• Home
  • About Me
  • Disclaimer

The Researching Paralegal

~ Articles and Research for Legal Professionals

The Researching Paralegal

Tag Archives: Computer Forensics

Do-It-Yourself E-Discovery? Is There Such A Thing?

08 Sunday Feb 2015

Posted by Celia C. Elwell, RP in Concept Search Tools, Discovery, Document Review, E-Discovery, Emails, Federal Rules of Discovery, Legal Technology, Microsoft Office, Native Format, Outlook, Preservation, Requests for Production, Rule 34

≈ Comments Off on Do-It-Yourself E-Discovery? Is There Such A Thing?

Tags

Ball In Your Court Blog, Computer Forensics, Craig Ball, Discovery, E-Discovery, E-Mail, Evidence, Native Format, PST Files

Do-It-Yourself Digital Discovery, Revisited, by Craig Ball, Ball In Your Court Blog

http://tinyurl.com/ol2urvf

In case you have not noticed, Craig Ball is re-posting older articles, as he explains below. Truly folks, when it comes to e-discovery, when Craig Ball speaks, I listen. Maybe you should too. 

I have posted many of his revisited posts. To find them all, visit his blog, Ball In Your Court at https://ballinyourcourt.wordpress.com/. -CCE

This is the thirteenth in a series revisiting Ball in Your Court columns and posts from the primordial past of e-discovery–updating and critiquing in places, and hopefully restarting a few conversations.  As always, your comments are gratefully solicited.

Do-It-Yourself Digital Discovery [Originally published in Law Technology News, May 2006]

Recently, a West Texas firm received a dozen Microsoft Outlook PST files from a client. Like the dog that caught the car, they weren’t sure what to do next.  Even out on the prairie, they’d heard of online hosting and e-mail analytics, but worried about the cost. They wondered: Did they really need an e-discovery vendor? Couldn’t they just do it themselves?

As a computer forensic examiner, I blanch at the thought of lawyers harvesting data and processing e-mail in native formats. ‘Guard the chain of custody,’ I want to warn. ’Don’t mess up the metadata! Leave this stuff to the experts!’ But the trial lawyer in me wonders how a solo/small firm practitioner in a run-of-the-mill case is supposed to tell a client, ‘Sorry, the courts are closed to you because you can’t afford e-discovery experts.’

Most evidence today is electronic, so curtailing discovery of electronic evidence isn’t an option, and trying to stick with paper is a dead end. We’ve got to deal with electronic evidence in small cases, too. Sometimes, that means doing it yourself.

As a computer forensic examiner, I blanch at the thought of lawyers harvesting data and processing e-mail in native formats. ‘Guard the chain of custody,’ I want to warn. ‘Don’t mess up the metadata! Leave this stuff to the experts!’ But the trial lawyer in me wonders how a solo/small firm practitioner in a run-of-the-mill case is supposed to tell a client, ‘Sorry, the courts are closed to you because you can’t afford e-discovery experts.’

Most evidence today is electronic, so curtailing discovery of electronic evidence isn’t an option, and trying to stick with paper is a dead end. We’ve got to deal with electronic evidence in small cases, too. Sometimes, that means doing it yourself.

The West Texas lawyers sought a way to access and search the Outlook e-mail and attachments in the PSTs. It had to be quick and easy. It had to protect the integrity of the evidence. And it had to be cheap. They wanted what many lawyers will come to see they need: the tools and techniques to stay in touch with the evidence in smaller cases without working through vendors and experts.

What’s a PST?

Microsoft Outlook is the most popular business e-mail and calendaring client, but don’t confuse Outlook with Outlook Express, a simpler application bundled with Windows. Outlook Express stores messages in plain text, by folder name, in files with the extension .DBX. Outlook stores local message data, attachments, folder structure and other information in an encrypted, often-massive database file with the extension .PST. Because the PST file structure is complex, proprietary and poorly documented, some programs have trouble interpreting PSTs.

What About Outlook?

Couldn’t they just load the files in Outlook and search? Many do just that, but there are compelling reasons why Outlook is the wrong choice for an electronic discovery search and review tool, foremost among them being that it doesn’t protect the integrity of the evidence. Outlook changes PST files. Further, Outlook searches are slow, don’t include attachments (but see my concluding comments below) and can’t be run across multiple mail accounts. . . . .

.

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Canvas Fingerprinting – The Online Computer Tracking Device Almost Impossible To Block.

23 Wednesday Jul 2014

Posted by Celia C. Elwell, RP in Computer Forensics, Cybersecurity, Identity Theft, Legal Technology

≈ Comments Off on Canvas Fingerprinting – The Online Computer Tracking Device Almost Impossible To Block.

Tags

AdBlock Plus, AddThis, Canvas Fingerprints, Computer Code, Computer Forensics, Computer Tracking, Julia Angwin, Mashable, Privacy, ProPublica, User Profiles

Meet the Online Tracking Device That is Virtually Impossible to Block, by Julia Angwin, ProPublica

(This story was co-published with Mashable.)

http://tinyurl.com/mbqqrw

Update: After this article was published, YouPorn contacted us to say it had removed AddThis technology from its website, saying that the website was ‘completely unaware that AddThis contained a tracking software that had the potential to jeopardize the privacy of our users.’  A spokeswoman for the German digital marketer Ligatus also said that is no longer running its test of canvas fingerprinting, and that it has no plans to use it in the future.

