RevForensics.com October 11, 2017

Size: px
Start display at page:

Download "RevForensics.com October 11, 2017"

Transcription

1 October 11, 2017 AT&T Mobility National Court Order Compliance US Highway 1, Suite 600 North Palm Beach, FL (800) Fax (888) Dear Sir or Ma am, I am conducting an investigation and have identified the phone number as likely being pertinent to this case. Per 18 USC 2703, I am requesting AT&T Mobility preserve the records for the phone number , to include the following: 1. Subscriber information for the number including by way of example and not limitation: a. Subscriber Name b. Subscriber Address c. Identifying information such as date of birth, driver s license number, and/or social security number d. Subscriber contact information including addresses and contact phone numbers 2. Billing and credit information for the phone number including by way of example and not limitation: a. Method and source of payment information including credit card numbers, electronic funds transfers, and locations of cash payments b. Credit information including any credit report run by the provider prior to the authorizing service 3. Service information for the phone number including by example and not limitation: a. Purchase and activation location b. Types of service subscribed to c. Additional phone numbers associated with the same account d. Make, model, and serial numbers (ESN, IMEI, MEID) of the phone(s) associated with the account 4. Call Detail Records for the wireless number for the days of 06/01/2015 to 07/01/2015, Eastern Time, including: a. Cellular calls, b. SMS/MMS messages c. Data communication d. Tower locations (LAC/CID) and azimuth for the sectors accessed during the communication 5. Any data in the AT&T cloud services associated with the wireless number , including by way of example and not limitation a. SMS, MMS, b. s communications 6. Location of the phone with the wireless number using Network Event Location System (NELOS) and Mobile Locator Tool data including reliability factors for the communication for the days of 06/01/2015 to 07/01/2015, Eastern Time. 7. Voice Mail Messages including content

2 8. A detailed definitions page which identifies all information in the records I will follow up with a court order or subpoena as needed. Thank you for your assistance. Sincerely, Benjamin Bierce Revelation Cellular Forensics LLC ben@revforensics.com

3 Notes for Preparing the Legal Demand AT&T maintains records for the following periods o Cell sites for voice, text, and data back to July 2008 o NELOS, about 30 days o They do not store the content of text messages at all AT&T will supply the records with cell tower information from a subpoena, but a court order will result in a quicker turnaround. Be sure to request the records in digital format, specifically in.txt format, on a CD with the preparer s signature on it and a notarized copy of the Affidavit of Custodian of Records. AT&T provides digital records in PDF format by default, but will provide them in.txt format upon request. For analysis, I much prefer the.txt format. Request at least 30 days of records if you can justify it. A month of records is a large enough sample to establish calling patterns to identify the most frequently called numbers. Get more if you can. The larger the sample, the better the analysis. The following is the text I place in the notes of the fax coversheet o This is in reference case number xxx. Please provide the information in.txt format. Please the records to me so I can begin working on them immediately. For court purposes, I need a certified copy as well. Please provide all the records along with the cell site locations in a single disc, and have the custodian of records sign his or her name on the disc. Please complete the Affidavit of Custodian of Records and return the original copy with the records. The information may be mailed to: If you are having Revelation Cellular Forensics conduct the analysis you may want to include text like the following: o Benjamin Bierce of Revelation Cellular Forensics, LLC will be conducting the analysis of these records. I respectfully request you allow Mr. Bierce to contact you directly with any questions concerning these records.

4 February 1, 2019 Sprint Corporation Security & Subpoena Compliance 6480 Sprint Parkway MS: KSOPHM0216 Overland Park, KS (800) Fax (816) Dear Sir or Ma am, I am conducting an investigation and have identified the phone number as likely being pertinent to this case. Per 18 USC 2703, I am requesting Sprint Corporation preserve the records for the phone number , to include the following: 1. Subscriber information (Expanded) for the number including by way of example and not limitation: a. Subscriber Name b. Subscriber Address c. Identifying information such as date of birth, driver s license number, and/or social security number d. Subscriber contact information including addresses and contact phone numbers 2. Billing and credit information (Payment Information) for the phone number including by way of example and not limitation: a. Method and source of payment information including credit card numbers, electronic funds transfers, and locations of cash payments b. Credit information including any credit report run by the provider prior to the authorizing service 3. Service information for the phone number including by example and not limitation: a. Purchase and activation location b. Types of service subscribed to c. Additional phone numbers associated with the same account d. Make, model, and serial numbers (ESN, IMEI, MEID) of the phone(s) associated with the account

5 4. Call Detail Records for the wireless number for the days of 07/01/2015 to 08/01/2015, Eastern Time, including by example and not limitation: a. Cellular calls (Call Detail Records with Cell Site Location) b. SMS/MMS messages c. Data communication (IPDR w/ Cell Site, Web Site Address Report) d. Tower locations (NEID, Cell Number, Sector Number, enode) and azimuth for the sectors accessed during the communication 5. Voice Mail Messages including content (Stored Voice Mail Reproduction) 6. PCMD (Per Call Measurement Data) for the cellular phone number for the days of 07/01/2015 to 08/01/2015, Eastern Time, to include reliability factors for the communication 7. A detailed definitions page which identifies all information in the records I will follow up with a court order or subpoena as needed. Thank you for your assistance. Sincerely, Benjamin Bierce Revelation Cellular Forensics LLC ben@revforensics.com

6 Notes for Preparing the Legal Demand Sprint maintains records for the following periods o Cell sites for voice only for 18 to 24 months o No cell sites for text messages or data o They do not store the content of text messages at all o PCMD (Per Call Measurement Data) is stored for 14 days Sprint requires a court order to produce the records. Be sure to request the records in digital format on a CD with the preparer s signature on it and a notarized copy of the Affidavit of Custodian of Records. Sprint provides the records in Microsoft Excel format. A spreadsheet containing all the Sprint cell sites is necessary for the analysis, and Sprint is inconsistent about sending them. Follow up contact may be necessary but no additional legal demand would be needed. Request at least 30 days of records if you can justify it. A month of records is a large enough sample to establish calling patterns to identify the most frequently called numbers. Get more if you can. The larger the sample, the better the analysis. The following is the text I place in the notes of the fax coversheet: o This is in reference case number xxx. Please provide the information in digital format, either in Microsoft Excel, or a format that could be exported to Excel. If you provide the information in a format other than Excel please provide instructions to export to excel. Please the records to me so I can begin working on them immediately. For court purposes I need a certified copy as well. Please provide all the records along with the cell site locations in a single disc, and have the custodian of records sign his or her name on the disc. Please complete the Affidavit of Custodian of Records and return the original copy with the records. The information may be mailed to: If you are having Bierce Associates conduct the analysis you may want to include text similar to the following: o Benjamin Bierce of Revelation Cellular Forensics, LLC will be conducting the analysis of these records. I respectfully request you allow Mr. Bierce to contact you directly with any questions concerning these records.

