If you happen to be a computer forensic specialist, Nevada and Arizona aren't bad places to land. In today's digital age, computers are the building blocks of almost every aspect of our lives. Nearly every transaction -- and many interactions -- we engage in are recorded electronically. But with the new digital age has come new digital crime, and with new digital crime has come the new digital investigators. Computer forensics consists of preservation, data collection, analysis, reporting and testimony. Make sure you engage an expert that knows how to help you in each of these stages; one who is proactive rather than reactive. A...
ReadThe NFL did not reverse the 4-game suspension associated with accusations surrounding Tom Brady and his potential involvement with deflating of footballs during last season's playoff games. Once announced Brady posted a response on his Facebook page indicating he "replaced his broken Samsung phone with a new iPhone 6 after my attorneys made it clear to the NFL that my actual phone device would not be subjected to investigation under any circumstances." He goes on to state "we turned over detailed pages (paper) of cell phone records and all of the email records and all of the email that Mr. Wells requested"...
ReadMajor Cellular Service Provider Retention Periods Regardless of the nature of the litigation you are involved in, it is common that relevant information isl likely to be on a cellphone of a party on the other side of the litigation. And it may be the only place the data is stored. Depending on the service provider, the period for which the data may be available through them varies greatly. Below is a brief overview *: Verizon ...
ReadBecause of high-tech advances in a new field called cell phone forensics, Phoenix corporations or residents can find themselves unexpectedly relieved of several perplexing predicaments. Here are just a few key examples: If you're in a civil suit and you need to recover a series of old text messages to prove the context of a particular situation or event; If you're concerned about an employee remotely accessing proprietary files and transferring them to an unauthorized location; If you need to recover a text message or a picture that you accidentally deleted; If you suspect your significant other is cheating on you and...
ReadBoston Marathon Acquaintance Sentenced to 2 ½ years for Deleting Computer Records
Aug 5, 2015 at 09:33amShortly after the bombing, a friend of the Boston Marathon bomber deleted his browser history and other electronic evidence when he was being pursued by the feds. Under the Sarbanes-Oxley Act, he was sentenced to 2 ½ years in prison for "destroying, altering and falsifying records, documents, and tangible objects in a federal investigation, specifically information on his computer." Accordingly, be careful when advising someone who is, or is helping someone, engaged in felony behavior. They must be warned that destroying of any evidence, including digital, can be extremely detrimental.
Read