s Fantasia.</p>
<p><a href="https://burgessforensics.com/wp-content/uploads/2025/09/Pegasus-in-shades.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15214 alignright" src="https://burgessforensics.com/wp-content/uploads/2025/09/Pegasus-in-shades-300x200.jpg" alt="" width="216" height="144" /></a>The other Pegasus is a kind of Trojan horse software that infects cell phones, gets installed around barriers, is good at spying on users, and is good at avoiding detection. Feels kind of like dark magic. And is decidedly not cute.</p>
<p>While you might be worried that your phone is listening to you, Pegasus spyware doesn’t just listen &#8211; it rifles through your texts, photos, locations, and cat memes like Bewitched’s Mrs. Kravitz might do. Frankly, they can haz my cheezburger.</p>
<p><a href="https://burgessforensics.com/wp-content/uploads/2025/09/Dude-reaching-into-cell-phone.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-15213 alignleft" src="https://burgessforensics.com/wp-content/uploads/2025/09/Dude-reaching-into-cell-phone-300x200.jpg" alt="" width="300" height="200" /></a>But Pegasus, built by Israel’s NSO Group, is a military-grade surveillance tool that can sneak into phones without a click, a tap, or even a suspicious “You’ve won a free cruise!” link. Creepy, right?</p>
<p>Before you wrap your phone in aluminum foil and bury it in the backyard, take a breath. Pegasus is very expensive software – users, which are typically governments, pay tens of millions of dollars for its use. So, it’s typically aimed at high-profile targets like journalists, politicians, and activists. Not that, to some governments – and people – tens of millions are pocket change. But still, it’s known to be saved for those special folks who are unfortunate enough for an entity to want to spend that to spy on them.</p>
<p>Pegasus isn’t the only big-time phone cracker, though. Another Israeli firm, Paragon, sells its Graphite iOS Mercenary Spyware. It was <a href="https://citizenlab.ca/2025/06/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/">first confirmed</a> in April of 2025, on the phones of several journalists.</p>
<p>Like Pegasus, it’s very powerful spyware that doesn’t require a click, also known as “zero-click” malware. Almost all other malware requires the user to click on something to enable the infection. Pegasus and Graphite don’t need this.</p>
<p>While quite expensive, ICE (U.S. Immigration and Customs Enforcement) signed a contract with Paragon for two million dollars to use their spyware. It was restricted but the current US administration has <a href="https://english.elpais.com/usa/2025-09-05/graphite-the-israeli-spyware-acquired-by-ice.html">lifted</a> the restrictions on its use, so it may become a bit more widely utilized.<a href="https://burgessforensics.com/wp-content/uploads/2025/09/paragon-logo.jpg"><img loading="lazy" decoding="async" class="wp-image-15218 alignright" src="https://burgessforensics.com/wp-content/uploads/2025/09/paragon-logo-300x246.jpg" alt="" width="162" height="133" srcset="https://burgessforensics.com/wp-content/uploads/2025/09/paragon-logo-300x246.jpg 300w, https://burgessforensics.com/wp-content/uploads/2025/09/paragon-logo-130x107.jpg 130w, https://burgessforensics.com/wp-content/uploads/2025/09/paragon-logo.jpg 332w" sizes="(max-width: 162px) 100vw, 162px" /></a></p>
<p>Paragon says that it will only do business with democracies and that it won’t tolerance government clients who use the spyware to target members of civil society, such as journalists. But Paragon doesn’t reveal who those clients are (although we know about ICE) and we don’t’ know how well they will police the use of its technology.</p>
<p>Make up your own mind about the transparency of ICE. Still, though the software’s pretty expensive, and theoretically only allowed to democracies, so it’s unlikely to be used by individuals against anyone.</p>
<p>I should make a mention of QuaDream, founded by two former employees of NSO and also a generator of powerful zero-click malware. However, it’s widely believed to have shut down in 2023.</p>
<p>What’s a poor boy to do? Or a poor gal? Or a rich one?</p>
<p>First, note that you’re very unlikely to be targeted by Pegasus. And to a large extend by Graphite as well. With the exceptions noted above (journalists, political targets), you’re probably safe from this nasty stuff.</p>
<p>Still and all, all of us should treat smartphone security seriously. Here’s how to put a virtual flak jacket on your stuff.</p>
<p>UPDATE!</p>