7 October 11, 2017 T-Mobile, USA Law Enforcement Relations 4 Sylvan Parsippany, NJ (973) Fax (973) Dear Sir or Ma am, I am conducting an investigation in a civil case and have identified the phone number as likely being pertinent to this case. Per 18 USC 2703, I am requesting T-Mobile, USA preserve the records for the phone number , to include the following: 8. Subscriber information for the number including by way of example and not limitation: a. Subscriber Name b. Subscriber Address c. Identifying information such as date of birth, driver s license number, and/or social security number d. Subscriber contact information including addresses and contact phone numbers 9. Billing and credit information for the phone number including by way of example and not limitation: a. Method and source of payment information including credit card numbers, electronic funds transfers, and locations of cash payments b. Credit information including any credit report run by the provider prior to the authorizing service 10. Service information for the phone number including by example and not limitation: a. Purchase and activation location b. Types of service subscribed to c. Additional phone numbers associated with the same account d. Make, model, and serial numbers (ESN, IMEI, MEID) of the phone(s) associated with the account

8 11. Call Detail Records for the wireless number for the days of 1/1/2015 to2/1/2015, Eastern Time, including: a. Cellular calls, b. SMS/MMS messages c. Data communication d. Tower locations (LAC/CID) and azimuth for the sectors accessed during the communication 12. A list of all T-Mobile cell towers with latitude, longitude, address, and sector directions and beam widths 13. Voice Mail Messages and Text Messages including content 14. A detailed definitions page which identifies all information in the records 15. Please provide records in Eastern Time I will follow up with a search warrant as needed. Thank you for your assistance. Sincerely, Benjamin Bierce Revelation Cellular Forensics LLC ben@revforensics.com

9 Notes for Preparing the Legal Demand T-Mobile maintains records for the following periods o Cell sites for voice and text, 2 years o No cell sites for or data o They do not store the content of text messages at all T-Mobile requires a court order to produce the records. Be sure to request the records in digital format on a CD with the preparer s signature on it and a notarized copy of the Affidavit of Custodian of Records. T-Mobile provides the records in Microsoft Excel format. A spreadsheet containing all the T-Mobile cell sites is necessary for the analysis, and T-Mobile is inconsistent about sending them. Follow up contact may be necessary but no additional legal demand would be needed. Request at least 30 days of records if you can justify it. A month of records is a large enough sample to establish calling patterns to identify the most frequently called numbers. Get more if you can. The larger the sample, the better the analysis. The following is the text I place in the notes of the fax coversheet: o This is in reference case number xxx. Please provide the information in digital format, either in Microsoft Excel, or a format that could be exported to Excel. If you provide the information in a format other than Excel please provide instructions to export to excel. Please the records to me so I can begin working on them immediately. For court purposes I need a certified copy as well. Please provide all the records along with the cell site locations in a single disc, and have the custodian of records sign his or her name on the disc. Please complete the Affidavit of Custodian of Records and return the original copy with the records. The information may be mailed to: If you are having Bierce Associates conduct the analysis you may want to include text similar to the following: o Benjamin Bierce of Revelation Cellular Forensics, LLC will be conducting the analysis of these records. I respectfully request you allow Mr. Bierce to contact you directly with any questions concerning these records.

10 August 1, 2015 Verizon Wireless Law Enforcement Resource Team 180 Washington Valley Rd. Bedminster, NJ (800) Fax (888) Dear Sir or Ma am, I am conducting an investigation in a civil case and have identified the phone number as likely being pertinent to this case. Per 18 USC 2703, I am requesting Verizon Wireless preserve the records for the phone number , to include the following: 16. Subscriber information for the number including by way of example and not limitation: a. Subscriber Name b. Subscriber Address c. Identifying information such as date of birth, driver s license number, and/or social security number d. Subscriber contact information including addresses and contact phone numbers 17. Billing and credit information for the phone number including by way of example and not limitation: a. Method and source of payment information including credit card numbers, electronic funds transfers, and locations of cash payments b. Credit information including any credit report run by the provider prior to the authorizing service c. Payment Activity d. Payment History e. Auto Bill Copy 18. Service information for the phone number including by example and not limitation: a. Purchase and activation location b. Activation/Deactivation Dates c. Types of service subscribed to

11 d. Additional phone numbers associated with the same account (Other Numbers on Account) e. Make, model, and serial numbers (ESN, IMEI, MEID) of the phone(s) associated with the account (Device ID) 19. Call Detail Records for the wireless number for the days of 06/01/2015 to 07/01/2015, Eastern Time including: a. Cellular calls, (Cell-Site Incoming, Outgoing) b. SMS/MMS messages (Historical MMS Detail, Text Message Detail, Auto Text Message Content, Auto Picture Content, Picture content, Auto Picture Detail, Picture Message Detail) c. Data communication (IP Destination, IP Session) d. Tower locations (Switch/Element, Cell Numbers, Sector Numbers) and azimuth for the sectors accessed during the communication 20. Voic Messages including content (Voic Password Reset) 21. RTT (Round Trip Time) for the cellular phone number for the days of 06/01/2015 to 07/01/2015, Eastern Time, to include reliability factors for the communication 22. Any data in the Verizon cloud services associated with the wireless number , including by way of example and not limitation a. SMS, MMS, b. s communications 23. A detailed definitions page which identifies all information in the records I will follow up with a search warrant as needed. Thank you for your assistance. Sincerely, Benjamin Bierce Revelation Cellular Forensics LLC ben@revforensics.com

12 Notes for Preparing the Legal Demand Verizon maintains records for the following periods o Cell sites for voice only for 12 months o No cell sites for text messages or data o They do the content of text messages for 7 days o RTT (Round Trip Time) is stored for 7 days Verizon will honor a subpoena, but a court order will result in a faster return. Be sure to request the records in digital format on a CD with the preparer s signature on it and a notarized copy of the Affidavit of Custodian of Records. Verizon provides the records in Microsoft Excel (.csv) format. Request at least 30 days of records if you can justify it. A month of records is a large enough sample to establish calling patterns to identify the most frequently called numbers. Get more if you can. The larger the sample, the better the analysis. The following is the text I place in the notes of the fax coversheet: o This is in reference case number xxx. Please provide the information in digital format, either in Microsoft Excel, or a format that could be exported to Excel. If you provide the information in a format other than Excel please provide instructions to export to excel. Please the records to me so I can begin working on them immediately. For court purposes I need a certified copy as well. Please provide all the records along with the cell site locations in a single disc, and have the custodian of records sign his or her name on the disc. Please complete the Affidavit of Custodian of Records and return the original copy with the records. The information may be mailed to: If you are having Bierce Associates conduct the analysis you may want to include text similar to the following in a cover sheet or memo: o Benjamin Bierce of Revelation Cellular Forensics, LLC will be conducting the analysis of these records. I respectfully request you allow Mr. Bierce to contact you directly with any questions concerning these records.

