archives

e-discovery

This tag is associated with 12 posts

ICDF2C 2018 – Recap

This article is a recap of some of the main highlights from the ICDF2C conference 2018, which took place in New Orleans, LA, USA from the 10th-12th September. The program began on Monday 10th September with the usual welcome registration. The conference was held at Chateau LeMoyne in New Orleans’ French Quarter: a beautiful hotel complete … Continue reading

Opinion: Is ISO17025 The Right Standard For Digital Forensics?

by Rich2005 Standardisation is currently the subject of animated discussion among digital forensic examiners worldwide. In this opinion piece, Rich2005 looks at the challenges of the ISO17025 standard for digital forensics and why it might not be the best choice for the field. Please note that the views contained within this article are the opinions … Continue reading

Word Forensic Analysis And Compound File Binary Format

by Arman Gungor Microsoft Word forensic analysis is something digital forensic investigators do quite often for document authentication. Because of the great popularity of Microsoft Office, many important business documents such as contracts and memoranda are created using Word. When things go south, some of these documents become key evidence and subject to forensic authentication. My goal … Continue reading

Analysis Of iOS Notes App

As part of my third year studying Digital Security,Forensics & Ethical Hacking at GCU, I took part in a group research project to study the artifacts created when using the notes app on an iPad Mini, and if they could be used as evidence. This post is really just going to explain what I did, … Continue reading

Windows 8: Important Considerations for Computer Forensics and Electronic Discovery

Introduction Documents identified by computer forensic investigations in civil litigation typically require review and analysis by attorneys to determine if the uncovered evidence could support causes of action such as breach of contract, breach of fiduciary duty, misappropriation of trade secrets, tortious interference, or unfair competition.  In addition, bit-for-bit forensic imaging of workstations is also … Continue reading

Collecting and Processing Bloomberg Data

A few years ago, Bloomberg data may have been relatively unusual, however today we see Bloomberg chat and email data being collected quite frequently. Not a surprise really considering some of the headlines relating to certain Banks and Financial institutions of late. Below are some examples of the tips, tricks and considerations involved in working … Continue reading

689 Published Cases Involving Social Media Evidence (with full case listing)

The torrent of social media evidence continues to grow. In November 2011 we, at X1 Discovery, searched online legal databases of state and federal court decisions across the United States to identify the number of cases from 2010 and through November 2011 where evidence from social networking sites played a significant role.  As we mentioned … Continue reading

Forensic Imaging of Hard Disk Drives- What we thought we knew

By Todd G. Shipley and Bryan Door (A complete copy of this white paper and its figures and diagrams can be found at http://www.nfdrtc.net). WHAT WE HAVE BEEN TAUGHT Imaging of hard drives has been the main stay of the “Science” part of digital forensics for many years.  It has been articulated by many, including us, … Continue reading

Things a Little Birdie Told Me: The Implications of Twitter and other Social Media in E-Discovery

by Elluma Discovery Facebook, Twitter, and a growing number of social media sites have taken over our lives. Whether Tweeting about the Kardashians or ranting over the latest brouhaha between Snookie and “The Situation,” we spend an inordinate amount of time behind our keyboards participating in our virtual lives. Aside from possibly contributing to the … Continue reading

Large Scale Fraud Cases And The Issues Surrounding E-Discovery Investigations

First published September 2007 submitted by CY4OR Limited A recent Report by the Fraud Advisory Panel revealed that the average length of a serious fraud investigation between 2002 and 2006 totalled 33 months, costing the British taxpayer around £100 million per year to fund in Legally Aided cases. An example would be the 2005 Jubilee … Continue reading

Learning from Other’s Mistakes: Issues Arising from Electronic Discovery

First published May 2005 by Setec Investigations http://www.setecinvestigations.com Computer forensics and the associated electronic evidence and electronic discovery are relatively new to the litigation game. The use of such information is growing steadily and it has become impossible for legal professionals or their clients to claim that they are unaware of the existence of electronic … Continue reading

Electronic Evidence as the Smoking Gun

First published February 2005 by Henry J. Fasthoff, IV NOTE: THIS IS ARTICLE IS FOR INFORMATIONAL PURPOSES ONLY. IT IS NOT INTENDED TO BE CONSTRUED AS LEGAL ADVICE. Electronic communications–particularly email–may contain a treasure trove of evidence in commercial litigation matters. There are three key reasons for this fact. First, email is a very informal … Continue reading

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,152 other followers