01 Feb

New 2017 Federal Rule of Evidence Expected to Significantly Influence E-Discovery Best Practices


As our society continues to trend towards a greater technological and electronic dependence, attorneys can expect to see a rise in the prevalence and importance of electronic data as evidence. Slated to go into effect on December 1, 2017, a new amendment to Federal Rule of Evidence 902 will have strong implications on the importance of proper collection methods of electronic evidence.

The new amendment, known as subsection (14), states that electronic evidence will now be self-authenticated if it is collected properly, able to be digitally verified, and is certified valid by a qualified professional. This new change will make old, less professional methods of collecting electronic evidence obsolete while giving rise to the importance of structured and verifiable collection methods.

The attached Advisory Committee notes address the recommended use of generating a “hash value” for the copied piece of data and comparing it to the “hash value” of the original for authentication. As defined in the Advisory Committee notes:

“A hash value is a number that is often represented as a sequence of characters and is produced by an algorithm based upon the digital contents of a drive, medium, or file. If the hash values for the original and copy are different, then the copy is not identical to the original. If the hash values for the original and copy are the same, it is highly improbable that the original and copy are not identical. Thus, identical hash values for the original and copy reliably attest to the fact that they are exact duplicates.”

What this means for investigators and attorneys is that self-collection methods of electronic data including manual print-screen, drag and drop file copying, or any other simplistic method will not be deemed self-authenticated under the new law. This will most certainly create evidentiary hurdles and headaches. Simply taking a screenshot of emails or social media posts will not provide the necessary hash values for identification. Copying a file or document from a server to yours will alter the meta-data and produce a different hash value from the original flagging the file or document as being altered.

To limit evidentiary issues and remain compliant with the new law changes, your best practice is to hire a professional digital forensics firm that specializes in ESI (Electronically Stored Information) that can certify and generate hash values.

Our firm is licensed to handle sensitive data, we certify our collections, and use the correct digital forensics tools and methodology when processing data into eDiscovery. Our experts are masters in collecting, recovering, searching, and analyzing data and presenting it to you in a professional platform ready for trial. Our firm stands behind our work and if a situation arises, we are ready and willing to testify to support you, back up our findings, and help you win your case.

Evidence is the backbone of any strong legal case. Start the online Case Evaluation to get a quote on our services. We can collect cloud, social media and email data remotely, no travel required and we also have a nationwide network of data collectors in most states. When digital data is required for litigation – make one call to Expert Data Forensics 702.435.8885.

 

Collect | Recover | Analyze | Store | Report | Certify | eDiscover & Testify – Done!

PILB#1498
(c)2017 Expert Data Forensics

Share this
28 Mar

7 Things About Social Media as Evidence

7 Things About Social Media as Evidence

1. Public or Private?
When a “Facebook” account is created, the user agrees that their personal information would be shared with others. Once the information is made public it can be copied, tagged, and distributed. When a person creates a social media account for themselves they are, in a sense, a self-created celebrity. So, is it “reasonable” to expect complete privacy of the account?

2. Let’s Subpoena – Not!
Can Facebook, Instagram, Snapchat, or Twitter be subpoenaed for the user account data? How would you domesticate and overcome another “little” obstacle called – “End User Stored Communication Act?”
 
Sending a subpoena to Facebook, in a civil matter, could prove to be a waste of time. I would much rather focus resources on trying to obtain the actual device used to post to the social media account, than try to get Facebook to comply.
read more

Share this
14 Feb

Love Bytes 2015

Love Bytes

3 Tech Tips for Couples

Advice from Digital Forensic Investigators

Valentine’s Day is an extremely popular day to celebrate your love with a proposal. An American Express survey found that 6 million couples are likely to get engaged on February 14th.

Before you pop open the champagne bottle and FaceTime your Mom, take a minute to discuss how you feel about having kids, where you will spend Thanksgiving as a couple and how you would handle Social Media and Device Access Preferences in your relationship and home. 

In 2014, 25% of the cases we analyzed were divorce and infidelity based. In the initial case assessment we categorize the digital nature of the relationship prior to the breakdown, this gives us the information we need to establish online behavior regarding infidelity, banking and finances.

With this statistic in mind, my advice for newlyweds would be to set the ground rules for;

read more

Share this
29 Jul

Press Release July 2014

Forensic DataTRACK – Unleashing Weapon against Cyber Crime in the Work Place

PRESS RELEASE
July 18, 2014
For immediate release
Contact: Eliya Azoulay (888) 335-3888, ext. 119
Eliya.azoulay@expertdataforensics.com

Las Vegas digital forensics firm releases new weapon in fight against digital security breaches
read more

Share this
13 Jul
20 Feb

Expert analyzes video of Sands Corp. hack

Interview with Digital Forensic Expert Investigator, Leon Mare of Expert Data Forensics

 Expert analyzes video of Sands Corp. hack

Posted: Feb 18, 2014 10:25 PM PST

Updated: Feb 19, 2014 7:56 AM PST

Written by Ashley Conroy – bio | email

Leon Mare, an investigator with Expert Data Forensics, was shocked to see the level of information to which the hacker had access.

“If you’ve got a domain administrator, and the domain administrator has got the main routes throughout the whole organization, it means he is actually like God on their network,” he said.

read more

Share this
29 Oct

Press Release October 2009

Computer Data Forensics Specialists offer New Name and Release Monthly Newsletter

By Expert Data Forensics

Dated: October 1st, 2009

The Only Private Investigator Licensed Computer Firm in the state of Nevada

Las Vegas – After being granted a private investigators license, the Vegas IT Techs computer firm has changed its focus and is now concentrating more on sciences of Computer & Data forensics. They are dedicated to helping businesses and individuals obtain electronic forensics needed for personal or legal reasons. It is the first computer forensics firm to be licensed in Nevada. With a new d/b/a Expert Data Forensics in the state, more cases can be solved involving the retrieval of electronic data.

read more

Share this
11 Feb
11 Feb

Computer Forensics and Family Law

www.ExpertDataForensics.com
Tel: 888-355-3888
eForensic Focus

COMPUTER FORENSICS AND FAMILY LAW

The use of a Computer Forensics Expert can be extremely effective in building and collating evidence in family law matters such as:   divorce cases with larger estates, complicated businesses, real estate holdings or cases with multi-jurisdictional assets, proving/disproving parental competence or harassment.  Most cases of custody and visitation have been solved or modified because of computer evidence recovered by a Computer Forensics Expert. Experts assist attorneys in the recovery of financial information,   decryption of passwords, recovery of instant messages and archived data.

read more

Share this
10 Feb

Strategic Alliance Program

Expert Data Forensics (EDF) Strategic Alliance Program (SAP)

Detailed Outline

Our Goal:

We are aggressively expanding our business operations by setting up new Forensic Recovery & Analysis Centers around the states. We want to work closely with other industry related companies who would like to become authorized “SAP Representatives”.

Who qualifies to be an authorized SAP Representative?

A company/individual who matches the criteria of “Related Industry”
A company/individual who has an existing/established customer base that can benefit from our services
A company/individual who wants to seamlessly add our services to their existing service list as a unique selling point and added value to their clients.

read more

Share this

© 2015 Expert Data Forensics • Nevada • PILB1498