by Steve Burgess | Feb 22, 2016 | Uncategorized
In the very early 80’s, IBM introduced the IBM PC, progenitor of most modern personal computers. That same year, undoubtedly, the first PC hard disk failed and someone was screaming about their data and cursing IBM. Shortly after that, we started the data...
by Steve Burgess | Feb 15, 2016 | Uncategorized
By Jessica Riccio Under normal circumstances, browsing the Internet leaves many footprints (“artifacts”) across the user’s computer. A computer forensic experts’ ability to find Internet History artifacts will frequently have a significant impact on the outcome of a...
by Steve Burgess | Feb 5, 2016 | Uncategorized
What is Cyberstalking? The first five entries in a Google search show five different definitions, but all agree that it has to do with the use of electronic communication to bother someone. That electronic communication could be through the use of social networks,...
by Steve Burgess | Feb 1, 2016 | Uncategorized
Defining Cyberbullying Many people (the author included) conflate cyberbullying and cyberstalking. Both are forms of cyberharassment, but the National Conference of State Legislatures limits the term “bullying,” or “cyberbullying” to electronic...
by Steve Burgess | Jan 25, 2016 | Uncategorized
The evolution of e-discovery and computer forensics, Part 4 In 2005 and 2006, the California Judicial Council proposed amendments for the California Rules of Court with regard to electronic discovery (ediscovery), but with Amendments to the Federal Rules set to be...
by Steve Burgess | Jan 23, 2016 | Uncategorized
The evolution of e-discovery and computer forensics, Part 3: The 2006 ESI Amendments to the FRCP The field of electronic discovery and digital forensics is rapidly evolving. In the early years of this millennium, discovery rules dealt primarily with paper, but with...