13 March 3, 2019 Opposition Name Street Address City, State Zip Code Phone Number Demand for Preservation of Cell Phone Plaintiffs or Defendants demand that you preserve all electronically stored information on your cell phone potentially relevant to the issues in this cause. As used in this document, you and your refers to name of opposition. You should anticipate that much of the information subject to this disclosure or responsive to discovery in this matter is stored on your current and former cell phone(s). Electronically stored information (hereinafter ESI ) should be afforded the broadest possible definition and include, by way of example and not as an exclusive list, potentially relevant information electronically stored on a cell phone as: Contacts A listing of the device s contacts such as name, address, phone number, address, and other contact information. This information can be user generated in a contacts application or can be documentation of a user s contacts through other applications such as social media applications. Calendar Items the user documented in the calendar application such as meetings, events, or birthdays. Items in the calendar can also be generated by other applications such as a scheduling application. Notes Applications allowing the user to enter notes or memos, either text or voice. Call logs Records of phone calls made, received, or missed. These records can come from the phone s native voice communication application or a third-party application through a third-party application. User Dictionaries Smart phones contain dictionaries of words used by the user that aren t in the phone s native dictionary. The feature works in conjunction with the messaging applications to autocomplete words typed in messages or make suggestions. These dictionaries contain slang, jargon, or misspelled words commonly used by the user, which could assist an examiner during keyword searches. User Accounts Information about the user of the phone such as addresses, user names, and associated accounts. The user account information is useful in identifying

14 other web based services or cloud storage accounts that may hold information relevant to the case. Web Browser Data This includes bookmarks and web history. Book marks are links to websites that are saved by default or entered by the user to provide easier access to these websites. Web browser history is documentation of websites visited. Messages This includes Short Message Service (SMS) messages, Multimedia Message Service (MMS), Apple imessage, instant messages, and chat messages. Through the device s native messaging application as well as third-party applications, a user can send and receive messages containing text, audio, video, and photos. Most smart phones have the ability to capture screenshots of what is displayed on the screen and save it as an image. Screenshot images of messages are commonly found on mobile devices. Smart phones have the ability to sync a user s accounts to the mobile device through applications or the web browser. The phone may contain these s. Audio Files Smart phones can store audio files including, but not limited to, voic , music, and audio recordings using the recording function of the phone. Documents Documents such as word processing files, PDF files, and spreadsheets which can be saved to a device. Applications Applications are types of software designed to run on a mobile device, such as a smartphone or tablet. Mobile applications frequently serve to provide users with similar services to those accessed on PCs. Some application types are social media, shopping, and games. These applications can contain communication information, or information about what the user was doing at a certain time. Location information This includes Global Positioning System (GPS) information associates with the metadata in photos, videos, and application databases. This information can also come from cell sites and WiFi networks. Additionally, the GPS function of the phone may include relevant items such as maps, tracks, waypoints, routes, saved locations, favorites, user favorites such as home, recent destinations, city and state history, contact addresses, points of interest, and last GPS fix. Photos Images stored on the phone s or external storage. This includes images captured by the phone s cameras, send and received in messages, downloaded, transferred from other devices, screenshots, and other images created on the phone. Images the user took of him or herself, commonly called selfies, are commonly found on phones. These images may help identify or confirm the identity of the user of the phone. Videos Video movie files captured by the phone or received from another source. Wireless Network Information Phones record wireless network connections, such as WiFi connections, and the locations of these connections.

15 Phone Number the phone number associated with the phone. Subscriber Identity Module (SIM) Card Information The SIM card can contain the phone number associated with the device as well as limited information such as call logs, contacts, and text message records. SIM Cards also contain an Integrated Circuit Card Identifier (ICCID) which is a unique identifier of the SIM card. Subscriber and Equipment Identifiers Such as the serial number, Mobile Equipment Identifier (MEID), Electronic Serial Number (ESN), International Mobile Equipment Identity (IMEI), and International Mobile Subscriber Identity (IMSI). Unallocated Space This is the available space on the storage media to which the operating system can write data. This space could contain data which has previously been deleted but has not yet been overwritten. Information about Cloud Based Services Mobile cloud computing is the combination of mobile networks and cloud computing allowing user applications and data to be stored on the cloud rather than the phone s memory. Identification of these cloud-based services could lead to relevant information. Information about Synced Devices The data contained on a phone is often present on a computer due to the capability of the phone to sync with or otherwise share information among one or more host computers. Paired Devices Phones can be paired with other devices, such as hands-free headsets, smart watches, and remote speakers. Preservation Requires Immediate Intervention You must act immediately to preserve potentially relevant ESI on the phone, without limitation, from the date of a relevant date (may be earlier than the date of the incident) through the date of this demand and concerning: 1. The events and causes of action described in Plaintiff s ComplaintI; 2. ESI you may use to support claims or defenses in this case; Adequate preservation of ESI requires more than simply refraining from efforts to destroy or dispose of such evidence. You must also intervene to prevent loss due to routine operations and employ proper techniques and protocols suited to protection of ESI. Be advised that sources of ESI are altered and erased by continued use of your phone. Smart phones commonly use a type of memory chip called NAND. NAND chips commonly use processes called Wear Leveling and Garbage Collection. NAND chips have a limited lifetime of reads and writes of data on the chip. Wear Leveling is a process that moves data from high traffic areas on the NAND chip to lower areas. This process increases the overall life of

