Quantcast
Channel: Legal – Forensic Focus – Articles
Browsing latest articles
Browse All 26 View Live

Image may be NSFW.
Clik here to view.

Overcoming Potential Legal Challenges to the Authentication of Social Media...

By John Patzakis1 Summary: Social media evidence is highly relevant to most legal disputes and broadly discoverable, but challenges lie in evidentiary authentication without best practices technology...

View Article


Image may be NSFW.
Clik here to view.

689 Published Cases Involving Social Media Evidence (with full case listing)

The torrent of social media evidence continues to grow. In November 2011 we, at X1 Discovery, searched online legal databases of state and federal court decisions across the United States to identify...

View Article


Image may be NSFW.
Clik here to view.

Key Twitter and Facebook Metadata Fields Forensic Investigators Need to be...

Authentication of social media evidence can present significant challenges when you collect by screen shots, printouts or raw html feeds from an archive tool. This is just one reason why social media...

View Article

Image may be NSFW.
Clik here to view.

Authenticating Internet Web Pages as Evidence: a New Approach

By John Patzakis [1] and Brent Botta [2] Previously, in Forensic Focus, we addressed the issue of evidentiary authentication of social media data (see previous entries here and here). General Internet...

View Article

Image may be NSFW.
Clik here to view.

Unacceptable Acceptable Use Policy

Official Secrets Act warning sign on quayside at Crouch Corner, Foulness, Essex (Photo credit: Wikipedia) I had an opportunity this week to be on the receiving end of an acceptable use policy (AUP) –...

View Article


Image may be NSFW.
Clik here to view.

Windows 8: Important Considerations for Computer Forensics and Electronic...

Introduction Documents identified by computer forensic investigations in civil litigation typically require review and analysis by attorneys to determine if the uncovered evidence could support causes...

View Article

Image may be NSFW.
Clik here to view.

Samsung Galaxy Android 4.3 Jelly Bean acquisition using Joint Test Action...

There have been some issues during data acquisitions with Samsung Galaxy having the Android 4.3, Jelly Bean as the operating system even if using the recommended steps for Logical File Dump, File...

View Article

Image may be NSFW.
Clik here to view.

DFRWS Europe 2014 Annual Conference – Recap

This article is a recap of some of the main highlights of the Digital Forensics Research Workshop (DFRWS) held in Amsterdam from the 7th – 9th of May; over the next few weeks we will also be bringing...

View Article


Image may be NSFW.
Clik here to view.

Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers...

Abstract The primary goal of this paper is to raise awareness regarding legal loopholes and enabling technologies, which facilitate acts of cyber crime. In perusing these avenues of inquiry, the author...

View Article


Image may be NSFW.
Clik here to view.

Who Is Spying On Android Users, Why Do They Do It And What Are They Doing...

If you’ve been following the news, you may already know about the many cases where companies, big and small, were caught spying on their users. It might appear that just about everyone making a phone...

View Article

Law Enforcement Professionals Need to Evaluate Digital Forensics Practices...

by L.E. “Ted” Wilson There is a fascinating constitutional showdown brewing in the U.S. that will have significant implications for how our law enforcement agencies are able to conduct digital...

View Article

From Crime To Court: Review Principles For UK Disclosure

by Hans Henseler UK Law Enforcement agencies are facing significant challenges related to digital evidence disclosure in criminal prosecution cases. Suspects who are charged with a crime must have...

View Article

Image may be NSFW.
Clik here to view.

Can Your Investigation Interpret Emoji?

by Christa Miller, Forensic Focus Emoji are everywhere — including in your evidence. Used across private-messaging apps and email, social media, and even in passwords and account names, emoji are...

View Article


Image may be NSFW.
Clik here to view.

Forensic Focus Legal Update December 2019 – Part I

by Christa Miller  In cooperation with the National White Collar Crime Center (NW3C) and SEARCH, The National Consortium for Justice Information and Statistics, Forensic Focus is proud to offer a...

View Article

Forensic Focus Legal Update December 2019 – Part II: Search And Seizure

by Christa Miller In cooperation with the National White Collar Crime Center (NW3C) and SEARCH, The National Consortium for Justice Information and Statistics, Forensic Focus offers a quarterly roundup...

View Article

Browsing latest articles
Browse All 26 View Live