Skip to main content

Encryption, Encoding, Inaccessible Data and Devices

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

Hash, encryption, full disk, file based, and the list goes on! Words are used correctly and incorrectly when examiners discuss or even report on evidence. This webinar is intended to lay the framework for a factual understanding of how encryption and hashing are used in our digital investigations. Real world applications of hashing, and encryption will be shown, with an emphasis on how they impact investigations in 2020. Questions such as "Does the application encrypt data?", "How is it encrypted?", and "Why can't I decrypt it?" will be discussed.

Cost Information
Amount
0.00
Event Date
-