16 the chip. When the data is written to a new area on the chip, any data previously in that area is irretrievably lost. Additionally, for any data to be written to NAND memory, the area to receive the data must be erased. Erasing and writing new data every time new data is written would occupy too many resources, so NAND chips employ a process called Garbage Collection. This process identifies areas on the chip that have old unused data and erases them periodically in order to receive new data faster. Once Garbage Collection has occurred on any area of the chip, the data that was on the chip is irretrievably lost. Any use of the phone may irretrievably alter the evidence it contains and may constitute unlawful spoliation of evidence. Consequently, alteration and erasure may result from your failure to act diligently and responsibly to prevent loss or corruption of ESI. Immediate Steps You are directed to immediately initiate a litigation hold for potentially relevant ESI on the phone, any memory cards, such as Micro SD cards used with the phone, any SIM cards used in the phone, the battery, any paired, connected, or synced devices, any data or power cords or chargers used with the phone, and all passwords, passcodes, or patterns used to unlock the phone along with the user ID and password for any accounts used to set up the phone such as the Google or Apple account used for all profiles on the phone. You should take the following steps: Place the phone in Airplane Mode Remove power from the phone o Turn the phone off o Remove the battery if it is user removable o Do not charge the phone Radio isolate the phone o Should already be in Airplane Mode o Remove the SIM card o Place the phone in a Faraday bag or wrap in several layers of aluminum foil Do not turn the phone on again until it can be forensically examined Record and preserve any passwords, passcodes, or patterns used to unlock the phone along with the user ID and password for any accounts used to set up the phone such as the Google or Apple account used for all profiles on the phone. Phone Sequestration for Forensically Sound Imaging We suggest that the phone be immediately removed from service and properly sequestered and protected as may be an appropriate and cost-effective preservation step. In the event you deem it impractical to sequester the phone, we believe that the breadth of the preservation required, coupled with the modest number of phones implicated, dictates that forensically

17 sound imaging of the phone is expedient and cost effective. As we anticipate the need for forensic examination of the phone and the presence of relevant evidence in the phone, we demand that you employ forensically sound ESI preservation methods. Failure to use such methods poses a significant threat of spoliation and data loss. By forensically sound, we mean duplication, for the purposes of preservation, of all data stored on the phone while employing a proper chain of custody and using tools and methods that make no changes to the evidence and support authentication of the duplicate as a true and complete bit-for-bit image of the original. We understand that this may not be possible with all mobile devices. Generally, there are three levels of examination of a mobile device: Physical, File System, and Logical, with the Physical being the highest level of examination. We recommend the highest possible level of examination of the phone, along with all other lower level examinations available. A forensically sound preservation method guards against changes of metadata evidence and preserves all parts of the electronic evidence, including unallocated space holding deleted files. Preservation Protocols We are desirous of working with you to agree upon an acceptable protocol for forensically sound preservation and can supply a suitable protocol, if you will furnish an inventory of the phones to be preserved. However, if you will promptly disclose the preservation protocol you intend to employ, perhaps we can identify any points of disagreement and resolve them. A successful and compliant ESI preservation requires expertise. If you do not currently have such expertise at your disposal, we urge you to engage the services of an expert in electronic and phone forensics. Perhaps our respective experts can work cooperatively to secure a balance between evidence preservation and id burden that s fair to both sides and acceptable to the court. Do Not Delay Preservation I m available to discuss reasonable preservation steps; however, you should not defer preservation steps pending such discussions as ESI may be lost or corrupted as a consequence of delay. Should your failure to preserve potentially relevant evidence result in the corruption, loss, or delay in production of evidence to which we are entitled, such failure would constitute spoliation of evidence, and we will not hesitate to seek sanctions. Confirmation of Compliance Please confirm by date that you have takes the steps outlined in this letter to preserve ESI and the cell phone relevant to this action. If you have not undertaken the steps outlined above, please describe what you have done to preserve potentially relevant evidence.

18 Respectfully,

19 Benjamin Bierce Revelation Cellular Forensics LLC Professional Experience Owner, Revelation Cellular Forensics, LLC, 2012 to Present Investigator, Franklin, Indiana Police Department, 2016 to Present Instructor, McAfee Institute, 2018 to Present Detective, Computer & Digital Forensics Unit, Indianapolis Metropolitan Police Department, 2015 to 2016 Detective, Homicide/Robbery Branch, Indianapolis Metropolitan Police Department, 2008 to 2015 Police Officer, Indianapolis Metropolitan Police Department/Indianapolis Police Department, 2001 to 2016 Special Agent, U.S. Army Criminal Investigation Division Command (CID), 2003 to 2011 Training and Education Mobile Device Examiner, National Computer Forensics Institute, US Secret Service, 2017 Basic Mobile Device Investigations, National Computer Forensics Institute, US Secret Service, 2015 Mobile Device Investigation Program, Federal Law Enforcement Training Center, 2014 Cell Phone Data and Mapping, Police Technical, 2014 Smartphone Forensics and Advanced Cellular Technology, Public Agency Training Council, 2012 Foundations of Intelligence Analysis Training, Department of Homeland Security/National White Collar Crime Center, 2012 Cyber-Investigations 105 (Basic Cell Phone Investigations), National White Collar Crime Center, 2010 U.S. Army Criminal Investigation Division Command, Basic Warrant Officer Course, 2010 Cyber-Investigations 101 (Secure Techniques for Onsite Preview), National White Collar Crime Center, 2010 Bachelor s Degree in Criminal Justice, Liberty University, 2008

20 Detective Course, Indianapolis Metropolitan Police Department, 2008 U.S. Army Criminal Investigation Division Command Special Agent Course, 2005 Certifications Cellebrite Certified Operator (CCO), August, 2017 to December 2019 MSAB XRY Level 2 Certification, August, 2017 to August, 2019 Private Investigator License, Texas, 2016-Present Speaking Engagements Cleveland Academy of Trial Attorneys, Cell Phone Evidence in Civil Litigation, December, 2018 Indiana Continuing Legal Education Forum, Advanced Family Law, July, 2017 Cincinnati Bar Association, Cell Phone Evidence in Civil Litigation, June, 2017 Akron Bar Association, Cell Phone Evidence in Criminal Litigation, June, 2017 Louisville Bar Association, Cell Phone Evidence in Civil Litigation, May, 2017 Chicago Bar Association, Cell Phone Evidence in Civil Litigation, April, 2017 Monroe County (IN) Bar Association, Bench Bar Conference, Cell Phone Evidence in Civil Litigation, February, 2017 Indiana Continuing Legal Education Forum, Family Law Institute, Cell Phone Evidence in Family Law, October, 2016 Ohio State Bar Association, Webinar, Cell Phone Record Analysis in support of Criminal Cases, June, 2016 Allen County (IN) Bar Association, Cell Phone Record Analysis in support of Litigation, June, 2016 Ohio State Bar Association, Webinar, Cell Phone Record Analysis in support of Civil Litigation, May, 2016 Indiana Continuing Legal Education Forum, Year in Review Conference, Preserving and Obtaining Cell Phone Records, December, 2015 Indiana Continuing Legal Education Forum, Preserving and Obtaining Cell Phone Records, June, 2015 Defense Trial Counsel of Indiana, Annual Conference, Trial Tactics, November, 2014 Indiana University Law School, Guest Speaker, ediscovery, June, 2014 Defense Trial Counsel of Indiana, Annual Conference Breakout Session, November 2013 Indiana Continuing Legal Education Forum, Using Cell Phone Records in Civil Litigation, October, 2013

