Go to Top

Tag Archives

Tag Archives: Apple

Hillary Clinton’s eMail Drama: Tips From the Trenches

I am in the digital forensics business.  That means that when something related to eMail or computer evidence is in the news, my friends and family ask me questions, like:  “are Tom Brady’s destroyed “DeflateGate” text messages recoverable?”, and “could you recover data from the submerged mobile phones from missing Malaysian Airlines Flight 370 if it was ever recovered?”  So, I get used to these questions.  It’s kind of fun. …Read More

An Executive Resigns: Misconduct Suspected, Employer Cannot Access Evidence on His Mobile Phone

“Sorry…You Are Locked Out of Your Own Data” Well, it happened again today.  We had to call a client and advise them that it will be nearly impossible, or at least very expensive to perform a forensic exam of one of their smart phones after the user of the phone, a key executive suspected of misconduct, abruptly resigned.  Why?  Because the device, a newer Apple iPhone, was password protected and …Read More

The FBI vs. Apple Update: Did an “IT Guy” Botch the Initial Attempts to Recover Critical Information from the Terrorist’s iPhone?

A case for not letting your client’s “IT Guy” do forensics… We are now learning that the initial attempts to recover critical evidence from the San Bernardino County terrorist, Syed Rizwan Farook’s iPhone may have been hampered by the ill-advised response of the individuals that initially took custody of the now famous iPhone.  You may recall that the terrorist’s phone was owned by his employer, San Bernardino County.  Apparently his …Read More

Apple Can Help the FBI Crack a Terrorist’s Phone, They Just Won’t Do It

When individual privacy rights and societal good collide Does a dead terrorist’s right to privacy trump our rights to exist in a safe world?  Lofty philosophical question indeed….but not quite as simple as it sounds.  Let’s put the moral debate aside for a moment and examine the technical challenge presented by today’s news that Apple has been ordered by a federal judge to help investigators break into the San Bernadino …Read More

Are Tom Brady’s Text Messages Recoverable?

New England Patriots QB Accused of Destroying Potentially Damning Text Messages Well, I can not resist.  Prepared to just let this story go away, I watched the online debates about just how “recoverable” Brady’s text messages are…and how the NFL apparently believes when one destroys a phone the text messages are destroyed as well.  Now I will somewhat reluctantly add our voice to the “Deflate Gate” conversation.  I hope this …Read More

4Discovery Opens New York Office

Elite Chicago Computer Forensics Firm Expands Footprint. “A Natural Expansion.” For over 12 years, leading Chicago attorneys have turned to 4Discovery’s team of experts to solve some of their most challenging computer forensics issues. Now, New York lawyers will be able to do the same. “This is a very natural expansion for us,” according to 4Discovery partner and co-founder, Jeffrey Hartman. “We serve over 19 of the top 25 law …Read More

Smartphone Apps Pose Risks to User’s Personal Data

4Discovery’s Josh Fazio Appears on WGN’s “Business Lunch” Program You just downloaded a fun looking app on your smart phone.  Minutes later this app sends your user name, email address, and banking passwords to a third party.  The app also notified a variety of advertisers of your exact GPS location.  And to make matters worse, you actually agreed to this. Yes, it’s true, apps downloaded to your smart phone can …Read More

Your Smart Phone is Spying on You!

Smart Phone Apps Can Steal Your Personal Data:  4Discovery’s Josh Fazio Interviewed on CBS News You just downloaded a fun looking app on your smart phone.  Minutes later this app sends your user name, email address, and banking passwords to a third party.  The app also notified a variety of advertisers of your exact GPS location.  And to make matters worse, you actually agreed to this! Yes, it’s true, apps …Read More

It’s 2012, Do You Know Where Your Mobile Devices Are?

Smart Phones Can Leave Behind an Indisputable Digital Trail They are Ubiquitous Think about it…we are with our laptops or computers for 6 or 7 hours per day, but we are with our mobile devices nearly 24 hours per day.  Everywhere we look we see people pecking away at their smart phone keypads.  It is becoming clear that Electronically Stored Information (ESI) from these devices can be a goldmine for …Read More

Top Ten Ways to Protect Your Trade Secrets

Tips from the trenches in light of the recent Ex-Motorola Software Engineer Prison Sentence. Hanjuan Jin, a Motorola Software Engineer, stepped onto the terminal at O’Hare International Airport a few years ago and stepped into history as one of the most notable Trade Secret mis-appropriators of recent times.  Loaded with $30,000 in cash, a one way ticket to China, and a motherload of trade secrets freshly pilfered from Motorola, Jin …Read More