Keep Your Secrets to Yourself Arizona State Bar November 4, 2010 Presented by: Craig Reinmuth CPA,CFF, MST, EnCE.

Slides:



Advertisements
Similar presentations
Electronic Discovery Guidelines Meet and Confer - General definition. a requirement of courts that before certain types of motions and/or petitions will.
Advertisements

Electronic Evidence Joe Kashi. Todays Program Types of Electronically stored information Types of Electronically stored information Accessibility and.
Qualcomm Incorporated, v. Broadcom Corporation.  U.S. Federal Court Rules of Civil Procedure – amended rules December 1, 2006 to include electronically.
© 2007 Morrison & Foerster LLP All Rights Reserved Attorney Advertising The Global Law Firm for Israeli Companies Dispute Resolution in the United States.
1 eDiscovery and Digital Evidence Conference E D ISCOVERY AND D IGITAL E VIDENCE C ONFERENCE A conference presented by Sandra Day O’Connor College of Law.
Ronald J. Shaffer, Esq. Beth L. Weisser, Esq. Lorraine K. Koc, Esq., Vice President and General Counsel, Deb Shops, Inc. © 2010 Fox Rothschild DELVACCA.
Ethical Issues in the Electronic Age Ethical Issues in the Electronic Age Frost Brown Todd LLC Seminar May 24, 2007 Frost Brown.
Effective Discovery Techniques In Computer Crime Cases.
1 A Practical Guide to eDiscovery in Litigation Presented by: Christopher N. Weiss Aric H. Jarrett Stoel Rives LLP Public Risk Management Association (PRIMA),
E-Discovery for System Administrators Russell M. Shumway.
No Nonsense File Collection Presented by: Pinpoint Labs Presenter: Jon Rowe, CCE, ISFCE Certified Computer Examiner Members: The International Society.
Investigation Myths and Facts November 29, 2011 IOT Security: Caroline Drum Bradley.
Basics. 2 Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services –Acquiring an account.
Phone Forensics - Smart phones are Pretty Smart! Presented by: Craig Reinmuth CPA,CFF, MST, EnCE President, Expert Insights, P.C. Scottsdale, AZ (480)
Triton Construction Co, Inc. v. Eastern Shore Electrical Services, Inc. Eastern Shore Services, LLC, George Elliot, Teresa Elliot, Tom Kirk and Kirk’s.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Digital Forensics Update - Enhancing Your Ability to Win Cases September 11, 2013 Fennemore Craig Fennemore Craig.
Get Off of My I-Cloud: Role of Technology in Construction Practice Sanjay Kurian, Esq. Trent Walton, CTO U.S. Legal Support.
* 07/16/96 The production of ESI continues to present challenges in the discovery process even though specific rules have been drafted, commented on, redrafted.
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Electronic Public Record What is it, and Where Can Agency Lawyers Find It?
JMU Outlook, Messenger, and Skydrive An easier way to upload and store files to share.
E-Discovery PA230: Unit 9.
Electronic Discovery refers to the discovery of electronic documents and data…including , web pages, word processing files, computer databases, and.
Electronic Discovery refers to the discovery of electronic documents and data…including , web pages, word processing files, computer databases, and.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Protecting Your Information Assets
Visual Evidence / E-Discovery LLC Visual Evidence / E-Discovery LLC 60th Annual Meeting of the Ohio Regional Association of Law Libraries E-Discovery &
Computer Concepts – Illustrated 8 th edition Unit A: Computer and Internet Basics.
Discovery III Expert Witness Disclosure And Discovery Motions & Sanctions.
Cloud Computing. What is Cloud Computing? What is Cloud Computing? The cloud is an umbrella term for products and services that rely on the internet to.
Archive s By Cameron Harris. What is archiving s Archiving is the act of preserving and making searchable all to/from an individual.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
Rewriting the Law in the Digital Age
2009 CHANGES IN CALIFORNIA DISCOVERY RULES The California Electronic Discovery Act Batya Swenson E-discovery Task Force
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
DOE V. NORWALK COMMUNITY COLLEGE, 248 F.R.D. 372 (D. CONN. 2007) Decided July 16, 2002.
Data Collection and Forensics February 23, Complaint Document Acquisition DepositionsReview Discovery Begins Photocopy Discovery Closes Produce.
MATT DOW Jackson Walker L.L.P. February 14, 2007.
© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Challenge of Rule 26(f) Magistrate Judge Craig B. Shaffer July 15, 2011.
Cache La Poudre Feeds, LLC v. Land O’Lakes, Inc. 224 F.R.D. 614 (D. Colo. 2007) By: Sara Alsaleh Case starts on page 136 of the book!
Basic Features and Options Accessing  Means of communicating electronically via the Internet.  Used by individuals, businesses,
EDiscovery Preservation, Spoliation, Litigation Holds, Adverse Inferences. September 15, 2008.
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Records Management for Paper and ESI Document Retention Policies addressing creation, management and disposition Minimize the risk and exposure Information.
XP Browser and Basics COM111 Introduction to Computer Applications.
Electronic Discovery refers to the discovery of electronic documents and data…including , web pages, word processing files, computer databases, and.
Newsgroup World Wide Web (WWW) Conservation Over the Internet e.g.ICQ File Transfer Protocol (FTP) Includes 6 main services: Electronic Mail Remote.
Electronic Discovery Guidelines Meet and Confer - General definition. a requirement of courts that before certain types of motions and/or petitions will.
EDiscovery Also known as “ESI” Discovery of “Electronically Stored Information” Same discovery, new form of storage.
Title of Presentation Technology and the Attorney-Client Relationship: Risks and Opportunities Jay Glunt, Ogletree DeakinsJohn Unice, Covestro LLC Jennifer.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
WIDESCREEN PRESENTATION Tips and tools for creating and presenting wide format slides.
Electronic Discovery Guidelines FRCP 26(f) mandates that parties “meaningfully meet and confer” to consider the nature of their respective claims and defenses.
ITS Lunch & Learn November 13, What is Office 365? Office 365 is Microsoft’s software as a service offering. It includes hosted and calendaring.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
Office 365 Help Desk Troubleshooting Guide
PRE-SUIT CONSIDERATIONS
Remote Collection What, When & Why.
Investigation Myths and Facts
Digital Forensics in the Corporation
Litigation Holds: Don’t Live in Fear of Spoliation
Get the Data that Cures Your Headache
Computer Terms 1 Terms Internet Terms 1 Internet Terms 2 Computer
Presentation transcript:

