Go to Top

Tag Archives

Tag Archives: mobile

Join us in Indianapolis for a special Trade Secret Protection CLE event

Want to learn how to help your clients protect their trade secrets? JOIN US FOR A VERY SPECIAL CLE EVENT: Trade Secret Protection – Using Technology to Safeguard Your Most Valuable Assets When? Wednesday, February 7, 2018 Where? The Columbia Club, Capehart / Riley / Steel Room, 121 Monument Circle, Indianapolis, IN, 46204 5:00PM: Gathering, Networking, Cocktails & Hors d’oeuvres 5:30-6:30PM: CLE Presentation, Q&A ATTENDEES ARE ELIGIBLE FOR ONE GENERAL CLE …Read More

Join us for a very special CLE presentation on Trade Secret Protection

CONSIDER THE STATISTICS Trade secret theft is at an all-time high. Businesses of all sizes face serious risks to their bottom line, competitive position, and even survival. Lawyers face an increasingly complex landscape when it comes to counseling their clients on trade secret protection in our digital world. Up to $480 billion in business losses were attributed to trade secret misappropriation last year 50% of employees that left their jobs in …Read More

School’s Failure to Preserve Snapchat Messages Can Result in Potential Spoliation Claim

Was School Counselor Deliberately Indifferent? BACKGROUND SCENARIO After weeks of receiving mean and threatening Snapchat messages from fellow students, a seventh-grader (we’ll call her Maggie) finally went to her school counselor for help. Maggie showed her counselor some of the messages on her iPhone and the counselor agreed to “look into it”. In addition, the counselor took photos of several of the bullying text messages from Maggie’s phone with her …Read More

Snapchat Selfies Show a Distracted Driver at the Time of His Fatal Car Crash

Think Snapchat photos disappear immediately? Not necessarily. A TRAGIC STORY FROM AN ACTUAL 4DISCOVERY CASE STUDY A young driver cruising down the highway apparently did not see a truck backing out of a driveway onto the roadway in front of him. The driver (we’ll call him Tom) violently collided with the truck and was killed instantly. Why didn’t Tom see the truck? Naturally, litigation ensues and a multi-million dollar payment …Read More

Join Us for a Very Special Webcast – Ransomware & Cyber Crime: Is Your Business Prepared for an Attack?

Join 4Discovery, Bellas & Wachowski, and Gasperini Insurance Agency, Inc. for a LIVE WEBCAST as they address the important and growing business risks of cyber crime and ransomware. RANSOMWARE AND CYBER CRIME: IS YOUR BUSINESS PREPARED FOR AN ATTACK? WEDNESDAY, AUGUST 23, 2017, 12PM-1PM ATTENDEES ARE ELIGIBLE FOR ONE CLE CREDIT! CLICK HERE TO RESERVE YOUR SPOT TODAY! RANSOMWARE CONTINUES TO PERSIST AS A SIGNIFICANT BUSINESS RISK AND THE STAKES ARE …Read More

Mobile Phone Metadata Proves Insurance Claim for $32K Rolex was Fraud

An inconvenient truth: Photo of “stolen” Rolex was taken 8 days after the alleged theft   The background One of our recent mobile phone forensics cases illustrates how photo metadata can be an important source of evidence in a wide-array of matters, including insurance fraud cases. The fraudster (let’s call him “Jim”) filed a claim with his insurance company, alleging that his $32K Rolex was stolen from him when he …Read More

How Secure is the Data on Your Mobile Phone?

CBS Chicago News Reporter Dorothy Tucker Interviews 4Discovery’s Jared Sikorski to Find Out   A Startling Scenario You come home from a late night dinner to discover that your home has been burglarized. Fortunately, the police have arrested the suspects after observing them driving erratically with your wide-screen television in their back seat. A lucky break. While interrogating the criminals, police learn that the bad guys entered your home through your …Read More

Is Your Data Secure In Our ‘Internet Of Things’ World?

Think Halloween is scary?  How about a hacker shutting down your pacemaker? The Chief Information Security Officer of the Year Award Breakfast is always a great opportunity to learn more about what is keeping elite CISOs up at night.  The annual event brings together a who’s who of the most talented information security executives from America’s best companies.  This year’s program was no exception, and we were honored to be …Read More

Hillary Clinton’s eMail Drama: Tips From the Trenches

I am in the digital forensics business.  That means that when something related to eMail or computer evidence is in the news, my friends and family ask me questions, like:  “are Tom Brady’s destroyed “DeflateGate” text messages recoverable?”, and “could you recover data from the submerged mobile phones from missing Malaysian Airlines Flight 370 if it was ever recovered?”  So, I get used to these questions.  It’s kind of fun. …Read More

An Executive Resigns: Misconduct Suspected, Employer Cannot Access Evidence on His Mobile Phone

“Sorry…You Are Locked Out of Your Own Data” Well, it happened again today.  We had to call a client and advise them that it will be nearly impossible, or at least very expensive to perform a forensic exam of one of their smart phones after the user of the phone, a key executive suspected of misconduct, abruptly resigned.  Why?  Because the device, a newer Apple iPhone, was password protected and …Read More