<p>Software updates can be annoying. They always pop up when you’re about to post a photo of the grub on your plate that we all are dying to see. But updates are your first line of defense. Pegasus – and presumably Graphite &#8211; thrives on unpatched vulnerabilities—holes in your operating system or apps. Apple &amp; Google (Android) regularly plug those leaks, so installing updates promptly is like closing the barn door <em>before</em> the spyware sneaks in and makes itself at home.</p>
<p><strong>Don’t Click That Shady Link</strong></p>
<p>Frankly, don’t click it even if it looks like it’s not shady. Malware proliferates through malicious links sent in texts, emails, and messaging apps. If you didn’t expect that “urgent delivery notice,” assume it’s malware bait. Think of links the way you think of gas-station sushi: if you’re not sure where it came from, maybe don’t. In fact, maybe\e don’t click on <em>any</em> links in emails.</p>
<p><strong>Reboot</strong></p>
<p><a href="https://burgessforensics.com/wp-content/uploads/2025/09/reboot-cell-phone.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15215 alignleft" src="https://burgessforensics.com/wp-content/uploads/2025/09/reboot-cell-phone-300x200.jpg" alt="" width="191" height="127" /></a>Remember when rebooting fixed everything? (I’m not talking about actually kicking the thing, no matter how you’re feeling about it at the moment.) Turns out, rebooting your phone daily is still magic. Some Pegasus infections live in memory, so restarting can kick them out—at least temporarily. It won’t cure everything, but it’s like changing the locks on your house every night just in case.</p>
<p><strong>Use Secure Messaging Apps</strong></p>
<p>Apps like Signal and WhatsApp use strong encryption, which keeps out most eavesdroppers. Unfortunately, Pegasus has been known to exploit them too. So, while using secure apps is smart, remember: encryption keeps your nosy neighbor out, but not necessarily a professional spy tool.</p>
<p><strong>Reduce Your Attack Surface</strong></p>
<p>No, this doesn’t mean cutting carbs – although, come to think of it, not a bad idea. It means turning off the stuff you don’t use. Don’t need Bluetooth? Switch it off. Not using FaceTime or iMessage? Disable them. Every extra service is another door Pegasus can try to pry open. Think of it as digital minimalism: the fewer gadgets left running, the less chance something sneaks in.</p>
<p><strong>Try Lockdown Mode</strong></p>
<p>If you have an iPhone and you’re really worried Apple’s Lockdown Mode, available on iOS 16 or later, is like slamming every window and bolting every door. It restricts attachments, disables complex web technologies, and basically tells hackers, “Not today.” It may cramp your browsing style, but for high-risk folks, it’s worth the trade-off.</p>
<p><strong>Remember: You’re Probably Not Pegasus’ Type</strong></p>
<p>Don’t take offense, but unless you’re a journalist, politician, activist, or tech billionaire, the odds of Pegasus knocking on your digital door are slim. Still, adopting these habits won’t just protect you from elite spyware &#8211; it’ll help you avoid garden-variety malware, phishing scams, and the digital equivalent of a raccoon rummaging through your trash.</p>
<p><strong>P.S. There’s a tool for that</strong></p>
<p><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15216 alignright" src="https://burgessforensics.com/wp-content/uploads/2025/09/dr-evil-200x300.jpg" alt="" width="113" height="170" /></p>
<p>It’s not for the faint of heart or code-wary, but there’s a tool to help detect Pegasus. It’s called the Mobile Verification Tool (MVT), developed in part by Amnesty International and it’s available <a href="https://docs.mvt.re/en/latest/">here</a><a href="https://docs.mvt.re/en/latest/">.</a></p>
<p>Also, remember if you’re not clicking links in emails or articles, you can just type it into your address bar.</p>
<p>Here’s wishing you a James Bond/Dr. Evil-free phone and happy computing.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><strong> </strong></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://burgessforensics.com/how-to-dodge-pegasus-spyware/">How to Dodge Pegasus Spyware</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://burgessforensics.com/how-to-dodge-pegasus-spyware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Picture This: Keep Your Kids Safe Online.</title>
		<link>https://burgessforensics.com/picture-this-keep-your-kids-safe-online/</link>
					<comments>https://burgessforensics.com/picture-this-keep-your-kids-safe-online/#respond</comments>
		
		<dc:creator><![CDATA[Steve Burgess]]></dc:creator>
		<pubDate>Mon, 18 Aug 2025 23:57:44 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://burgessforensics.com/?p=15183</guid>

					<description><![CDATA[<p>Copyright 2025, Steve Burgess Yes, social media is fun. It helps to keep us in touch and stay in relationship with friends and loved ones. Even folks you haven’t seen or heard from in decades. And, as we all know, our kids are the most beautiful, creative, intelligent beings on the planet. And our grandkids [&#8230;]</p>
