archives

E-Discovery

This category contains 27 posts

Key Twitter and Facebook Metadata Fields Forensic Investigators Need to be Aware of

Authentication of social media evidence can present significant challenges when you collect by screen shots, printouts or raw html feeds from an archive tool. This is just one reason why social media data must be properly collected, preserved, searched and produced in a manner consistent with best practices. When social media is collected with a … Continue reading

689 Published Cases Involving Social Media Evidence (with full case listing)

The torrent of social media evidence continues to grow. In November 2011 we, at X1 Discovery, searched online legal databases of state and federal court decisions across the United States to identify the number of cases from 2010 and through November 2011 where evidence from social networking sites played a significant role.  As we mentioned … Continue reading

Overcoming Potential Legal Challenges to the Authentication of Social Media Evidence

By John Patzakis1 Summary: Social media evidence is highly relevant to most legal disputes and broadly discoverable, but challenges lie in evidentiary authentication without best practices technology and processes. This whitepaper examines these challenges faced by eDiscovery practitioners and investigators and illustrates best practices for collection, preservation, search and production of social media data. Also … Continue reading

Forensic Imaging of Hard Disk Drives- What we thought we knew

By Todd G. Shipley and Bryan Door (A complete copy of this white paper and its figures and diagrams can be found at http://www.nfdrtc.net). WHAT WE HAVE BEEN TAUGHT Imaging of hard drives has been the main stay of the “Science” part of digital forensics for many years.  It has been articulated by many, including us, … Continue reading

Skype in eDiscovery

Author: Stuart Clarke, 7Safe The EDRM (Electronic Discovery Reference Model) is a widely accepted workflow, which guides those involved in eDiscovery. Typically, the identification and collection phases see email and common office documents harvested, but as technology moves forward is this enough? Many of us are experiencing a rise in audio discovery projects using solutions … Continue reading

Things a Little Birdie Told Me: The Implications of Twitter and other Social Media in E-Discovery

by Elluma Discovery Facebook, Twitter, and a growing number of social media sites have taken over our lives. Whether Tweeting about the Kardashians or ranting over the latest brouhaha between Snookie and “The Situation,” we spend an inordinate amount of time behind our keyboards participating in our virtual lives. Aside from possibly contributing to the … Continue reading

Unusual devices

First published June 2010 by Sean McLinden In 2007, New Jersey Governor Jon Corzine made the news twice for a single event. The first time was the report of a car accident on the Garden State Parkway in which he was seriously injured. The second time was a report, which appeared a few days later, … Continue reading

Email Evidence – Now You See it, Now You Don’t!

First published October 2008 By Sandy Boucher and Barry Kuang, Intelysis Corp. Background With the ever increasing role of computers and electronic communications in both our business and personal lives, emails have taken on a key evidentiary role in many high profile court cases. From Oliver North in the Iran-Contra probe to Bill Gates in … Continue reading

Large Scale Fraud Cases And The Issues Surrounding E-Discovery Investigations

First published September 2007 submitted by CY4OR Limited A recent Report by the Fraud Advisory Panel revealed that the average length of a serious fraud investigation between 2002 and 2006 totalled 33 months, costing the British taxpayer around £100 million per year to fund in Legally Aided cases. An example would be the 2005 Jubilee … Continue reading

Data: The Basics of Computer Forensics

First published June 2005 by Edward Pscheidt http://www.edwardpscheidt.com Everything is created on a computer. To be more precise, almost everything that is the subject of litigation was created on a computer. Be they letters, blueprints or company books, the vast majority of subpoenaed information resides on computers. Because of this, the hard-nosed private eye from … Continue reading

Learning from Other’s Mistakes: Issues Arising from Electronic Discovery

First published May 2005 by Setec Investigations http://www.setecinvestigations.com Computer forensics and the associated electronic evidence and electronic discovery are relatively new to the litigation game. The use of such information is growing steadily and it has become impossible for legal professionals or their clients to claim that they are unaware of the existence of electronic … Continue reading

Electronic Evidence as the Smoking Gun

First published February 2005 by Henry J. Fasthoff, IV NOTE: THIS IS ARTICLE IS FOR INFORMATIONAL PURPOSES ONLY. IT IS NOT INTENDED TO BE CONSTRUED AS LEGAL ADVICE. Electronic communications–particularly email–may contain a treasure trove of evidence in commercial litigation matters. There are three key reasons for this fact. First, email is a very informal … Continue reading

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,209 other followers