Weekly Highlights: September 17, 2012
Things You Might Have Missed Last Week (Highlights in legal, forensics, and electronic discovery news for the past week) Interesting Electronic Evidence Cases Inhalation Plastics, Inc. v. Medex...
View ArticleWeekly Highlights: December 6, 2013
Hacker Server Storing Two Million Pilfered Passwords (From: Ars Technica) Researchers have unearthed a server storing more than two million pilfered login credentials for all kinds of user accounts,...
View ArticleOpen Source Intelligence (OSI) and Your Case
Open Source Intelligence (OSI or OSINT) is intelligence collected from sources that are available publicly. Much of the information fed to the internet by users, collected by advertisers, or otherwise...
View ArticleMaking Sense of “Heartbleed”: Information Security Catastrophe/Nightmare
The term “Internet Security Nightmare” has been used. This is not an exaggeration, and not an example of hyperbole; Heartbleed is a security catastrophe that cuts a wide swathe across the internet. If...
View ArticleWeekly Highlights: April 21, 2014
FRCP Rule 37(e) (Preservation) is Changing On April 11th, the Civil Rules Advisory Committee approved a revision to Rule 37(e) (the section covers failure to preserve Electronically Stored Information...
View ArticleABA Issues Opinion on Social Media Ethics
The most common question in cases involving Open Source Intelligence (OSI) to support an electronic investigation, is: “To what extent may an attorney ethically use social media during case...
View Article‘Shellshock’ In Plain English: Latest Security Vulnerability is a Big One
Many network administrators and information security folks are feeling the effects of the ‘Shellshock’ bug, this morning. The bug has been confirmed as ‘worm-able’, and proof-of-concept code is...
View ArticleTexas CoA Addresses Electronic Community Property and Invasion of Privacy
Reference: Miller v. Talley Dunn Gallery LLC, 2016 Tex. App. LEXIS 2280 (Tex. App. – Dallas March 3, 2016) (mem. opinion) (Cause No. 05-15-00444-CV) Relevant Documents: Memorandum Opinion: March 3,...
View ArticleIt’s a Trap!! Infected Microsoft Word Files Exploiting Unpatched Vulnerability
A new virus is ‘in the wild’ that exploits a ‘zero-day’ vulnerability to infect or, worst case, wipe computers. The only known mitigation is to not download or view the infected files. One may also...
View ArticleHome Invasion Search Warrant: Two Knocks is One Too Many
(United States v. Juan Olaya, D-2, Case No. 15-cr-20200, EASTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION) On December 5, 2014 a group of 6 that was attached to a spree of home invasions was finally...
View Article