<p>The post <a href="https://burgessforensics.com/picture-this-keep-your-kids-safe-online/">Picture This: Keep Your Kids Safe Online.</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: right;"><strong>Copyright 2025, Steve Burgess</strong></p>
<p>Yes, social media is fun. It helps to keep us in touch and stay in relationship with friends and loved ones. Even folks you haven’t seen or heard from in decades. And, as we all know, our kids are the most beautiful, creative, intelligent beings on the planet. And our grandkids even moreso!<a href="https://burgessforensics.com/wp-content/uploads/2025/08/fam-in-park.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15188 alignright" src="https://burgessforensics.com/wp-content/uploads/2025/08/fam-in-park-300x200.jpg" alt="" width="227" height="151" /></a></p>
<p>So, of course, why wouldn’t we want to post pictures of these precious beings on our social media and to spread the joy we know of our progeny?</p>
<p>Unfortunately, there’s an answer as to why not. Even though the overwhelming majority of people are kind and caring, maybe one in a thousand is not. There are close to 6 billion people using the Internet. Do the math and even though it’s rare, that’s still a lot of crazies, and distance makes little difference in accessibility on the World Wide Web. And even though only a fraction of those are online predators, child safety advocates estimate there are about a half million predators online daily.</p>
<p>And now that I’ve ruined your day, here’s what’s worse (don’t’ worry, I’ll have some safety tips later).</p>
<p>Posting<a href="https://burgessforensics.com/wp-content/uploads/2025/08/superhero-bday-copy.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15185 alignleft" src="https://burgessforensics.com/wp-content/uploads/2025/08/superhero-bday-copy-300x200.jpg" alt="" width="212" height="141" /></a> pictures often reveals background information, like addresses or environments. Certainly, posting pictures of birthday parties exposes birthdates. These are the kinds of things that open kids up to identity theft.</p>
<p>There are almost-free programs and apps that anyone can download to easily create deepfakes of pretty much anyone they have a photo of.</p>
<p>And worse, some of these are “nudifier” apps, that can take a picture and generate a nude image of the subject. While it may be illegal to post such photos, it’s legal to sell these kinds of apps, and there are nearly a hundred of them at this point in time.<a href="https://burgessforensics.com/wp-content/uploads/2025/08/SheepWolf-copy.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15186 alignright" src="https://burgessforensics.com/wp-content/uploads/2025/08/SheepWolf-copy-300x200.jpg" alt="" width="221" height="147" /></a></p>
<p>Furthermore, if someone doesn’t post such images, they can still keep them to obsess over. Like I said, the sickos are rare, but they exist.</p>
<p>Posting on something like FaceBook or Instagram, even if it’s just to your friend or family group, doesn’t in any way guarantee that someone in that group won’t innocently post the pictures themselves. Or have their account scraped by the daily fake friend requesters.</p>
<p>When you broadcast on social media, you may inadvertently be broadcasting to The World. And The World includes some of those crazies.</p>
<p>So, what to do?</p>
<p>There are a couple of simple ways to protect your kids from people stealing, sharing, and altering likenesses of your kids.</p>
<p><a href="https://burgessforensics.com/wp-content/uploads/2025/08/digforenguy-copy.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15187 alignleft" src="https://burgessforensics.com/wp-content/uploads/2025/08/digforenguy-copy-300x200.jpg" alt="" width="227" height="151" /></a>One way is to keep pictures of your kids and grandkids, especially the smallest ones, offline. You can retroactively do so, by combing through your own social media accounts and removing them.</p>
<p>Also, it can be pretty safe to share your family and birthday pictures privately. Many messaging apps are encrypted end-to-end, so that may be one of the best ways to send them just to your family members or groups.</p>
<p>As a digital forensic practitioner, it’s sad when we have to investigate these kinds of cases as a part of our work.</p>
<p>So, keep your kids safe and keep their pictures offline. The Internet is not private.</p>
<p>The post <a href="https://burgessforensics.com/picture-this-keep-your-kids-safe-online/">Picture This: Keep Your Kids Safe Online.</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://burgessforensics.com/picture-this-keep-your-kids-safe-online/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Two Factor Authentication Fraud</title>