21 US Attorney's Law Enforcement Conference, Homicide Case Study, September, 2013 Marion County Prosecutors Office, Cell Phone Training for Prosecutors, July, 2013 ITT Technical Institute, Guest Speaker, Criminal Justice, July 2013 Court Testimony State v. Miles Toran, 49G MR , Marion County, Indiana State v. Maron Jackson, 49G MR , Marion County, Indiana State v. Lamar Wooden, 49G MR , Marion County, Indiana State v. Daryl Gilbert, 49G MR , Marion County, Indiana State v. Daniel Hoskins, 49G MR , Marion County, Indiana State v. Carlton Hart, 49G MR , Marion County, Indiana State v. Ryan Clark, 49G MR , Marion County, Indiana State v. Donna Fitzgerald, 49G FB , Marion County, Indiana State v. James Wade, 49G MR , Marion County, Indiana State v. Omar Davis, 49G F , Marion County, Indiana State v. Cortez Jones, 49G MR , Marion County, Indiana State v. Philip Garrett, 49G MR , Marion County, Indiana State v. Kenneth Brittain, 49G MR , Marion County, Indiana State v. Heidi Carpenter, 49G MR , Marion County, Indiana State v. Marchello Heard, 49G FA , Marion County, Indiana State v. Dominique Hamler, 49G MR , Marion County, Indiana State v. Desmond Aaron, 49G F , Marion County, Indiana State v. Anthony Spearman, 49G MR , Marion County, Indiana State v. Devin Brookins, 49G MR , Marion County, Indiana State v. James Jenkins, 49G MR , Marion County, Indiana State v. Eric Johnson, 49G MR , Marion County, Indiana State v. John Webb, 49G MR , Marion County, Indiana State v. Bob Leonard, 02D MR , Allen County, Indiana State v. Bryant Dowdy, 49G MR , Marion County, Indiana State v. Nicko Bryant-Williams, 49G MR , Marion County, Indiana State v. Jasen Lockwood, 49G F , Marion County, Indiana State v. John Means, 49G MR , Marion County, Indiana State v. Desmond Aaron. 49G MR , Marion County, Indiana Unger v. Dirt Trucking. 35D PL , Huntington County, Indiana Depositions State v. Anthony Spearman, 49G MR , Marion County, Indiana

22 State v. Cortez Jones, 49G MR , Marion County, Indiana State v. William Rainsberger, 49G MR , Marion County, Indiana State v. James Wade, 49G MR , Marion County, Indiana State v. Kenneth Brittain, 49G MR , Marion County, Indiana State v. Richard Burns, 49G MR , Marion County, Indiana State v. Kenneth Rackemann, 49G MR , Marion County, Indiana State v. Eric Johnson, 49G MR , Marion County, Indiana State v. Charles Wade, 49G FA , Marion County, Indiana State v. Maron Jackson, 49G MR , Marion County, Indiana Relevant Experience and Activities I have analyzed more than 1200 sets of phone records in both criminal and civil cases. I have testified regarding cell phone records in 28 criminal jury trials. I established a program to obtain and analyze phone records for the Indianapolis Metropolitan Police Department. From 2012 to present I have been involved with the Kairos Prison Ministry, where I regularly give talks and presentations. From 2010 to present, my wife and I have coordinated Financial Peace University at our church, where we give presentations, and guide and mentor students through a 13 or 9 week course. From 2004 to 2011 I was the Training Officer or Training Noncommissioned Officer for the 378 th MP Detachment (CID), U.S. Army Reserve. I was responsible for establishing and implementing the unit s training program. I supervised soldiers in the development and presentation of individual classes.

Carrier-Specific Preservation Requests

Carrier-Specific Preservation Requests Carrier-Specific Preservation Requests RevForensics.com 5911 N Road 400 W, Bargersville IN 46106 317-527-1446 AT&T Civil Preservation Request 10-11-2017 RevForensics.com 5911 N Road 400 W, Bargersville

More information

Cell Phone Record Analysis in Support of Criminal Cases

Cell Phone Record Analysis in Support of Criminal Cases Cell Phone Record Analysis in Support of Criminal Cases Reference Manual Volume No. 16-W060 Ohio State Bar Association Continuing Legal Education is a division of the Ohio State Bar Association. Ohio State

More information

Cellebrite Digital Forensics for Legal Professionals (CDFL)

Cellebrite Digital Forensics for Legal Professionals (CDFL) Global forensic training Course description Level Intermediate Length Two days (14 hours) Training Track Investigative The two-day Cellebrite Digital Forensics for Legal Professionals course is designed

More information

PATCtech. Cellular Records Review and Analysis Part 2: Verizon

PATCtech. Cellular Records Review and Analysis Part 2: Verizon Cellular Records Review and Analysis Part 2: Verizon PATCtech Glenn K Bard, Chief Technology Officer Scott Lucas, Instructor and Examiner Steve Dempsey, Instructor Kathy Enriquez, Instructor Brian Sprinkle,

More information

December 6, Rachel Perrin Rogers NOTICE OF DEMAND FOR EVIDENCE PRESERVATION

December 6, Rachel Perrin Rogers NOTICE OF DEMAND FOR EVIDENCE PRESERVATION December 6, 2017 VIA E-MAIL Senate President Joe Negron Office of the Florida Senate 404 S. Monroe Street Tallahassee, Florida 32399-1100 Negron.joe@flsenate.gov RE: Rachel Perrin Rogers NOTICE OF DEMAND

More information

Snap Inc. Law Enforcement Guide

Snap Inc. Law Enforcement Guide Snap Inc. Law Enforcement Guide Last Updated: April 27, 2018 Download the most recent version at: https://www.snapchat.com/lawenforcement Mailing Address: Custodian of Records Snap Inc. 63 Market Street

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of

More information

PATCtech. Cellular Records Review and Analysis Part 2: Verizon

PATCtech. Cellular Records Review and Analysis Part 2: Verizon Cellular Records Review and Analysis Part 2: Verizon PATCtech Glenn K Bard, Chief Technology Officer Jim Alsup, Director PATCtech Scott Lucas, Instructor and Examiner Brian Sprinkle, Case Manager and Software

More information

SAMPLE LITIGATION HOLD NOTICES

SAMPLE LITIGATION HOLD NOTICES Business & Litigation Support ediscovery: COLORADO RULES, CASE LAW & SAMPLE LITIGATION HOLD NOTICES HTTPS://SHOLLEREDWARDS.COM/LITIGATION-AND-SUPPORT/ 1.855.649.5884 CONTENTS Litigation Trigger... 3 Scope