A new, extremely persistent type of online tracking is shadowing visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.com.

First documented in a forthcoming paper by researchers at Princeton University and KU Leuven University in Belgium, this type of tracking, called canvas fingerprinting, works by instructing the visitor’s Web browser to draw a hidden image. Because each computer draws the image slightly differently, the images can be used to assign each user’s device a number that uniquely identifies it.

*      *     *

Like other tracking tools, canvas fingerprints are used to build profiles of users based on the websites they visit — profiles that shape which ads, news articles, or other types of content are displayed to them.

But fingerprints are unusually hard to block: They can’t be prevented by using standard Web browser privacy settings or using anti-tracking tools such as AdBlock Plus.

The researchers found canvas fingerprinting computer code, primarily written by a company called AddThis, on 5 percent of the top 100,000 websites. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Why Defendant Former Employers Do Not Get Mirror-Image of Plaintiff’s Personal Computer.

30 Monday Jun 2014

Posted by Celia C. Elwell, RP in Computer Forensics, Discovery, E-Discovery, Emails, Employment Law, Evidence, Forensic Evidence, Law Office Management, Legal Technology, Requests for Production, Technology

≈ Comments Off on Why Defendant Former Employers Do Not Get Mirror-Image of Plaintiff’s Personal Computer.

Tags

Bow Tie Law’s Blog, Computer Forensics, Discovery, Employment Litigation, ESI, Joshua Gilliland, Judge James G. Welsh, Proportionality

Proportionality Prevents Mirror Imaging of Family Computers, by Joshua Gilliland, Bow Tie Law’s Blog

http://tinyurl.com/osvw3ws

The Defendants in employment litigation sought the mirror imaging of the Plaintiff’s personal computers three years after she had been terminated. The crux of the eDiscovery centered on the former employee forwarding emails from her supervisors email to her personal account, which the Defendants claimed were lost by the Plaintiff. The Court denied the motion to compel. Downs v. Va. Health Sys., 2014 U.S. Dist. LEXIS 74415, 6-11 (W.D. Va. June 2, 2014).

Judge James G. Welsh did a very nice job of summarizing ESI relevant to a case,proportionality, and the rules for conducting forensic analysis on an opposing party’s hard drive. The Court held the following:

(1) Nothing in the record suggests any willful failure, fault or bad faith by the plaintiff on her discovery obligations that would justify the requested computer forensics examination;

(2) The “mirror-imaging” of the plaintiff’s family computers three years after her termination raises significant issues of confidentiality and privacy;

(3) There was no duty on the part of the plaintiff to preserve her family computers as evidence;

(4) Principles of proportionality direct that the requested discovery is not sufficiently important to warrant the potential burden or expense in this case; and

(5) On the current record that the defendants have failed to justify a broad, and frankly drastic, forensic computer examination of the plaintiff’s two family computers.

Downs, at *9-10, referencing McCurdy Group v. Am. Biomedical Group, Inc., 9 Fed. Appx. 822, 831 (10th Cir. 2001); see also Basile Baumann Prost Cole & Assocs., Inc. v. BBP & Assocs. LLC, 2013 U.S. Dist. LEXIS 51264, *8 (D. Md. Apr. 9, 2013). . . .

 

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Craig Ball Revisits Gigabytes.

15 Wednesday Jan 2014

Posted by Celia C. Elwell, RP in Computer Forensics, Databases, Discovery, E-Discovery, Excel, Legal Technology, Microsoft Office, Word

≈ Comments Off on Craig Ball Revisits Gigabytes.

Tags

Ball in Your Court, Catalyst, Computer Forensics, Craig Ball, Database, Excel, Gigabyte, John Tredennick, Word

Revisiting ‘How Many Documents in a Gigabyte?’, by Craig Ball, Ball In Your Court Blog

http://tinyurl.com/npc3jn3

[I]’m happy to point you to some notable work by my friend, John Tredennick. I’ve known John since the emerging technology was fire and watched with awe and admiration as John transitioned from old-school trial lawyer to visionary forensic technology entrepreneur running e-discovery service provider, Catalyst. John is as close to a Renaissance man as anyone I know in e-discovery, and when John speaks, I listen.

Lately, John Tredennick shared some revealing metrics on the Catalyst blog looking at the relationship between data and document volumes, an update to his 2011 article called, How Many Documents in a Gigabyte?

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...
Follow The Researching Paralegal on WordPress.com

Enter your email address to follow this blog and receive notifications of new posts by email.

Search

Sign In/Register

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Categories

Archives

  • March 2022
  • January 2022
  • November 2021
  • October 2021
  • January 2021
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • June 2020
  • May 2020
  • April 2020
  • January 2020
  • December 2019
  • October 2019
  • August 2019
  • July 2019
  • May 2019
  • March 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013

Recent Comments

Eric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999 on Using Hyperbole -Are You Riski…
How to Treat Bad Cli… on Why Do Bad Clients Deserve The…

Recent Comments

Eric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999 on Using Hyperbole -Are You Riski…
How to Treat Bad Cli… on Why Do Bad Clients Deserve The…
  • RSS - Posts
  • RSS - Comments

Blog at WordPress.com.

  • Follow Following
    • The Researching Paralegal
    • Join 456 other followers
    • Already have a WordPress.com account? Log in now.
    • The Researching Paralegal
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

You must be logged in to post a comment.

    %d bloggers like this: