In our earlier post on this topic, Best Practices for Searching Social Media for Evidence, we described a universal approach for searching the internet to locate and identify social media evidence. In this article we will discuss the best practices for preserving social media evidence, the rules of evidence that apply and steps that can be taken to overcome anticipated admissibility issues. Read the Full Article>
Thank you to everyone from the Connecticut Division of Public Defender Services who attended our latest digital forensics training seminar in Hartford, CT on Thursday, April 5, 2018.
Learn how to take a proactive approach to data security and prevent becoming a victim in the first place. READ THE ARTICLE: The best data security and id theft protection for 2018
A county employee in North Carolina on Monday opened their inbox and clicked on a phishing email, inadvertently pulling up an attachment containing spyware and appearing to expose the county's computer system to hackers overseas. The hackers, believed to be operating from Iran or Ukraine, asked the county for $23,000 to unfreeze the system, Mecklenburg County officials said. They gave the county an email address and instructions on how to pay the ransom. They also gave the county a deadline — 1 p.m. Wednesday. READ THE FULL CHICAGO TRIBUNE ARTICLE HERE>
Researching the online publicly available presence of potential parties, witnesses, the scene, even your own client should be a routine practice. It should follow the best practices, begin as soon as possible, be fully documented and be regularly monitored. Read the full article here>