		<link>https://burgessforensics.com/two-factor-authentication-fraud/</link>
					<comments>https://burgessforensics.com/two-factor-authentication-fraud/#respond</comments>
		
		<dc:creator><![CDATA[Steve Burgess]]></dc:creator>
		<pubDate>Sat, 26 Jul 2025 00:11:38 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://burgessforensics.com/?p=15172</guid>

					<description><![CDATA[<p>Two Factor Authentication Fraud &#8211; copyright Steve Burgess, 2025 One of the better ways to protect yourself from online fraud is Two-Factor Authentication (2FA). This scheme is also known as 2-Step (or dual-step) Verification or Authentication, or Multi-Factor Authentication. Reportedly, AT&#38;T has been using 2FA since 1996, so it’s nothing new. As a result, there [&#8230;]</p>
<p>The post <a href="https://burgessforensics.com/two-factor-authentication-fraud/">Two Factor Authentication Fraud</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Two Factor Authentication Fraud &#8211; copyright Steve Burgess, 2025</strong></p>
<p><span style="font-weight: 400;">One of the better ways to protect yourself from online fraud is Two-Factor Authentication (2FA). This scheme is also known as 2-Step (or dual-step) Verification or Authentication, or Multi-Factor Authentication.</span></p>
<p><span style="font-weight: 400;">Reportedly, AT&amp;T has been using 2FA since 1996, so it’s nothing new. As a result, there has been plenty of time for fraudsters to try to figure ways around it. Yes, there exists 2FA Fraud.</span></p>
<p><span style="font-weight: 400;">More on this in a few paragraphs below.</span></p>
<p><span style="font-weight: 400;">When you log into your email, bank account, or social media and all you need to do is type in a password, that&#8217;s one-factor (or single-factor) authent<a href="https://burgessforensics.com/wp-content/uploads/2025/07/teller-asking-for-ID-copy.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15173 alignright" src="https://burgessforensics.com/wp-content/uploads/2025/07/teller-asking-for-ID-copy-300x300.jpg" alt="" width="192" height="192" /></a>ication. Two-factor authentication just means you have to take an additional step. </span></p>
<p><span style="font-weight: 400;">The way 2FA protection works, which it mostly does, is by having a code of some kind sent to your phone or computer when you try to log in to a private account. </span></p>
<p><span style="font-weight: 400;">Other means of 2FA, besides something you know (e.g. a password, as above), include something you have (like a </span><a href="https://www.1kosmos.com/security-glossary/hardware-security-token/" target="_blank" rel="noopener"><span style="font-weight: 400;">hardware token</span></a><span style="font-weight: 400;"> or cell phone), or something you are (like your fingerprint, your face, or other biometrics).</span></p>
<p><b>The problem with using just a single factor.</b></p>
<p><span style="font-weight: 400;">Even though an increasing number of online accounts require 2FA, there are still many that do not. And after all, who wants to go through a big rigamarole just to read some email, or buy something</span></p>
<p><span style="font-weight: 400;">Many people choose insecure passwords, such as “1234” or “password.” Many also use easy to guess words or phrases, such as a favorite color, team, or car. These things are easy for a bad guy to guess with just a little research &#8211; or simply by reading what you share on FaceBook or other social media.</span></p>
<p><span style="font-weight: 400;">There are certainly ways to choose a better password, like at the end of </span><a href="https://burgessforensics.com/cybersecurity-covid-19-vulnerability-and-what-to-do-about-it/" target="_blank" rel="noopener"><span style="font-weight: 400;">this</span></a><span style="font-weight: 400;"> article by yours truly, which gives many suggestions for better password-choosing.</span></p>
<p><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15174 alignright" src="https://burgessforensics.com/wp-content/uploads/2025/07/PAiin-in-the-tuchus-copy-300x300.jpg" alt="" width="160" height="160" /></p>
<p><span style="font-weight: 400;">So, even though it may be a pain in the tuchus, it’s a good idea to have to take that second 2FA step before logging into an online store that has your payment info in their servers &#8211; you know, to make it easier to buy, but which also makes it easier for someone you’ve never heard of to buy thousands of dollars worth of stuff for themselves on your dime. Or take all of the dimes in your bank or investment account.<a href="https://burgessforensics.com/wp-content/uploads/2025/07/Dimes-copy.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15175 alignleft" src="https://burgessforensics.com/wp-content/uploads/2025/07/Dimes-copy-300x300.jpg" alt="" width="156" height="156" /></a></span></p>
