Evidence Solutions is a leading expert witness firm.
Virtual or in-person, we are dedicated to providing unparalleled expertise and professional guidance in legal matters.
We are knowledgeable, experienced and ready to serve you.

Meet our Team
Our Experts

James Bass
Digital Forensics

Robert Bennett
Accident Reconstruction

Daniel Brown
Law Enforcement

Craig Cherney
Real Estate

Scott Greene
Digital Evidence

Nancy Grugle, Ph.D., CHFP
Human Factors

George Jenson
Greek Fraternity

James E. Lewis
Transportation Safety

Robert Marcello, Ph.D., LCP, CCHP
Clinical Psychology

Jeff Martin
Digital Forensics

Benjamin A. Morrow, PE
Construction

Brian Riker
Transportation Safety

John Ross
Commercial Trucking

Jeff Scurran
Sports & Fitness Safety

Todd M. Seger
Aviation

Thomas Shea, D.SC., CPP
Law Enforcement

Sherry Young
Occupational Therapy
Latest Articles
When Training Protocols Fail: A Cautionary Tale in Trucking Safety Oversight
When Training Protocols Fail: A Cautionary Tale in Trucking Safety Oversight
Insights from a recent case highlight the critical importance of adhering to industry standards in driver monitoring and fleet safety.
A recent case in Denver involving a major national trucking company underscores how even well-established carriers with strong safety reputations can face significant legal exposure when internal oversight falters.
The incident involved a regional fleet driver with a 12-year tenure who had accumulated over 440 hard braking events and multiple near-miss incidents during his time with the company. While some of these events had been the subject of counseling, the majority were dismissed without appropriate follow-up or escalation, a significant deviation from both company policy and broader industry standards.
The crash at the heart of the case occurred during inclement weather on I-25, where a passenger vehicle stalled in the right-hand lane. Several truck drivers successfully avoided the immobilized car, but the defendant driver, who had a documented history of inattentiveness, did not. He collided with the stalled vehicle and sent it careening down the highway, causing serious injuries to its occupant.
Our expert, James Lewis, was retained in this case by the plaintiff after previously defending this same carrier in three separate lawsuits. He thoroughly analyzed hundreds of pages of GPS logs, telematics data, and driver behavior records. His conclusion was unequivocal:
"Hard braking events in a commercial vehicle are only acceptable in an actual crash or evasive maneuver. A consistent pattern of such events signals aggressive or inattentive driving."
In contrast, a defense expert attempted to minimize the significance of these hard braking events, an assertion that ran counter to established industry norms, Department of Transportation (DOT) training guidelines, and the company's internal policies.
This case offers several key takeaways for those involved in trucking litigation or fleet safety management:
1. Hard Braking is a Red Flag
Hard braking should not be normalized or dismissed. It's a reliable indicator of inattentive, aggressive, or otherwise unsafe driving behavior. A persistent pattern demands corrective action and documentation.
2. Training and Policy Enforcement Matter
Written safety policies and driver training protocols are only as effective as their enforcement. Failure to address repeated violations can expose companies to liability and diminish credibility in court.
3. Objective Expert Testimony is Critical
In high-stakes litigation, the credibility of expert witnesses is paramount. Testimony must be aligned with industry standards and verifiable evidence.
This case ultimately resolved in favor of the plaintiff, due in no small part to the overwhelming weight of objective evidence and a thorough, fact-based expert analysis. It stands as a powerful reminder: when safety oversight slips, the legal and human costs can be substantial.
Geo-Location Services & The Long Island Serial Killer: Benefits and Privacy Concerns
Geo-Location Services & The Long Island Serial Killer: Benefits and Privacy Concerns
The Netflix docuseries "Gone Girls: The Long Island Serial Killer", which focuses on the investigation, arrest, and charges brought against Rex Heuermann, has again brought to light the critical role digital data plays in criminal investigations. As detailed in Part 1 and Part 2 of ESI's "Catching the Long Island Serial Killer: The Crucial Role of Digital Data" series, investigators used a variety of digital forensics techniques such as GPS data, cell phone records, and online activity tracking to track Heuermann's movements and link him to the victims. The case underscores how modern technology, including social media and digital footprints, has become instrumental in solving complex crimes, and how even old technology can remain relevant in linking evidence to unsolved crimes. The case also highlights how digital forensics experts can be instrumental in supporting efforts to catch culprits trying to hide their tracks through forensic analysis of digital, cellphone, and other records.
This case also serves as a reminder of the potential preventive role geo-location technology can play. Real-time location sharing with trusted friends, family, or emergency services can offer a critical safety net in dangerous situations, providing faster responses when every second counts.
The Benefits of Geo-Location Services: Enhancing Safety, Efficiency, and Convenience
In today's fast-paced, connected world, geo-location services have become integral to many aspects of daily life. These services use GPS, Wi-Fi, and other technologies to determine your exact location and offer a range of benefits, from improving safety to increasing efficiency.
Personal Safety and Security