Keep Your Secrets to Yourself Arizona State Bar November 4, 2010 Presented by: Craig Reinmuth CPA,CFF, MST, EnCE

Places ESI is Stored

Other Places ESI is Stored November 4, 2010 Arizona State Bar

Other Places ESI is Stored November 4, 2010Arizona State Bar

Other Places ESI is Stored November 4, 2010Arizona State Bar

November 4, 2010

Case Example 6/6 Warm fuzzies re: business r/ship (gmail) 6/6 Warm fuzzies re: business r/ship (gmail) 6/11 Go to social event together (gmail) 6/11 Go to social event together (gmail) 6/15 Forwards resume to competitor (gmail) 6/15 Forwards resume to competitor (gmail) 6/17 Competitor invites EE to meeting on 6/19 (gmail) 6/17 Competitor invites EE to meeting on 6/19 (gmail) 6/19 EE attends meeting at competitor office (gmail) 6/19 EE attends meeting at competitor office (gmail) 6/20 (Sat) Install 1TB Backup storage device (USB) 6/20 (Sat) Install 1TB Backup storage device (USB) 6/20 Accesses company projects on server(recent) 6/20 Accesses company projects on server(recent) 6/20 (eve) Accesses company projects on server(recent) 6/20 (eve) Accesses company projects on server(recent) 6/20 (eve) Goes to Google documents account (cookie) 6/20 (eve) Goes to Google documents account (cookie) 6/21 Apple computer in EE possession (deleted ) 6/21 Apple computer in EE possession (deleted ) 6/22 Project files sent to competitor (gmail) 6/22 Project files sent to competitor (gmail)

