Go to Top

Blog Archives

An Executive Resigns: Misconduct Suspected, Employer Cannot Access Evidence on His Mobile Phone

“Sorry…You Are Locked Out of Your Own Data” Well, it happened again today.  We had to call a client and advise them that it will be nearly impossible, or at least very expensive to perform a forensic exam of one of their smart phones after the user of the phone, a key executive suspected of misconduct, abruptly resigned.  Why?  Because the device, a newer Apple iPhone, was password protected and …Read More

Need CLE Credits?

Time is running out for completing your CLE credits for this year.  Don’t wait till the last minute! Let us bring the content to you…4Discovery provides on-site CLE programs in the convenience of your firm’s conference room. Our programs are: • Free of charge • CLE certified for 1.5 hours • All materials provided:  Certificates, hand-outs & MCLE paperwork is included • Lunch and Learn format in your conference room.  …Read More

Your Law Firm Has Just Suffered a Data Breach…Do you Tell Your Clients?

Recent Law Firm Data Breaches are Reigniting This Debate Cyber attacks against some of the country’s top law firms are creating fresh concerns about protecting client data, and when lawyers should advise their clients that a breach has occurred. The Wall Street Journal has reported that hackers have attacked the networks of Cravath Swaine & Moore LLP,  Weil Gotshal & Manges LLP, and others.  While the motives of the hackers …Read More

New York Man Convicted for Hacking, Crashing Former Employer’s Network

The “trusted insider” remains the most significant threat to company networks The United States Attorney’s Office for the Middle District of Pennsylvania announced last week that Dariusz J. Prugar, age 32, of Syracuse, New York, was convicted after a week-long trial before a federal jury in Harrisburg, Pennsylvania, of computer fraud and wire fraud. Prugar was the network administrator for Pa Online, an internet service provider in Enola, Pennsylvania.  Kruger …Read More

Mobile Phone Porting Fraud: The Risk Goes Far Beyond Consumers

Businesses are increasingly targeted by phone porting scams Much has been written and reported about the risk of mobile phone “Porting” and related financial scams against consumers.  A 90 year old grandfather, for example, recently had his identity stolen by a fraudulent caller that advised the old man that she was conducting a “phone interview.”  When the grandfather gladly offered his personal information over the phone to the scammer, the …Read More

Heroin Possession Conviction is Tossed When Police Fail to Show “Texting” was Probable Cause for the Traffic Stop

Forensics on Phone Proves Defendant was not Texting The United States 7th Circuit Court of Appeals has overturned the conviction of Gregorio Paniagua-Garcia in a possession of heroin with intent to distribute case when the police were unable to prove Paniagua was texting, which had been cited by police as the probable cause for the traffic stop. Deputy Dwight Simmons of the Putnam County Sheriff’s office pulled over Paniagua when …Read More

Deepwater Horizon Revisited: Computer Fraud & Abuse is One of the Few Criminal Convictions in This Case

Engineer’s Guilty Plea for Deleting Text Messages Stands Out in a Series of Not Guilty Findings In the months following the 2010 BP Deepwater Horizon oil rig disaster, 52 criminal counts were filed against 5 men that prosecutors believed were criminally responsible for the explosion and resulting deaths of 11 people.  Of those 52 charges, 23 were withdrawn, 23 were dismissed, and jurors acquitted on three counts.  Last week the …Read More

The FBI vs. Apple Update: Did an “IT Guy” Botch the Initial Attempts to Recover Critical Information from the Terrorist’s iPhone?

A case for not letting your client’s “IT Guy” do forensics… We are now learning that the initial attempts to recover critical evidence from the San Bernardino County terrorist, Syed Rizwan Farook’s iPhone may have been hampered by the ill-advised response of the individuals that initially took custody of the now famous iPhone.  You may recall that the terrorist’s phone was owned by his employer, San Bernardino County.  Apparently his …Read More

Apple Can Help the FBI Crack a Terrorist’s Phone, They Just Won’t Do It

When individual privacy rights and societal good collide Does a dead terrorist’s right to privacy trump our rights to exist in a safe world?  Lofty philosophical question indeed….but not quite as simple as it sounds.  Let’s put the moral debate aside for a moment and examine the technical challenge presented by today’s news that Apple has been ordered by a federal judge to help investigators break into the San Bernadino …Read More

Death by Natural Causes…or Because of Smart Phone Failure?

Could Digital Forensics on a Diabetes Monitoring Device Help Solve The Case? The girl died in her sleep.  We’ll call her Sara.  A young college student with a bright future. Sara had battled Diabetes since she was a little girl.  Sometime during the evening while fast asleep in her dorm room her glucose levels became catastrophically out of normal, and her body shut down. She never woke up. Recently, Sara’s …Read More