More information

PATCtech. Cellular Records Review and Analysis Part 3: Sprint

PATCtech. Cellular Records Review and Analysis Part 3: Sprint Cellular Records Review and Analysis Part 3: Sprint PATCtech Glenn K Bard, Chief Technology Officer Jim Alsup, Director PATCtech Scott Lucas, Instructor and Examiner Brian Sprinkle, Case Manager and Software

More information

PATCtech. Cellular Records Review and Analysis Part 1: AT&T

PATCtech. Cellular Records Review and Analysis Part 1: AT&T Cellular Records Review and Analysis Part 1: AT&T PATCtech Glenn K Bard, Chief Technology Officer Jim Alsup, Director PATC Scott Lucas, Instructor and Examiner Steve Dempsey, Instructor Kathy Enriquez,

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner ACCREDITATIONS EXAM INFORMATION The Certified Digital Forensics Examiner exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is

More information

Gathering and Using Cell Phone and Location Evidence in Criminal Cases Supplemental Materials

Gathering and Using Cell Phone and Location Evidence in Criminal Cases Supplemental Materials Gathering and Using Cell Phone and Location Evidence in Criminal Cases Supplemental Materials 1. Definitions of Some Key Terms 2. Historical Cell-Site Location Information Subpoena Example 3. Non-Disclosure

More information

Cellular Records Review and Analysis Part 4: T-Mobile

Cellular Records Review and Analysis Part 4: T-Mobile Cellular Records Review and Analysis Part 4: T-Mobile PATCtech Glenn K Bard, Chief Technology Officer Jim Alsup, Director PATCtech Scott Lucas, Instructor and Examiner Brian Sprinkle, Case Manager and

More information

STRIPPING METADATA: WHAT EVERY ATTORNEY SHOULD KNOW-A WEBINAR

STRIPPING METADATA: WHAT EVERY ATTORNEY SHOULD KNOW-A WEBINAR STRIPPING METADATA: WHAT EVERY ATTORNEY SHOULD KNOW-A WEBINAR Judith Germano, Esq. Member, New Jersey Supreme Court s Working Group on Ethical Issues Involving Metadata in Electronic Documents Germano

More information

Digital Forensics for Attorneys

Digital Forensics for Attorneys Lars E. Daniel, EnCE, ACE, AME, CTNS Digital Forensics Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital

More information

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues Electronic Evidence: Preservation, Retrieval & Production Issues Tips, Tactics & Technology April 19, 2004 Discussion Outline 21 st Century Discovery E-Evidence Uncovered Preservation / Spoliation Computer

More information

CHALLENGES IN MOBILE FORENSICS TECHNOLOGY, METHODOLOGY, TRAINING, AND EXPENSE

CHALLENGES IN MOBILE FORENSICS TECHNOLOGY, METHODOLOGY, TRAINING, AND EXPENSE UDC 343.3/.7:340.6 Pregledni rad CHALLENGES IN MOBILE FORENSICS TECHNOLOGY, METHODOLOGY, TRAINING, AND EXPENSE American University in Bosnia & Herzegovina, BOSNIA & HERZEGOVINA, e-mail: edita.bajramovic@gmail.com

More information

DIGITAL EVIDENCE TOOL BOX

DIGITAL EVIDENCE TOOL BOX DIGITAL EVIDENCE TOOL BOX Toolbox Page 1 of 23 Introduction This guide is meant to provide a basic understanding of the industry standards, best practices and practical applications for the use of digital

More information

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery To aid and advance the ability for a litigation to successfully employ computer-based discovery, Rule 16(c) of the Federal Rules

More information

ATLANTIC BROADBAND LAW ENFORCEMENT HANDBOOK

ATLANTIC BROADBAND LAW ENFORCEMENT HANDBOOK ATLANTIC BROADBAND LAW ENFORCEMENT HANDBOOK INTRODUCTION Atlantic Broadband will assist law enforcement agencies in their investigations while protecting subscriber privacy as required by law and applicable

More information

4 having been first duly sworn, testified as follows: 6 Q. (BY MS. REYNA) Good afternoon, Officer. 7 Could you please introduce yourself to our jury?

4 having been first duly sworn, testified as follows: 6 Q. (BY MS. REYNA) Good afternoon, Officer. 7 Could you please introduce yourself to our jury? 197 Eric Johnson - June 2, 2014 Cross-Examination by Mr. Davis 1 may have a seat, sir. 2 THE WITNESS: Thank you. 3 MARK WILSON, 4 having been first duly sworn, testified as follows: 5 DIRECT EXAMINATION

More information

MOBILE DEVICE FORENSICS

MOBILE DEVICE FORENSICS MOBILE DEVICE FORENSICS Smart phones and other handheld electronics have become an important part of our everyday lives and the ever changing technology is making these devices a major source of digital

More information

Digital Evidence for the Domestic Practitioner

Digital Evidence for the Domestic Practitioner Digital Evidence for the Domestic Practitioner Presented by: Simon Ragona III, EnCE, CCE, ACE, Director Kyle Poppenwimer, CCE, ACE, Senior Digital Forensic Examiner T&M Protection Resources, LLC 230 Park

More information

25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators

25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators 25 ESI and E-Discovery Terms (in 75 minutes!) for Mediators chopkins@mcdonaldhopkins.com Christopher Hopkins M c D o n a l d H o p k i n s L L C W e s t P a l m B e a c h Lawyer, mediator, and arbitrator.

More information

Cellular Telephone and Social Media Subpoena Guide updated May 2015

Cellular Telephone and Social Media Subpoena Guide updated May 2015 Cellular Telephone and Social Media Subpoena Guide updated May 2015 The chart below contains the contact information for the Centers for a few major cell phone companies and social media networks. These

More information

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case. E-DISCOVERY The process in which electronic data is sought, located, secured, and analyzed with the intent of using it as evidence in a civil or criminal legal case. I. Guidance Regarding the Amended Federal

More information

Call Detail Records The Evidence 10/19/2017. Locating Cell Phones

Call Detail Records The Evidence 10/19/2017. Locating Cell Phones Cell Phone Location Evidence for Legal Professionals Larry Daniel DFCP, EnCE, ACE, AME, BCE, CTNS, CTA, CWA Locating Cell Phones Least Precise to Most Call Detail Records (Drive Testing) Google Location

More information

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

Matthew H. Brown Curriculum Vitae. Education

Matthew H. Brown Curriculum Vitae. Education Matthew H. Brown Curriculum Vitae Education Valley City State University o September 2012 to May 2014 o Bachelor of Science in Career and Technical Education North Dakota Highway Patrol Academy, Bismarck,

More information

Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014

Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 INTRODUCTION The field of computer forensics has long been centered on traditional media like hard drives.