Case Example (continued) 6/22-6/28 Employment negotiations (gmail) 6/22-6/28 Employment negotiations (gmail) 6/25 EE connects USB thumb drive in LT (USB) 6/25 EE connects USB thumb drive in LT (USB) 6/25 EE accesses server/files from home laptop (recent) 6/25 EE accesses server/files from home laptop (recent) 7/8 EE connects card reader for first time (USB) 7/8 EE connects card reader for first time (USB) 7/8Empties trash (recover deleted files) 7/8Empties trash (recover deleted files) 7/14 (evening): 7/14 (evening): – EE connects same backup drive to laptop (USB) – EE accesses project files from server (recent) – indicating EE wants to meet with boss (gmail) – EE communicating with b/friend re: computer on BB (phone) – EE access web mail account; forwards “opportunities” file (internet activity) 7/15 Terminates employment (from client) 7/15 Terminates employment (from client) 8

Litigation Support Services E Discovery November 4, 2010Arizona State Bar Legal hold, collection and preservation Preserve in place Collect to preserve Preserve data integrity Provide metadata Processing Filter De-duplication Decompressing compound files Decryption Exclude known files Provide documents within timeframes, file types Provide documents containing certain search terms Indexing Hashing Delivering in a chosen review platform (e.g. Summation) Review Hosting/prepare for attorney review

Identification Preservation Collection Processing Review Analysis Production E-Discovery Smaller Cases Client/in-house Outside Professionals Outside Professional and Counsel

Identification Preservation Collection Processing Review Analysis Production E-Discovery Larger Cases Client/in-house Paralegals or outside Professionals Outside Professional and Counsel

Computer Forensics (Beyond E-Discovery) By Area of Litigation Bankruptcy IntellectualEmploymentGeneralPersonal Creditor's PropertyLabor LawCommercialInjuryInsuranceRightsCriminalSecurities Determine user intentXXXXXXXX Recover and analyze deleted files Uncover spoliationXXX XX Detect use of external devicesX X XXX Identify "recent" files accessedXXX X X Restore point analysisXXXXXXXX Registry analysis USB history logsXXX X XX What documents were printed/whenXXX X XX What programs were run/whenXXX X Operating system changesXXX X X CD burning activityXXX X XX Internet browsing historyXX X X File signature/renaming analysisX X XXXX Recover web-based XXXXXXXX Social networking data X XX X On-line chatting data X XX X TRO'sXXX XXXX Review of all ESI (cell phones/PDA's/XXXXXXXX photocopiers/cameras, etc.) Motion to Compel assistanceX X XXXX Participate in meet and confersXXXXXXXX Participate at hearings with JudgeXXXXXXXX Deposition/testimony servicesXXXXXXXX Preparation of defendable reportXXXXXXXX Working knowledge of case lawXXXXXXXX

Computer Forensics (Beyond E-Discovery) Determine user intent Determine user intent Timeline analysis/recent files Timeline analysis/recent files Recover/analyze deleted files; unallocated space Recover/analyze deleted files; unallocated space Uncover spoliation Uncover spoliation Detect use of external storage devices Detect use of external storage devices Review “restore points” Review “restore points” USB History logs USB History logs Documents printed/when Documents printed/when Programs – when run Programs – when run Operating system changes Operating system changes CD Burning Activity CD Burning Activity Internet Browsing History Internet Browsing History File signature/renaming File signature/renaming Recover web-based Recover web-based Social Networking data Social Networking data On-line chatting data On-line chatting data Assistance with “what to ask for” Assistance with “what to ask for” All ESI (cell phones, PDA, etc) All ESI (cell phones, PDA, etc)

Sample USB Report Arizona State BarNovember 4, 2010

Computer Forensics (Beyond E-Discovery) Determine user intent Determine user intent Timeline analysis/recent files Timeline analysis/recent files Recover/analyze deleted files; unallocated space Recover/analyze deleted files; unallocated space Uncover spoliation Uncover spoliation Detect use of external storage devices Detect use of external storage devices Review “restore points” Review “restore points” USB History logs USB History logs Documents printed/when Documents printed/when Programs – when run Programs – when run Operating system changes Operating system changes CD Burning Activity CD Burning Activity Internet Browsing History Internet Browsing History File signature/renaming File signature/renaming Recover web-based Recover web-based Social Networking data Social Networking data On-line chatting data On-line chatting data Assistance with “what to ask for” Assistance with “what to ask for” All ESI (cell phones, PDA, etc) All ESI (cell phones, PDA, etc)