Geo-location services can significantly enhance personal safety. For example, real-time location-sharing with trusted family members or friends can provide a safety net in emergency situations. In cases of travel, outdoor activities, or even personal distress, knowing that someone is aware of your whereabouts can provide peace of mind and enable quicker responses if something goes wrong. Additionally, many apps allow users to send alerts or share their location with a tap, making it easier to get help in emergencies.
Navigation and Convenience
One of the most common uses of geo-location services is for navigation. GPS-enabled apps like Google Maps and Waze provide real-time traffic updates, routing alternatives, and step-by-step directions, helping users reach their destinations faster and more efficiently. These services also offer features like finding nearby restaurants, gas stations, or stores, making daily tasks more convenient.
Enhanced Customer Experiences for Businesses
For businesses, geo-location services offer the ability to create personalized and location-specific experiences for customers. Retailers, for instance, can send promotions or discounts to customers' smartphones when they are near a store, boosting foot traffic. Additionally, services like food delivery or ridesharing rely on geo-location to optimize routes, reduce wait times, and improve customer satisfaction.
Emergency Response
In critical situations, geo-location services are vital for ensuring a faster emergency response. When users share their location with emergency services or through specialized apps, responders can pinpoint the exact location, reducing response times and increasing the chances of a favorable outcome.
Improved Productivity and Efficiency
For businesses with delivery or field teams, geo-location can optimize routes, monitor performance, and track assets. Companies can ensure better time management, reduce costs, and improve overall operational efficiency by understanding exactly where employees are and how long tasks take.
Privacy Concerns
As geo-location services become increasingly integrated into our daily lives, they raise serious privacy concerns. While these technologies offer undeniable convenience and safety benefits, they simultaneously collect, store, and sometimes share sensitive location data, often without users' full awareness or consent. This widespread tracking capability exposes individuals to risks such as unauthorized surveillance, data breaches, and potential misuse by third parties. As reliance on geo-location grows, it is critical to carefully weigh its advantages against the evolving challenges to personal privacy and data security.
1. Tracking and Surveillance Risks
Concern: Constant tracking through geo-location services may lead to concerns about surveillance by third parties, including governments, corporations, or malicious actors.
Example: Unauthorized tracking or data breaches could expose sensitive location history, revealing patterns of behavior or personal routines.
2. Data Breaches and Security Risks
Concern: Storing geo-location data can make it vulnerable to hacking, leading to potential data breaches and unauthorized access.
Example: If a location-sharing app is hacked, hackers may gain access to your precise movements, posing a threat to your privacy and security.
3. Exposing Personal Patterns
Concern: Sharing location data over time can expose personal habits and routines, such as daily commutes or frequent locations, which could be used for exploitation.
Example: Hackers or malicious entities may analyze location data to identify when you are most vulnerable, increasing the risk of theft or harm.
4. Invasive Advertising
Concern: Geo-location can be used by marketers to track your movements for targeted advertising, often without your explicit consent or full understanding.
Example: Retailers may send promotional messages or discounts based on your current location, which can feel intrusive or unwanted.
5. Loss of Anonymity
Concern: Continuous geo-location sharing erodes a person's ability to maintain anonymity in public spaces.
Example: When visiting public places, your exact whereabouts may be known by businesses, apps, or even individuals in your network, limiting your privacy in everyday situations.
6. Accidental Data Exposure
Concern: In some cases, geo-location data may be inadvertently shared due to app settings, errors, or careless sharing of location data.
Example: An app may automatically share your location with a large audience if privacy settings are not properly configured.
Balancing Benefits and Privacy
While geo-location services provide undeniable benefits in terms of safety, convenience, and personalized services, they also raise significant privacy concerns. It is essential to weigh these pros and cons, using privacy settings to control who can access your location and when. With increased awareness and better security measures, users can enjoy the advantages of geo-location services without compromising their privacy.
What are some of the steps you can take to enjoy geo-location services without compromising privacy?
1. Limit App Permissions
Only grant location access to apps that truly need it and prefer "While Using the App" permissions over continuous tracking.
2. Use Privacy Settings Wisely
Regularly review and adjust device and app privacy settings to control who can access your location data.
3. Turn Off Location Sharing When Not Needed
Disable geo-location services when not actively using them to reduce unnecessary data collection.
4. Be Selective with Public Check-Ins
Avoid broadcasting your real-time location on social media platforms unless absolutely necessary.
5. Use a VPN
Employ a reputable Virtual Private Network (VPN) to obscure your IP-based location data when browsing or using apps.
6. Update Software and Apps Regularly
Keep devices and applications updated to benefit from the latest security patches protecting location data.
7. Read Privacy Policies
Understand how an app or service collects, uses, and shares location data before agreeing to its terms.
8. Opt Out of Location-Based Ad Tracking
Adjust ad personalization settings on your devices and browsers to minimize location-based advertising tracking.
