Category Forensics,Relativity

Even though they may not know it, your clients (as well as opposing parties) may have a personal concierge tracking their movements and recording many aspects of their daily life. Mobile devices capture the following information: • Call logs including incoming, outgoing and missed • Text messages • Email • Photos with embedded location data • […]

Category Evidence,Forensics

“Right, my phone. When these things first appeared, they were so cool. Only when it was too late did people realize they are as cool as electronic tags on remand prisoners.” David Mitchell, Ghostwritten I admit that I am not an early adopter of technology.  I have never stood in line for a new mobile […]

Category Forensics

Depending on your experience in eDiscovery, you might think that eDiscovery collection of electronically stored information isn’t all that difficult—just pull the data off the servers in one fell swoop. But all is not what it seems. Businesses may have multiple locations, and they may maintain data in more than one place. Even those entities […]

Category Forensics,Seminars

Whether a knowledgeable eDiscovery practitioner or a novice, in a corporate legal department or a law firm, or someone who faces an occasional or ongoing eDiscovery need, chances are you will need an eDiscovery or electronic forensic vendor at some point. But the practitioner cannot pick just any firm.  Deciding to hire an outside vendor […]

Category BYOD,Forensics,Seminars

Most attorneys are surprised when I tell them that forty-five years ago, electronically-stored information (ESI) was validated as relevant to discovery—this, six years before Cray introduced their 5,300 pound computing wonder. Our modern day computing wonder, the 125 gram smartphone which I will discuss at Minnesota CLE on April 29th, 2015 has its own share […]

Category Forensics,Software

Andrew Hoog, the Chief Investigative Officer at NowSecure (formerly known as viaForensics) has been affectionately—and perhaps accurately—referred to in the media as a “high-tech plumber.” He does use code to fix leaky apps that spill data. But we think Hoog deserves a title that’s a bit more refined. To us, he’s more of a high-tech […]

Category Forensics,Seminars

At our July Shepherd Speaks presentation, we looked at what’s inside your iPhone and iPad, and at the security of those systems. For the most part, an iPhone’s integrated software is pretty secure, although there are soft spots. At our September 17 event, we turn our attention to Android devices. Android’s users can open themselves […]