Blog
How to Avoid Being Hacked, Part 1 – Email
How to Avoid Being Hacked, Part 1 - Email Hacking is a common occurrence these days, but it’s good to know that hacking targeting you specifically because of who you are is far less common than scattershot hacking. Additionally, taking advantage of your online data is...
Keyword Searches
Computer Forensics Expert Steve Burgess explains keyword searches - what they are, how to design an effective search, and differences between electronic data discovery (EDD) and computer forensics.
Data Recovery Myths and Misconceptions
In the very early 80's, IBM introduced the IBM PC, progenitor of most modern personal computers. That same year, undoubtedly, the first PC hard disk failed and someone was screaming about their data and cursing IBM. Shortly after that, we started the data recovery...
Can You Browse the Internet in Secrecy?
By Jessica Riccio Under normal circumstances, browsing the Internet leaves many footprints (“artifacts”) across the user’s computer. A computer forensic experts’ ability to find Internet History artifacts will frequently have a significant impact on the outcome of a...
Cyberstalking and Cyberharassment – What They Are and What To Do About It
What is Cyberstalking? The first five entries in a Google search show five different definitions, but all agree that it has to do with the use of electronic communication to bother someone. That electronic communication could be through the use of social networks,...
Cyberbullying Law and Intervention
Defining Cyberbullying Many people (the author included) conflate cyberbullying and cyberstalking. Both are forms of cyberharassment, but the National Conference of State Legislatures limits the term "bullying," or "cyberbullying" to electronic harassment or bullying...
The 2009 California changes to law with regard to ESI
The evolution of e-discovery and computer forensics, Part 4 In 2005 and 2006, the California Judicial Council proposed amendments for the California Rules of Court with regard to electronic discovery (ediscovery), but with Amendments to the Federal Rules set to be...
Federal Rules of Civil Procedure and ESI
The evolution of e-discovery and computer forensics, Part 3: The 2006 ESI Amendments to the FRCP The field of electronic discovery and digital forensics is rapidly evolving. In the early years of this millennium, discovery rules dealt primarily with paper, but with...
What Are Cyberbullying, Trolling, and Cyberstalking? The Dark Side of Free Speech, Part 2
Cyberbullying Our culture and probably most others have historically felt that bullies are bad news, but that being bullied is also a rite of passage. We often think that bullying tends to end with grammar school. Nothing is further from the truth. As a culture, we...
Cyberbullying, Trolling, and Cyberstalking: the Dark Side of Free Speech Part 1: What is Free Speech?
To listen to, read, or watch the news, it is clear that there is broad misunderstanding about the right to free speech. It is not the freedom to say anything to anyone anywhere, but rather a prohibition to keep the government from denying us the right to express...