Navigating the Power and Pitfalls of Geo-Location Technology
The case of the Long Island Serial Killer, brought back into the public eye by Netflix's Gone Girls docuseries, serves as a sobering example of how digital data can be both a powerful investigative tool and a potential life-saving resource. As illustrated in this high-profile case, digital forensics techniques like cell phone tracking, GPS data analysis, and online activity monitoring were critical in identifying and apprehending a suspect after years of unanswered questions.
Beyond criminal investigations, this case reminds us that geo-location technologies, when used thoughtfully, can enhance personal safety and situational awareness. Tools that enable real-time location sharing with trusted contacts have the potential to protect individuals, particularly in high-risk or unpredictable situations, offering help when it is most urgently needed.
At the same time, the widespread use of location-based services requires a careful balancing act. The privacy concerns that accompany geo-location data, from unauthorized surveillance to accidental exposure, are real and growing. Individuals and organizations alike must stay informed and proactive in managing their digital footprint.
Ultimately, geo-location technology is neither inherently good nor bad, it is a tool. How we choose to use, control, and secure it will determine whether it becomes a source of empowerment and safety or a vulnerability. By staying vigilant, setting smart boundaries, and embracing best practices, we can maximize the benefits of this technology while minimizing its risks.
The Intimate Window: When to Minimize in Data Collection Measures
The Intimate Window: When to Minimize in Data Collection Measures
In the evolving intersection of technology and the law, recent court decisions are increasingly signaling a strong preference toward data minimization—collecting only the information absolutely necessary to meet evidentiary needs. For attorneys engaged in litigation involving electronic discovery (aka electronically stored information, or “ESI”), this trend carries significant implications. Courts are placing growing emphasis on balancing the need for relevant evidence with the right to privacy, and as digital forensics experts, we’ve seen firsthand how crucial it is to navigate this balance effectively.
A Pivotal Case: Carpenter v. United States
The U.S. Supreme Court’s decision in Carpenter v. United States, 585 U.S. 296 (2018) is a cornerstone in this evolving landscape. The case centered on historical cell site location information (often referred to as “CSLI”)—records that track a cell phone’s location over time. In the majority opinion’s ruling, Chief Justice Roberts underscored the intrusive nature of such data, stating:
Although such records are generated for commercial purposes, that distinction does not negate Carpenter’s anticipation of privacy in his physical location. Mapping a cell phone’s location over the course of 127 days provides an all-encompassing record of the holder’s whereabouts. As with GPS information, the time-stamped data provides an intimate window into a person’s life, revealing not only his particular movements, but through them his “familial, political, professional, religious, and sexual associations.” Id., at 415 (opinion of Sotomayor, J.).
This case is a reminder that digital data, often generated for commercial purposes, can open “an intimate window” into a person’s life.
The Growing Judicial Call for Data Minimization
As technology continues to embed itself deeper into daily life, courts are increasingly mindful of the potential for overreach in digital investigations. Key concerns driving judicial caution include:
- Medical information
- Family, friends, and social associations
- Location and movement tracking
- Unrelated Personal and Financial Data
In a nutshell, judges are asking a crucial question: How much is too much?
Balancing Privacy and Evidentiary Necessity in RFPs
When evaluating Requests for Production (or “RFPs”) involving digital evidence, courts are seeking specificity and proportionality. Broad or vague requests—phrases like “all messages” or “all communications”—are red flags. Instead, a successful RFP should:
- Clearly define the type of data sought.
- Identify a narrow and relevant timeframe.
- Limit the request to particular individuals or subjects.
- Explain why the data is necessary and how it supports the case.
Employing minimization strategies when responding to requests for production of documents or data can be essential to protect privacy, reduce irrelevant data volume, and streamline review—especially when handling personal devices like cell phones or laptops. By focusing on relevant timeframes, keywords, or communication types, parties can limit exposure to sensitive or non-pertinent information. Over-reliance on minimization, however, can also inadvertently exclude critical context or omit key data that supports timelines, intent, or patterns of behavior. These gaps can weaken the evidentiary foundation or lead to disputes over spoliation and incomplete production, making it crucial to balance efficiency with thoroughness in discovery planning.
Minimization: Before or After Acquisition?
Minimization strategies generally fall into two categories: before acquisition or after. Each has advantages and pitfalls, as outlined below:
Minimization Before Acquisition
Pros:
- Easily incorporated into the initial RFP.
- Demonstrates good faith efforts to respect privacy.
Cons:
- Risk of missing contextual or supporting data.
- Incomplete datasets may weaken evidentiary value.
- Technical limitations in filtering certain types of data in advance.
Minimization After Acquisition
Pros:
- Full dataset allows for comprehensive analysis.
- Minimization can be precisely tailored to court-approved scope.
- Supports more accurate and contextual interpretation of findings.
Cons:
- Slightly more time-consuming.
- Requires expert understanding of limitations and scope boundaries.
