The case of the Craiglist Killer has lived on through digital forensics. The Boston Police released their case files in the Craigslist Killer case to the Boston Phoenix which then published a remarkable story about the investigation in April of 2012. Digital Detectives co-hosts, Sharon D. Nelson, Esq., President of Sensei Enterprises, Inc., and John...
![]() |
Sharon D. Nelson, Esq. is president of the digital forensics, managed information technology and cybersecurity firm Sensei Enterprises. Ms....
John W. Simek is vice president of the digital forensics, managed information technology and cybersecurity firm Sensei Enterprises. He...
The case of the Craiglist Killer has lived on through digital forensics. The Boston Police released their case files in the Craigslist Killer case to the Boston Phoenix which then published a remarkable story about the investigation in April of 2012. Digital Detectives co-hosts, Sharon D. Nelson, Esq., President of Sensei Enterprises, Inc., and John W. Simek, Vice President of Sensei Enterprises, explore the intricacies of this captivating case including: evidence from surveillance cameras and privacy implications, getting social media evidence and poaching wireless networks.
Notify me when there’s a new episode!
Published: | June 12, 2012 |
Podcast: | Digital Detectives |
![]() |
Digital Detectives |
Sharon D. Nelson and John W. Simek invite experts to discuss computer forensics as well as information security issues.
Clio COO George Psiharis talks through this year’s trends and the sweeping transformative effect COVID-19 has had on the legal profession.
Attorney and cybersecurity expert Ted Kobus addresses the rapid increase in ransomware incidents in 2020 and explains what law firms should do in the...
Doug Austin and Brett Burney give best practice tips for audio and video discovery.
Judy Selby gives a comprehensive overview of the many uses and risks associated with biometric information.
Cybersecurity expert Mike Maschke explains how penetration tests help lawyers protect themselves by identifying weak points in their security systems.
Maura Grossman discusses how TAR is used by medical researchers to support their efforts to understand and treat COVID-19.