Social Networking / Web Based Mail

On the Device On the Device Call logs Call logs Text/Instant messaging Text/Instant messaging Pictures Pictures SIM card information SIM card information s and attachments (e.g. Outlook) s and attachments (e.g. Outlook) Phone directories Phone directories Internet history Internet history Other items uncovered Other items uncovered Remote access programs (e.g. Log Me In, VNC, Homepipe) Remote access programs (e.g. Log Me In, VNC, Homepipe) Web based – specific providers Web based – specific providers Where else to go to get info Where else to go to get info Smartphones (Blackberry, Droid, iPhone)

How to Convince Your Clients to Use Computer Forensics Zubulake – “Virtually all cases involve the discovery of electronic data” Greater likelihood of getting the data you need to properly represent your clients Greater likelihood of getting the data you need to properly represent your clients Avoid exposure to sanctions (at client and attorney level) Avoid exposure to sanctions (at client and attorney level) Potential for expert fees to be paid for by other side Potential for expert fees to be paid for by other side Case dismissal Case dismissal Greatly Enhance Chances for Winning Greatly Enhance Chances for Winning Potential for turning claims into counter-claims Potential for turning claims into counter-claims

Defense Side Computer Forensics Is your client telling you “the whole truth” Is your client telling you “the whole truth” Be comfortable in Being Proactive Be comfortable in Being Proactive Assist with Up-front strategy Assist with Up-front strategy Assist with demands of opposition Assist with demands of opposition Turn claims into counter claims Turn claims into counter claims Working knowledge of case law Working knowledge of case law Rebuke opposing experts’ credentials/methodology/findings Rebuke opposing experts’ credentials/methodology/findings Deposition line of questioning Deposition line of questioning

Other Potential Needs for Computer Forensics Expert TRO – collection/review of electronic devices TRO – collection/review of electronic devices Review of other ESI Review of other ESI Motion to Compel Assistance Motion to Compel Assistance Motion for Spoliation Assistance, including testimony Motion for Spoliation Assistance, including testimony Participate in Meet and Confer Participate in Meet and Confer Participate in Meetings with Judge Participate in Meetings with Judge Deposition/testimony services Deposition/testimony services Preparation of defendable report Preparation of defendable report Working knowledge of Case Law Working knowledge of Case Law

Computer Forensics in Each Stage of Litigation Process Arizona State BarNovember 4, 2010 Defendable Reports Understandable Testimony Integrity of Data Vulnerability Assessment Opposing Expert Cross Examination Prior Experience Reputation Getting all data needed to represent client Determine user intent Restoration of Deleted Files Review all relevant ESI Printing/burning activity Internet activity Spoliation of Evidence Knowledge of case law Attend Meet and Confer Types of Electronic Evidence to Request Secure Collection & Preservation Detect use of Storage Devices/ Data Downloads Motion to Compel Opposing Expert – Deposition/Rebuke Findings Attend meetings with Judge Data preservation Identify Electronic Evidence Sources Assist with Cost/ Benefit Discussions with Clients Interrogatory assistance Avoid Exposure to Sanctions For defense, view what is/is not on computer TRO Case Strategy DiscoveryAnalysisTestimony

Summary Zubulake – “Virtually all cases involve the discovery of electronic data” Computer Forensics Can Help Your Clients Keep Their (Trade) Secrets to Themselves It is a Win/Win It is a Win/Win Goes Well Beyond E-Discovery Goes Well Beyond E-Discovery Determines User Intent; Provides “Timeline” of Activity Determines User Intent; Provides “Timeline” of Activity Considers all Potential Sources of ESI Considers all Potential Sources of ESI Can Greatly Enhance Your Chances for Success Can Greatly Enhance Your Chances for Success Avoid exposure to sanctions Avoid exposure to sanctions Should Be Considered by both Plaintiff and Defense Should Be Considered by both Plaintiff and Defense

Right, what’s a “Gigabyte” Document = 26,214 bytes Box of documents = 2,000 pages or 50 megabytes Truck of boxes = 1 million pages or 25 gigabytes