<p><span style="font-weight: 400;">But, increasingly, the bad guys are figuring out ways around 2FA &#8211; 2FA Fraud.</span></p>
<p><b>What in the world is 2FA fraud? I thought that two-factor authentication was supposed to protect me.</b></p>
<p><span style="font-weight: 400;">Where there’s a will, there’s a way. As I’ve often said before, human nature doesn’t change but the tools do. There’s always that small fraction of people who are out to get other people’s stuff one way or the other. It used to be that Ugg had to sneak up in the night to grab that yummy haunch of  aged woolly mammoth meat that you had stored in your cave. But as tech advances,  the schemes to rip you off do so as well.</span></p>
<p><b>2FA Fraud</b></p>
<p><span style="font-weight: 400;">At the current time, the two primary means of 2FA fraud involve SIM swapping and Port-out fraud.</span></p>
<p><b>SIM Swapping</b></p>
<p><span style="font-weight: 400;">This usually starts with the perpetrator collecting personal information about you. This can be by scraping social media for information you have freely shared, like your favorite stuff or experiences you have had &#8211; you probably see these fun little quizzes on FaceBook and other social media all the time.</span></p>
<p><span style="font-weight: 400;">Another way is by phishing emails or texts, where they impersonate some person, organization, or company you know in order to get you to give up your personal information, including passwords. These are easy to fall for because they can look quite authentic.</span></p>
<p><span style="font-weight: 400;">SIM swapping is named after SIM cards but does not involve actually taking a SIM card out of your phone or other device. It’s when the fraudster manages to transfer your phone number to their own device by convincing the victim’s cell phone provider that they are the account holder. </span></p>
<p><span style="font-weight: 400;">Then they get the phone provider to activate a new SIM card (physical, or an e-SIM) with your number. Then their phone appears to be yours. This is what they use the personal information about you for &#8211; to convince someone or some algorithm that they are you!</span></p>
<p><span style="font-weight: 400;">Once they have control of your phone number, it’s a lot easier to take over your other accounts. Now, when a 2FA message or call is sent to your number, it goes to them and not to you. This allows them to dive into other accounts of yours and notably, locks you out.</span></p>
<p><span style="font-weight: 400;">The next step may be that the scammer starts changing your personal information while diving into and controlling other accounts of yours.</span></p>
<p><b>Port-Out Fraud</b></p>
<p><span style="font-weight: 400;">This is similar but involves the scammer contacting a different phone service provider than the one you have and requests that they bring your number over from your current provider., whereby the same takeovers of your information and identity can take place.</span></p>
<p><span style="font-weight: 400;">One sign that you’ve fallen victim to one of these scams is that you may not be able to make or receive calls or texts on your own device. If you are able to receive them, you may start getting messages thanking you for your purchases &#8211; purchases you did not make. You may call your phone provider or your bank only to discover that your personal info has been changed and you don’t have the info in their database to prove it’s really you.</span></p>
<p><b>What are some ways to protect yourself?</b></p>
<p><span style="font-weight: 400;">Don’t give personal information away. For instance, don’t share your social security number. In general, the only organizations with the right to that are the government, your employer, and financial institutions that lend you money. </span></p>
<p><span style="font-weight: 400;">And don’t overshare personally identifiable information online &#8211; especially your favorite things, because those are gateways to faking your identity to banks and other institutions.</span></p>
<p><span style="font-weight: 400;">Sign up for 2FA whenever possible and never share your 2FA codes with anyone, whether sent via text or phone, even if that person claims to be a trusted employee of the company sending you such a code.</span></p>