Bottom line: Whenever feasible, apply minimization after acquisition. This approach ensures a more robust, relevant, and defensible evidentiary set.
Practical Examples of Minimization Challenges
- SMS/MMS Messages: Easily limited by date pre-acquisition. However, crucial metadata (stored in separate databases) may be lost if not captured in full.
- Location Information: Users often think only of photo EXIF data. But evidence can also live in health apps, Wi-Fi connections, or navigation tools—sources often overlooked in requests.
- User Activity: Activity logs extend beyond just messages or documents. They include screen unlock events, app usage, and background processes—all of which can provide vital context.
Expert Involvement Is Crucial
Digital forensics is not a plug-and-play discipline. Crafting an effective and legally sound data collection strategy demands early consultation with a qualified expert. Failing to involve a forensics professional at the outset risks missing critical data—or, worse, collecting too much and exposing sensitive, irrelevant information.
Minimization is not about limiting discovery—it’s about targeting it. In a legal environment where data is both plentiful and personal, the role of digital forensics is to illuminate only what’s necessary—no more, no less.
Email Scams: Yes, they are Unfortunately Still a Thing
Email Scams: Yes, they are Unfortunately Still a Thing
The accounting department at Evidence Solutions recently received an email containing forwarded correspondence purporting to be between the company's owner, Scott Greene, and an executive club named Arvey Valderrama LLC VIP Club. The correspondence showed Scott requesting that the overdue invoice be forwarded to our finance department for payment— a whopping $58,999.99 bill. She correctly realized that this was a fraudulent attempt, as there were numerous signs that something was amiss.
Warning Signs You Shouldn’t Ignore
Email Formats
The oldest email featured in the fake forward is a general welcome email to Scott, explaining the inclusions of his new exclusive membership. This does not contain any requests for money, but it does have an important initial clue that it is fake: Scott's email is formatted incorrectly as: firstname.lastname@, which is not the standard email format we use.
The sending email address is also structured oddly, with a domain name @arveyvalderramainvoice.com, whereas later emails use the domain @arveyvalder.com.
Payment Requests
The second oldest email in the fraudulent forward is where the expenses are spelled out.
It includes:
- Membership Tiers and Pricing:
- Membership Renewal & Leadership Development and Business Skills: $25,000.00 for 6 Months Duration
- Communication and Public Speaking Skills & Corporate Governance and Ethical Leadership: $14,999.00 for 3 Months Duration
- Strategic Planning and Innovation Workshops & Change Management and Organizational Development: $19,000.00 for 3 Months Duration
- Total Amount Due: $58,999.99
An unexpected $59K bill is sure to raise questions at almost any company. An additional eyebrow-raising detail is the requested payment method: they only provide payment instructions for ACH/Wire Deposit. Wire transfers are practically irreversible, making them the preferred payment method requested in these fraudulent scenarios.
How to Submit Your Payment:
- Review the Attached Invoice: Please open and review the attached invoice.
- ACH/Wire Deposit Instructions: Detailed payment instructions can be found in the "ACH/Wire Deposit Instructions" section of the document.
- Follow the Instructions: Use the provided information to submit your payment accurately to the authorized beneficiary/trainer.
It is advisable to have strict limitations on who can wire money from your company. Evidence Solutions has only one approved person that can initiate such a transfer. This can be an important safeguard against your company getting scammed.
Urgency Bias
Another red flag we spotted which is typical of most scam emails is the urgent language used, implying that it is absolutely critical to pay RIGHT NOW. This type of language is used to manipulate recipients into making quick decisions without verifying the sender or other key information.
"It is crucial to address this promptly to ensure uninterrupted access to your advisory services and member benefits."
Unlikely Responses
Next up in this email “thread” is the alleged response from Scott to the previous two emails. Once again, his email address is structured incorrectly. He also specifies that the invoice be forwarded to an address that we do not use for that purpose.
Furthermore, and this is an often-neglected aspect of cybersecurity, Scott would never write this email. It is not his style. When you have worked alongside someone for any length of time, you get a sense of their writing approach and habits. This is why training employees to trust their gut when something seems off is so important. Before ChatGPT and similar products, scam emails were easier to recognize due to noticeable spelling and grammatical errors, as well as awkward phrasing that made it obvious the sender was not a native speaker. Today, these mistakes are far fewer, making it essential to look for subtle signs that an email may be fraudulent.
The next two emails show them forwarding Scott's “response” to our accounting department, once again using urgent language to create a sense of pressure.
There will always be new email-based scams, and scammers are only growing sneakier and more adept at bypassing security measures. That’s why comprehensive cybersecurity training is essential. Implementing verification processes for payment requests, especially for wire transfers or gift cards, can help prevent fraud. While there are great phishing detection tools on the market that filter out malicious emails, some will inevitably slip through. Therefore, educating your employees remains the strongest defense against financial and data security threats.
Testimonials
What Our Clients Say

