Many file types can be identified by using what’s known as a file header. A file header is a ‘signature’ placed at the beginning of a file, so the operating system and other software know what to do with the following contents. Many electronic discovery applications...read more
To recover deleted files, user activity logs, Internet history, and other potentially relevant custodian information, a 'physical' copy or forensic image of the hard drive or other media is required. Creating a physical copy or forensic image preserves the entire...read more
It often comes as a shock to attorneys and their staff when they hear that electronic discovery processing doesn't automatically search the entire contents of a custodian’s hard drive. So, it’s worth stating again for emphasis here. Common electronic discovery...read more
In my last post, I pointed out that in the case of the BTK killer in Kansas, investigators recovered a deleted Microsoft Office document that contained evidence crucial to the case. There are still many litigation support professionals who don't thoroughly understand...read more
Many are familiar with Dennis Rader, who became known as the BTK Killer or the BTK Strangler. Ten victims were identified from 1974 through 1991 as having been murdered by Dennis. During this time frame, Dennis provided details related to the murders in letters that...read more
A client asked me if it was possible to determine if a custodian did copy files from their server to an external USB flash drive. The USB drive isn't available, so they wanted to know if Microsoft Windows tracks where files are copied. Now, you would think that with...read more
Get in Touch with Us
Schedule a FREE demonstration or ask any question. We’d be happy to help.