<p><span style="font-weight: 400;">When possible, use authenticator apps instead of getting an SMS text for authentication purposes.  Both Google and Microsoft offer an Authenticator. PC Magazine offers </span><a href="https://www.pcmag.com/picks/the-best-authenticator-apps" target="_blank" rel="noopener"><span style="font-weight: 400;">its take</span></a><span style="font-weight: 400;"> on the best ones for 2025.</span></p>
<p><span style="font-weight: 400;">Use passkeys when that option is available. Passkeys can use biometrics, such as your fingerprint or a facial scan, to log in to your account. Right now, iPhones come with that as standard issue.</span></p>
<p><span style="font-weight: 400;">Don&#8217;t Respond if someone calls or texts you and asks for personal information, do not provide it. If the caller claims to be from a business you are familiar with, hang up and call that business using a number you trust, such as the number on your bill, in a phone book, or on the company&#8217;s website<a href="https://burgessforensics.com/wp-content/uploads/2024/08/AI-email-fraud.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15102 alignright" src="https://burgessforensics.com/wp-content/uploads/2024/08/AI-email-fraud-300x282.jpg" alt="" width="183" height="172" /></a></span></p>
<p><span style="font-weight: 400;">Don’t respond #2: If you get a text or call from someone you don’t recognize, or a friend request on social media from someone you don’t recognize &#8211; don’t answer and don’t text back. Scammers send out thousands or even millions of texts and bogus phone calls. Hoping that the unsuspecting will pick up or answer. Then they know they’ve got a live number. If you don’t respond, they don’t know you’re there.</span></p>
<p><span style="font-weight: 400;">Monitor account activity regularly so you can quickly identify any suspicious behavior.</span></p>
<p><b>What to Do If It’s already happened</b></p>
<p><span style="font-weight: 400;">Time is of the essence.</span></p>
<p><span style="font-weight: 400;">Try to change your passwords immediately.</span></p>
<p><span style="font-weight: 400;">Remove compromised devices &#8211; like your phone &#8211; from your accounts. It may be time to get a new one. </span></p>
<p><span style="font-weight: 400;">In extreme cases, change your phone provider altogether, as well as your Internet Service Provider</span></p>
<p><span style="font-weight: 400;">It’s especially important to contact your banking and financial institutions to report suspicious activity. Remember &#8211; banks have branches where you can walk in and prove your identity with drivers licenses and the like..</span></p>
<p><span style="font-weight: 400;">If you think someone is using your personal information, go to </span><a href="https://www.identitytheft.gov/#/" target="_blank" rel="noopener"><span style="font-weight: 400;">IdentityTheft.gov</span></a><span style="font-weight: 400;"> to report it and get a personalized recovery plan.</span></p>
<p><span style="font-weight: 400;">While Two-Factor Authentication can make you safer, there are ways that some scammers can work around it. Being aware of the activity in your accounts, and not falling prey to phishing and oversharing of personal information can help.</span></p>
<p><span style="font-weight: 400;"><a href="https://burgessforensics.com/wp-content/uploads/2025/07/dreamstime_m_141016076.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15176 alignleft" src="https://burgessforensics.com/wp-content/uploads/2025/07/dreamstime_m_141016076-300x200.jpg" alt="" width="206" height="137" /></a>Look, most people are honest and caring. But others are unscrupulous or hungry. And most of the bad guys are looking for the low-hanging fruit. There’s plenty of it around. Be hard to pick. A bit of awareness and and proactive safety precautions can make you one that they’ll pass right by.</span></p>
<p>&nbsp;</p>
<p>The post <a href="https://burgessforensics.com/two-factor-authentication-fraud/">Two Factor Authentication Fraud</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://burgessforensics.com/two-factor-authentication-fraud/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI and Elder Abuse</title>
		<link>https://burgessforensics.com/ai-and-elder-abuse/</link>
					<comments>https://burgessforensics.com/ai-and-elder-abuse/#respond</comments>
		
		<dc:creator><![CDATA[Steve Burgess]]></dc:creator>
		<pubDate>Wed, 23 Jul 2025 19:13:00 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Cyberbullying]]></category>
		<category><![CDATA[Elder Abuse]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://burgessforensics.com/?p=15165</guid>

					<description><![CDATA[<p>AI and Elder Abuse, copyright 20025, Steve Burgess The news is full of AI (Artificial Intelligence) stories. How will it empower us in our jobs? Whose job will it take next? Is it creating actual fake news?  While there’s a lot of “we’ll see” in the answers to these questions, one immediate and quite pressing [&#8230;]</p>