I am greatly appreciative of ESI’s professionalism and work product. I am satisfied that we acquitted ourselves in providing our client the zealous and competent representation that he deserved, and in no small part, Evidence Solutions, Inc. and Scot...

Just a note to express my deep appreciation for the superb work and high level of professionalism which you brought to our case.

I want to personally thank you for taking the time out of your busy schedule again to speak at our conference in Atlanta, GA. Your topic and presentation was timely, interesting, and of great value to the lawyers who attended. I deeply appreciate you...

I used Evidence Solutions to comply with a discovery request, and I couldn't have been more pleased with their service. Evidence Solutions gave me everything I asked for in an easy-to-retrieve format and in a timely manner. Thank you, Evidence Soluti...

We retained Jeff Martin for a complex computer fraud case, and he provided invaluable assistance. Jeff educated us on the technical issues, explained unfamiliar concepts in a clear and understandable way, and guided us on the investigative steps to t...

I really appreciate your help in this case. I appreciate your ability to discuss technical topics in plain English.

This case would not have had near that value received without your diligent and professional work. Your preparation and opinion set forth in your deposition were the key to liability and would have been overwhelming in our claim for punitive damages....

Thank you again for speaking to our class. You have a natural way of explaining complex technical issues to people like me who don’t understand technology well, which is probably why you are so good at your job. And it’s funny because the talk always...

I must tell you the settlement of this case is due to in significant part, to your outstanding contributions as an expert in aid of this trial. Thank you for your willingness to work with out office on this matter. I look forward to having an opportu...

Good news! The case settled. It was a pleasure to work with you and we thank you for your hard work and dedication.

Jim is very good at what he does and he provided our team with tremendous insight into the world of trucking and truck brokering. Thank you again and I look forward to working with D&A consultants again soon.

Your investigation of this matter has proven itself to be invaluable. I do not believe we would have been able to discern the identity of the culprit who hacked into Mr. Benchley's e-mail account but for your efforts.

Having practiced law for over 40 years, it is truly enjoyable to have an expert that is a real person in and out of the courtroom. We just resolved the case, and you were a great part of our success. It’s not often that I get to interact with such a ...

Your trucking expert did a masterful job on this matter, particularly with regard to his deposition. In fact, the Defense Counsel commented on his memory and ability to recall specific facts. He was exceptionally well prepared and did an excellent jo...

Jeff Martin, you just gave a perfect deposition. Ten stars. Thank you for lending your expertise and for being such a professional!

I thought you might be interested in seeing a copy of the story that appeared in the Fort Worth Star Telegram. All of these results were due in large part to your objective opinions regarding the training, maintenance, and driving issues involved in ...

Evidence Solutions performed iPhone forensics for me related to my divorce. They were extremely thorough and the data was easy to interpret. Their services made me feel confident in a crucial decision I had to make in my personal life and I am foreve...

Evidence Solutions, was instrumental in helping us with our case. We truly appreciate your expertise and the professional manner in which you assisted us.

Scott--you did fantastic work. Thank You.

You were very helpful to me. I feel fortunate that you agreed to take the case. I will mention your name to other attorneys should they need your type of Services. Thank you.
Connect
Or
Start a Case
Email or Call Today For a Free Consultation