by Giselle Morales Vehicle Forensics Brings Another Data Source to Light In the Internet of Things, digital forensics has another data source to analyze – your car. Infotainment and telematics systems data is being captured by vehicles.  At a glance, this type of data source may seem exclusively useful in criminal cases or in cases… Read More

by Pete James O-Alerts and the Executive Sometimes, the smallest of artifacts can make a big difference in a case. In the final days of his employment at a start-up tech company, a C-level executive searched through the company’s internal network and downloaded several critical files that contained very sensitive intellectual property. The C-level executive… Read More

Cyberbreach Forensic Analysis

Cyberbreach forensic analysis: Fearing the worst, a major technology company turned to Precision and averted a ransomware attack   Recently, Precision published a client success story in which my Precision Forensics team was called in to help investigate a cyberbreach at a major U.S. technology company. You can read the nicely-produced two-page version of that… Read More

File Wipers: Is All Lost? Not Quite

After my last post on BleachBit I received additional questions about wiped data. Since many of our investigations involve deleted data, the question often turns to proving or disproving spoliation, the destruction of evidence. On a Windows system, when a file is deleted with the delete button, it is placed in the Recycle Bin where… Read More

By Pete James, Managing Director, Computer Forensics at Precision Discovery, Inc. It’s not often that computer forensics enters the discourse of presidential politics, but if you’ve been paying attention to the race, you may have heard mention of BleachBit, a tool that reportedly was used to delete email files from Hillary Clinton’s email server. Several… Read More

Facts About Internal Intellectual Property Theft

70% of Intellectual Property (IP) theft happens in the 30 days before an employee announces their resignation.i, ii Employees have admitted to stealing customer contact lists and emails, customer data, internal human resources and employee records, marketing data, and business and financial information. And the main reason an employee does this is to help them… Read More

ESI, Electronic Discovery and Computer Forensics

Once a Litigation Hold has been issued, both parties in a legal matter or investigation are, of course, prohibited from destroying any documents or electronically stored information (ESI) that might be pertinent to the matter at hand. Still, ESI does have an uncanny knack for disappearing. It isn’t always a deliberate attempt to destroy evidence;… Read More

Understanding the insider threat to information security - Part II

Part 2: An expert’s perspective In the first of this two-part series, we discussed the threat that malicious insiders – often employees who are tendering their resignations – pose to your most valuable information assets. In this second installment, Pete James, a digital forensics examiner and expert in Intellectual Property theft with more than 25… Read More

IP Theft – Understanding The Insider Threat To Information Security

Part 1: How an e-discovery firm can help prevent the theft of your most valuable information assets In this, the first of a two-part series, we’ll discuss the threat that malicious insiders – often employees who are tendering their resignations – pose to your most valuable information assets. Your company has undoubtedly invested significant time,… Read More