With the increase in the popularity of e-discovery and computer forensics matters, including paper discovery, please feel free to post your questions here. Detailed, industry information available!
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Maccomb said:I've heard that software has been developed that makes shredding documents redundant, even if it's confetti, yet businesses and governments continue to do this. Is it a question of volume?
A computer hardrive can have data recovered even from low level formatting by analysis of track peaks and valleys illustrated by oscilliscope (old process). How much interpretation goes into this? What distinguishes the "layers" of overwritten data tracks?
Different levels of policing agencies use different approaches to data recovery/interception. One method is a hard "punch" that recovers all trace data, but destroys the original evidence (ie the hardrive). Would the extracted data be admissable in court if the original is destroyed? How does the defense question the original or quality of the extraction in this case? (the "punch" method may have been retired by now
In-line data interception has evolved to an almost absolute, yet with identity theft and mirror registry, how can the originator be proven absolute?
If spyware (ie Spectre) is installed on an owners computer by a spouse, friend, business competitor or their computer agent, does this act have legal consequences if discovered?
I WOULD LOVE TO HEAR THE ANSWER TO THIS QUESTION..AND ALSO TO THE QUESTION... :"IS THERE ANY WAY THAT YOU CAN DETECT IF ANYONE HAS HACKED INTO YOUR COMPUTER?" THANKS. RS58I've heard that software has been developed that makes shredding documents redundant, even if it's confetti, yet businesses and governments continue to do this. Is it a question of volume?
A computer hardrive can have data recovered even from low level formatting by analysis of track peaks and valleys illustrated by oscilliscope (old process). How much interpretation goes into this? What distinguishes the "layers" of overwritten data tracks?
Different levels of policing agencies use different approaches to data recovery/interception. One method is a hard "punch" that recovers all trace data, but destroys the original evidence (ie the hardrive). Would the extracted data be admissable in court if the original is destroyed? How does the defense question the original or quality of the extraction in this case? (the "punch" method may have been retired by now
In-line data interception has evolved to an almost absolute, yet with identity theft and mirror registry, how can the originator be proven absolute?
If spyware (ie Spectre) is installed on an owners computer by a spouse, friend, business competitor or their computer agent, does this act have legal consequences if discovered?
Not sure what you mean here. If you've got several bags of confetti, someone has to piece it together! The software can only do so much.I've heard that software has been developed that makes shredding documents redundant, even if it's confetti, yet businesses and governments continue to do this. Is it a question of volume?
This is not always possible. This is also a very expensive process and if you are looking for a few documents on a hard drive that contained many thousands, it can be a hopeless task.A computer hardrive can have data recovered even from low level formatting by analysis of track peaks and valleys illustrated by oscilliscope (old process). How much interpretation goes into this? What distinguishes the "layers" of overwritten data tracks?
Yes - extracted data can be admissible from my knowledge. Sometimes a neutral party is appointed by the court as the electronic evidence expert (also known as a "special master") who may certify a process. The defense will question the validity in the same way that it might challenge DNA evidence and it's really no different, just a different medium.Different levels of policing agencies use different approaches to data recovery/interception. One method is a hard "punch" that recovers all trace data, but destroys the original evidence (ie the hardrive). Would the extracted data be admissable in court if the original is destroyed? How does the defense question the original or quality of the extraction in this case? (the "punch" method may have been retired by now![]()
Yes - there are an increasing number of rulings about spouses spying on each other. I'll post one.In-line data interception has evolved to an almost absolute, yet with identity theft and mirror registry, how can the originator be proven absolute?
If spyware (ie Spectre) is installed on an owners computer by a spouse, friend, business competitor or their computer agent, does this act have legal consequences if discovered?
With the increase in the popularity of e-discovery and computer forensics matters, including paper discovery, please feel free to post your questions here. Detailed, industry information available!