More information

Investigating Insider Threats

Investigating Insider Threats Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior

More information

COMP116 Final Project. Shuyan Guo Advisor: Ming Chow

COMP116 Final Project. Shuyan Guo Advisor: Ming Chow Digital Forensics with ios Devices COMP116 Final Project Shuyan Guo Shuyan.guo@tufts.edu Advisor: Ming Chow Abstract This project focuses on ios device forensics. The study provides a general overview

More information

Federal Rules of Civil Procedure IT Obligations For

Federal Rules of Civil Procedure IT Obligations For Federal Rules of Civil Procedure IT Obligations For Email Message Logic is a business unit of Data Storage Corporation. 212-564-4922 www.messagelogic.net or www.datastoragecorp.com 2013 Data Storage Corporation,

More information

Matt Danner Flashback Data

Matt Danner Flashback Data Preservation Strategies and Data Collection from a Forensic Expert's Point of View Best practices on executing preservation and administering collection protocols with emphasis on forensically sound methods

More information

IRIS LLC Sample Interrogatories for Electronic Discovery. UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction]

IRIS LLC Sample Interrogatories for Electronic Discovery. UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction] IRIS LLC Sample Interrogatories for Electronic Discovery UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction] Court File No.: Plaintiff, INTERROGATORIES TO [Party Name v. Defendant, I. Definition. The

More information

SUPERIOR COURT OF THE DISTRICT OF COLUMBIA CRIMINAL DIVISION FELONY BRANCH

SUPERIOR COURT OF THE DISTRICT OF COLUMBIA CRIMINAL DIVISION FELONY BRANCH SUPERIOR COURT OF THE DISTRICT OF COLUMBIA CRIMINAL DIVISION FELONY BRANCH In the Matter of the Search of www.disruptj20.org ) Special Proceeding No. 17 CSW 3438 that Is Stored at Premises Owned, Maintained,

More information

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory Audience: NDCBF IT Security Team Last Reviewed/Updated: March 2018 Contact: Henry Draughon hdraughon@processdeliveysystems.com Overview... 2 Sensitive Data Inventory and Classification... 3 Applicable

More information

William Jacob Green, CCLO, CCPA, BLE

William Jacob Green, CCLO, CCPA, BLE PROFILE William Jacob Green ( Jake ) has over ten years of forensic investigation experience. Beginning in 2005, Jake was responsible for managing traffic enforcement and collision investigations, having

More information

Credit Card Data Compromise: Incident Response Plan

Credit Card Data Compromise: Incident Response Plan Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,

More information

ANNEXES. to the. Proposal for a Regulation of the European Parliament and of the Council

ANNEXES. to the. Proposal for a Regulation of the European Parliament and of the Council EUROPEAN COMMISSION Brussels, 17.4.2018 COM(2018) 225 final ANNEXES 1 to 3 ANNEXES to the Proposal for a Regulation of the European Parliament and of the Council on European Production and Preservation

More information

Test Results for Mobile Device Acquisition Tool: Zdziarski s Method

Test Results for Mobile Device Acquisition Tool: Zdziarski s Method 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 Test Results for Mobile Device Acquisition Tool: Zdziarski s Method October 2010 37 38 38 October 2010

More information

CITY OF DUBUQUE ADMINISTRATIVE POLICY REVISED OCTOBER 24, 2011 RETROACTIVE TO JANUARY 1, 2011

CITY OF DUBUQUE ADMINISTRATIVE POLICY REVISED OCTOBER 24, 2011 RETROACTIVE TO JANUARY 1, 2011 CITY OF DUBUQUE ADMINISTRATIVE POLICY POLICY NUMBER: 2. 13 SUBJECT: ACQUISITION AND USE OF CELLULAR TELEPHONE EQUIPMENT APPROVED BY: CITY MANAGER EFFECTIVE DATE: AUGUST 6, 1996 REVISED FEBRUARY 1, 2004

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

OFFICE OF THE PROSECUTING ATTORNEY DANIEL R. LUTZ 215 N. GRANT STREET WOOSTER, OHIO BAD CHECK PACKET

OFFICE OF THE PROSECUTING ATTORNEY DANIEL R. LUTZ 215 N. GRANT STREET WOOSTER, OHIO BAD CHECK PACKET OFFICE OF THE PROSECUTING ATTORNEY DANIEL R. LUTZ 215 N. GRANT STREET WOOSTER, OHIO 44691 330-287-5633 BAD CHECK PACKET Requirements for Prosecution - Non-sufficient Funds (NSF) Checks: 1) Check must have

More information

FILED: NEW YORK COUNTY CLERK 10/10/ :33 PM INDEX NO /2016 NYSCEF DOC. NO. 81 RECEIVED NYSCEF: 10/10/2017

FILED: NEW YORK COUNTY CLERK 10/10/ :33 PM INDEX NO /2016 NYSCEF DOC. NO. 81 RECEIVED NYSCEF: 10/10/2017 SUPREME COURT OF THE STATE OF NEW YORK COUNTY OF NEW YORK In the Matter of the Application of THE BRONX DEFENDERS against Petitioner, The NEW YORK CITY POLICE DEPARTMENT, and WILLIAM BRATTON, in his official

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

Scientific Working Group on Digital Evidence

Scientific Working Group on Digital Evidence SWGDE Best Practices for Digital & Multimedia Evidence Video Acquisition from The version of this document is in draft form and is being provided for comment by all interested parties for a minimum period

More information

Welcome to United Bank - Mobile Banking!

Welcome to United Bank - Mobile Banking! Questions Welcome to United Bank - Mobile Banking! General Questions How much does this service cost? Is it secure? Which wireless carriers are supported? Do I need a text message or data plan? I'm not

More information

Digital Evidence: I know it s there, how do I get it?