<p>The post <a href="https://burgessforensics.com/ai-and-elder-abuse/">AI and Elder Abuse</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">AI and Elder Abuse, copyright 20025, Steve Burgess</span></p>
<p><span style="font-weight: 400;">The news is full of AI (Artificial Intelligence) stories. How will it empower us in our jobs? Whose job will it take next? Is it creating actual fake news? </span></p>
<p><span style="font-weight: 400;">While there’s a lot of “we’ll see” in the answers to these questions, one immediate and quite pressing issue is how AI is contributing to </span><a href="https://en.wikipedia.org/wiki/Elder_abuse" target="_blank" rel="noopener"><span style="font-weight: 400;">Elder Abuse</span></a><span style="font-weight: 400;">. Elder abuse is an action(s) in any relationship where there is an expectation of trust that causes harm or distress to an older person.</span></p>
<p><span style="font-weight: 400;"><a href="https://burgessforensics.com/wp-content/uploads/2025/07/Elders-laptop-copy.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15168 alignright" src="https://burgessforensics.com/wp-content/uploads/2025/07/Elders-laptop-copy-300x300.jpg" alt="" width="198" height="198" /></a>American elders were conned out of more than three $3 billion dollars in 2023 in a range of financial crimes, according to the FBI </span><a href="https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams/elder-fraud" target="_blank" rel="noopener"><span style="font-weight: 400;">data</span></a><span style="font-weight: 400;">. AI can make these scammers seem more believable partially because these programs help with content creation and cleaning up human error that might otherwise warn us we’re being served up something fraudulent.</span></p>
<p><span style="font-weight: 400;">Already, there are so many scams via email, websites, phone calls, advertisements, and offers of romance that there’s plenty to worry about. But does the emergence of AI in everyday life and writing supercharge these efforts to relieve the older amongst us of their carefully husbanded and/or limited resources?</span></p>
<p><span style="font-weight: 400;">Already, individuals are reaching through our computers and phones to lighten our wallets and bank accounts. There are websites that look like our bank sites, </span><a href="https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams" target="_blank" rel="noopener"><span style="font-weight: 400;">phishing</span></a><span style="font-weight: 400;"> emails that look like they’re from someone or from an institution that we know and trust, ads galore that tempt the reader with promised services, goods, or fortunes.<a href="https://burgessforensics.com/wp-content/uploads/2025/07/COMputer-thief-hand-copy.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15167 alignleft" src="https://burgessforensics.com/wp-content/uploads/2025/07/COMputer-thief-hand-copy-300x300.jpg" alt="" width="172" height="172" /></a></span></p>
<p><span style="font-weight: 400;">Already, we give away so much of our privacy in return for the freedom to browse the web and to use other online services. We also regularly share our private information, favorite colors, cars, dates and faces on publicly available social media. But now, there are tools in the guise of fun apps that offer to clean up our photos, or ones to let us have our own voices sing our favorite songs perfectly, our own tin ears notwithstanding.</span></p>
<p><span style="font-weight: 400;">I see ads every day inviting me to seamlessly insert my voice instead of the original voice &#8211; say Sting’s or Sinatra’s, into a popular song. Like karaoke on steroids that we can save and play for or send to others. It’s likely to be fun, but then your voice is being stored in records<a href="https://burgessforensics.com/wp-content/uploads/2025/07/Sting-and-old-lady-copy.jpg"><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15166 alignright" src="https://burgessforensics.com/wp-content/uploads/2025/07/Sting-and-old-lady-copy-300x300.jpg" alt="" width="210" height="210" /></a> you have no control over. Thousands of people’s voices are thereby being harvested and stored by some company you don’t know, that has a privacy policy that most of us never read through, and which can be used by these unknown persons in any which way. </span></p>
<p><span style="font-weight: 400;">Even if the company offering these services is completely on the up and up, they are a prime target to be hacked by those who would love to use these stored audio clips to clone your voice into realistic but invented audio sent to you via email, or even a phone call.</span></p>
