Go to Top

Tag Archives

Tag Archives: Social Media

Phishing Update: The Bad Guys Are Getting More Sophisticated – And Losses Are Way Up

More Bad News…Your Loss From Phishing Fraud May Not Be Covered By Insurance Phishing scams are not new, but losses from these social engineering ploys are increasing dramatically as the fraudsters become more convincing in their techniques.  Indeed, this was one of the primary themes of this year’s Net Diligence Cyber Insurance conference in Santa Monica, California. It’s Getting Ugly Out There… The FBI estimates phishing attacks have cost organizations …Read More

Social Media and E-Discovery CLE Offering

Schedule Your Next CLE Event With 4Discovery! Bringing electronic discovery knowledge to you… Looking for a convenient way to complete your mandatory CLE requirements? Would you like to achieve CLE credits in the convenience of your office? Concerned about compliance with rapidly changing electronic discovery technology? 4Discovery provides on-site CLE programs in the convenience of your law firm’s conference room… Who?  Any attorneys handling cases in which social media content …Read More

Retweet Case Raises Free Speech Debate

Can a person be held criminally responsible for “Retweeting” another person’s content, or is such communication protected under The First Amendment’s “Free Speech” language? Communication in our electronic world is bending a number of legal concepts into strange new shapes. Consider Safya Roe Yassin, a 39-year-old citizen that was recently arrested for conspiracy and transmitting threats over state lines.  Her alleged crime?  Retweeting twitter posts from a third party that …Read More

Social Media eDiscovery CLE Event

Join us for a special CLE event! Social media has surpassed email as the communication vehicle of choice for millions of people. Individuals and businesses create vast amounts of online content daily, and some of this electronic evidence may be relevant to your next case. Join the experts at 4Discovery as we examine the issues related to investigating, capturing, and producing this potentially critical source of Electronically Stored Information. Is …Read More

Was “El Chapo” Felled by Mobile Device Metadata?

A Stark Reminder That Your Smart Phone is Spying on You Vanity plus a large ego plus technological ignorance equals disaster.  While there is no confirmation that Joaquin “El Chapo” Guzman’s interview with Sean Penn ultimately led to the fugitive’s arrest last week, many of us in the digital forensics world are speculating that his unintended digital footprint did, in fact, lead to his demise. Could it be that digital …Read More

How Do You Investigate Foreign Corrupt Practices Act Crimes? Examine the Digital Evidence!

Law Bulletin Publishing Company’s FCPA Conference Highlights a Study of the Alstom $772 Million Criminal Penalty Case.  Where was the smoking gun?  In the Emails. As usual, the Law Bulletin Publishing Company’s Annual White Collar Crime and Corporate Governance Seminar in Chicago was outstanding, and featured panelists including Dan Webb and other elite Chicago attorneys.  This year’s program provided insight into the recent FCPA conviction of Alstom S.A., the French …Read More

4Discovery to Co-Sponsor the John Marshall Law School 2015 Journal of Information Technology and Privacy Law (JITPL) Symposium on April 10.

Annual Event Will Focus on Data Breach Issues, BYOD, Social Media in the Law, and More. 4Discovery is pleased to be one of the sponsors of this year’s JITPL Symposium at the John Marshall Law School on April 10, 2015. The symposium will bring practitioners, scholars, advocates and policy makers together to participate in an academic discussion about the law, policy, and implementation of legal protections for data management.  Sessions …Read More

4Discovery and CES Selected to Conduct Homeland Security Training

State of Vermont Division of Emergency Management and Homeland Security and CRA Selects Team Consisting of Experts from 4Discovery and CES In today’s world, the critical evidence required to investigate criminal or terrorist activity is increasingly found on laptops, tablets, smart phones, and social media.  Given that, when the State of Vermont with contractor CRA, selected a team to train a group of their Homeland Security officers recently, they turned …Read More

Tweets: An Important New Source of Electronic Evidence

Computer Forensics Firms Are Helping Attorneys Preserve and Produce This Increasingly Critical ESI The Scenario The Tweet goes out… chip maker Audience is “being investigated by the DOJ on a rumored fraud.”  The result?  The shares of Audience plunge over 25% in a mere few seconds.  The payoff?  Potentially hundreds of thousands of dollars in profits for short sellers.  The problem?   The Tweet was a complete hoax, sent by an …Read More

Smartphone Forensics: 10 Tips From The E-Discovery Trenches

Law360, New York (June 19, 2014, 9:59 AM ET) — A real case study: The principal of a Chicago-area school had been accused of engaging in an inappropriate relationship with a student. The student produced a suggestive text message that she alleged had been sent to her by the principal, who denied sending it. Lawyers for the school district were granted a motion to perform a computer forensics analysis of …Read More