Archive for September, 2007

How to overcome E-Discovery Challenges with New Technologies

Friday, September 21st, 2007

Business communications are now dominated by electronic storage and devices like emails, hard drives, flash drives etc… and the volume of data used and stored is increasing at astonishing rate. Here comes the Electronic discovery. After the recent amendment to the Federal Rules of Civil Procedure (FRCP) which recognizes increasing importance of electronically stored information for litigation and regulatory investigations. (more…)

Letting EDD Evidence Speak for Itself

Thursday, September 20th, 2007

By now, you undoubtedly have mastered the new electronic data discovery amendments to the Federal Rules of Civil Procedure. You keep up with the rapidly evolving case law. You probably even know the difference between a computer forensic expert and an EDD vendor, and the differences in the types of services each provide.

It’s likely, however, that you haven’t faced the challenge of presenting electronic evidence to a jury, through the testimony of a computer forensic expert. If you have (at least based on discussions with a number of well-known computer forensic experts from around the country who’ve actually testified in court), it’s likely you simply relied on the talking head to present opinions to the jury. (more…)

Intrusion detection guide

Thursday, September 13th, 2007

With the growing use of internet the threats attached to it are also growing. As more and more people are getting dependent on internet, the hackers are inventing new ways to intrude into their systems and cause havoc for them. By intruding or by gaining unauthorized access to their computers the hackers can access confidential information or can simply destroy their system and derive sadistic pleasure out of it. Thus, Intrusion Detection Systems (IDS) have become the need of the hour. (more…)

Dangers in E-Discovery

Thursday, September 6th, 2007

The big paperless case in the sky is coming your way and, believe it or not, you’re going to embrace it. Instead of tripping over boxes of documents, you will be enjoying all the benefits of using highly compressed electronic documents. Those who still scoff at high technology are costing their firms and their clients a fortune in wasted time, unnecessary expenses and avoidable errors. The price of devotion to paper may even include losing the case, since more than 35 percent of corporate communications never reach paper.

If you already scan documents and surf your case management system, you will be happy to know that more leverage is just ahead. Costly manual and semiautomatic document reviews are becoming ever more automated, with nanosecond turnaround times; breathtaking, fractional error rates; and innovative, mega-gigabyte cull-and-search tools. (more…)

What Can Computer Forensics Do For You?

Monday, September 3rd, 2007

What do you recommend as a best practice for preserving electronic data on a computer?

One of the most important things that companies need to do is to make sure that they do not spoil the evidence by looking to see what the employee was doing. In many cases, right after someone departs, the manager or someone from IT will look through the computer to see what files were recently accessed. The problem with that is the employee may have downloaded files to CDs to take with them. If someone surfs through a computer to see what was stolen, they are altering the file metadata, such as the date the file was last accessed.

It may cause a file that was burned to CD along with other collection of files to have its last access date altered. In computer forensics, we often look for clustering of files with similar dates and times. For instance, if someone burns a number of files to CD, the last accessed time may be a second apart on files that were recently burned to CD. Frequently, we can figure out what was burned to CD by looking at the access dates because when the computer reads the file to write it to CD, it alters access dates. The manager who accesses the computer to look around has just caused the access dates to be modified, so it makes it more difficult for forensic experts to piece evidentiary information together. (more…)