<p><span style="font-weight: 400;">So what happens when you hear from a beloved grandchild &#8211; in their own voices &#8211; that they are suffering, or need help out of a jam? And what if you, as a parent, grandparent, or even just a friend, hears from another trusted friend or loved one that they have “such a deal?”</span></p>
<p><span style="font-weight: 400;">Why, for the cost of nothing at all, you can use chat GPT right now to create a picture of you standing next to the President or your favorite rock star. Some generative AI tools can even create  a video of the two of you singing 70’s rock anthems together.</span></p>
<p><span style="font-weight: 400;">But nearly as easily, a bad actor could create a picture or audio of your child or friend, needing bail, stuck without airfare far away, injured, in a foreign prison cell, or in the hands of dangerous thugs, begging for your help. </span></p>
<p><span style="font-weight: 400;">As technology advances in leaps and bounds, human nature stays much the same. There’s always somebody out to take advantage of the system ,and of you, while we remain always sympathetic to those we care about. The game hasn’t changed &#8211; just the tools of the game, and the ease with which the unscrupulous can run their scams on a wider swath of folks. And the tools are ever more easily and cheaply accessible. </span></p>
<p><span style="font-weight: 400;">So, what to do?</span></p>
<p><span style="font-weight: 400;">There are simple steps to make it harder for unscrupulous folks to take advantage. First of all, educate yourself and your elder relations and loved ones about the risks. There’s no need to get paranoid about it &#8211; just to take some practical steps.</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">DO enable two-factor authentication (2FA) , one of the most important, but simple security practices. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">DON’T share passwords. (There are a few </span><a href="https://www.allertonhousehingham.com/blog/managing-passwords-with-elderly-family-members/" target="_blank" rel="noopener"><span style="font-weight: 400;">exceptions</span></a><span style="font-weight: 400;"> for the elderly or ill.)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">DON’T use dictionary words or favorite colors, cars, kids, or teams as your passwords.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">If passwords are hard to remember, DO use </span><a href="https://www.pcmag.com/picks/the-best-password-managers" target="_blank" rel="noopener"><span style="font-weight: 400;">password manager</span></a><span style="font-weight: 400;">s, such as NordPass, Dashlane, 1Password, or Last Pass.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">DON’T give away your voice to be recorded by those you don&#8217;t know, no matter how much fun it looks like.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">DON’T click on links in emails or texts, especially from financial institutions. Rather, use your browser and type in the website of the institution. Most offer apps for direct access that are generally safe.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">DO look for odd misspellings or extra words in email addresses and domains. Website domains don’t have typos. For instance Welsfargo.com is not Wellsfargo.com (it’s missing an “l.”). Applepayments.com is not Apple.com/payments.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">DON’T open attachments to emails or texts if you’re not sure or don’t know who the sender is.</span></li>
</ul>
<p><img wpfc-lazyload-disable="true" loading="lazy" decoding="async" class="wp-image-15169 alignleft" src="https://burgessforensics.com/wp-content/uploads/2025/07/grankid-laptop-copy-300x300.jpg" alt="" width="184" height="184" /></p>
<p><span style="font-weight: 400;">Modern tech and the Internet make so many things available for us and in many cases, easier for us. While there are always bad actors, and while AI tool</span><span style="font-weight: 400;">s make it easier for those bad actors to fool us, some sensible practices make it more difficult for those bad actors to fleece us of our hard-earned resources</span></p>
<p><span style="font-weight: 400;">Checking up on our elders and educating them about some of these simple steps can make them and you safer, help you both sleep at night, and even bring you a little bit closer, and after all, what could be better than that?</span></p>
<p>The post <a href="https://burgessforensics.com/ai-and-elder-abuse/">AI and Elder Abuse</a> appeared first on <a href="https://burgessforensics.com">Burgess Forensics</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://burgessforensics.com/ai-and-elder-abuse/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