Digital Evidence: I know it s there, how do I get it? : I know it s there, how do I get it? January 24, 2019 Matthew Rollins Senior Assistant District Attorney Paulding County Judicial Circuit Josh Reed Network Intrusion Forensic Analyst United States Secret

More information

Scientific Working Group on Digital Evidence

Scientific Working Group on Digital Evidence SWGDE Best Practices for Digital & Multimedia Evidence Video Acquisition from Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Electronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson

Electronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson Electronic Discovery in Employment Cases: What Every Employer Needs to Know Presented By: Shannon Cohorst Johnson Understand e-discovery and the latest tactics by claimants and counsel Understand your

More information

WYNN SOCIAL CASINO PRIVACY POLICY

WYNN SOCIAL CASINO PRIVACY POLICY WYNN SOCIAL CASINO PRIVACY POLICY This privacy policy for the Wynn Slots App ( App ), made available by Wynn Social Gaming, LLC ( Wynn Social, Us, We, or Our ), describes our privacy practices (the "Privacy

More information

Real-Time Phones Search

Real-Time Phones Search Real-Time Phones Search The Real-Time Phones Search helps to locate hard-to-find individuals and businesses by running simple phone number and/or address searches. The real-time phones source enhances

More information

Cellular Telephone and Social Media Subpoena Guide. Updated March 2016

Cellular Telephone and Social Media Subpoena Guide. Updated March 2016 Cellular Telephone and Social Media Subpoena Guide Updated March 2016 Cellular Telephone and Social Media Subpoena Guide updated March 2016 The chart below contains the contact information for the Subpoena

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Managing Your Record Retention Policy Safely

Managing Your Record Retention Policy Safely Managing Your Record Retention Policy Safely Client and counsel have a duty to preserve materials with potential evidentiary value. The preceding discussion told us about the duties of lawyers and clients

More information

Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client

Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client Client s Responsibility Easy Time Clock, Inc. ( ETC ) is a client-led time and attendance program. The Client is solely responsible

More information

Southington Public Schools

Southington Public Schools 3543 POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION I.POLICY The Board of Education (the Board ) complies with all state and federal regulations regarding the retention, storage and destruction

More information

AUTHENTICATION OF ELECTRONICALLY STORED EVIDENCE

AUTHENTICATION OF ELECTRONICALLY STORED EVIDENCE AUTHENTICATION OF ELECTRONICALLY STORED EVIDENCE SHARON N. PRUITT Assistant Attorney General Juvenile Crime Intervention P.O. Box 12548 Austin, TX 78711-2548 (512) 936-6406 sharon.pruitt@texasattorneygeneral.gov

More information

Michael McCartney, President

Michael McCartney, President Michael McCartney, President Litigation Landscape Computer Forensics Overview Forensic Data vs. Non-Forensic Dangers of Hard Drives Forensic Process HR Escrow Proactive Forensics Pit falls to avoid 1 650

More information

Tagged.com. Official Law Enforcement Officers Investigators Guide

Tagged.com. Official Law Enforcement Officers Investigators Guide Tagged.com Official Law Enforcement Officers Investigators Guide Mailing Address: 840 Battery Street San Francisco, CA. 94111 LEO E-mail: safetysquad@tagged.com LEO Telephone: Phone: 415-946-1953 Fax:

More information

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 1. Welcome 1.1 Welcome to the Connect Transit Card Program. The Connect Card Program makes using public transit easier

More information

UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS MARSHALL DIVISION

UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS MARSHALL DIVISION UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS MARSHALL DIVISION ROCKSTAR CONSORTIUM US LP, AND MOBILESTAR TECHNOLOGIES LLC v. PLAINTIFFS ASUSTEK COMPUTER, INC. AND ASUS COMPUTER INTERNATIONAL,

More information

Case 1:18-cr TSE Document 2 Filed 06/20/18 Page 1 of 9 PageID# 2 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA

Case 1:18-cr TSE Document 2 Filed 06/20/18 Page 1 of 9 PageID# 2 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Case 1:18-cr-00308-TSE Document 2 Filed 06/20/18 Page 1 of 9 PageID# 2 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division i 20 2018 1:1 UNITED STATES OF AMERICA

More information

Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.

Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution. AD ediscovery Collect, Audit and Analyze with a Seamless, Secure Solution Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.

More information

5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization.

5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization. Jay Olin National Archives Ramona Branch Oliver Department of Labor ASAP 6 th Annual National Training Conference May 12-15, 15, 2013 What Is a Federal Record? Records include all books, papers, maps,

More information

UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS MARSHALL DIVISION

UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS MARSHALL DIVISION UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS MARSHALL DIVISION ROCKSTAR CONSORTIUM US LP, AND MOBILESTAR TECHNOLOGIES LLC v. PLAINTIFFS ZTE CORPORATION, ZTE (USA) INC., and ZTE SOLUTIONS,

More information

Case 2:07-cv MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA

Case 2:07-cv MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA Case 2:07-cv-04756-MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA RHOADS INDUSTRIES, INC. : CIVIL ACTION : v. : : NO. 07-4756

More information

LOCATION DATA. Location information from mobile devices is typically obtained using the following:

LOCATION DATA. Location information from mobile devices is typically obtained using the following: LOCATION DATA Location information from mobile devices is typically obtained using the following: 1. Cell PING (Triangulation) 2. Stingray device 3. Wi-Fi, Bluetooth tracking 4. Apps and Web browsing 5.

More information

SYDNEY FESTIVAL PRIVACY POLICY

SYDNEY FESTIVAL PRIVACY POLICY 1. Level 5, 10 Hickson Road The Rocks Sydney NSW 2000 Australia Phone 61 2 8248 6500 Fax 61 2 8248 6599 sydneyfestival.org.au ABN 60 070 285 344 SYDNEY FESTIVAL PRIVACY POLICY Our Commitment to your Privacy

More information

ID Theft Information Form - Instructions

ID Theft Information Form - Instructions ID Theft Information Form - Instructions Identity Theft may occur when someone uses your personally identifiable information such as your name or social security number (SSN) to obtain services from Charter

More information

8/28/2017. What Is a Federal Record? What is Records Management?

8/28/2017. What Is a Federal Record? What is Records Management? Ramona Branch Oliver US Department of Labor What Is a Federal Record? Records include all books, papers, maps, photographs, machine-readable materials, or other documentary materials, regardless of physical

More information

UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS MARSHALL DIVISION

UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS MARSHALL DIVISION UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS MARSHALL DIVISION ROCKSTAR CONSORTIUM US LP, AND MOBILESTAR TECHNOLOGIES LLC v. PLAINTIFFS PANTECH CO., LTD., and PANTECH WIRELESS, INC.,

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

Case 1:12-cv SLR Document 1 Filed 04/13/12 Page 1 of 7 PageID #: 1 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE

Case 1:12-cv SLR Document 1 Filed 04/13/12 Page 1 of 7 PageID #: 1 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE Case 1:12-cv-00473-SLR Document 1 Filed 04/13/12 Page 1 of 7 PageID #: 1 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE GOLDEN BRIDGE TECHNOLOGY, INC., vs. Plaintiff, SIERRA WIRELESS,

More information

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring

More information

PATCtech. Cellular Records Review and Analysis Part 5: Miscellaneous

PATCtech. Cellular Records Review and Analysis Part 5: Miscellaneous Cellular Records Review and Analysis Part 5: Miscellaneous PATCtech Glenn K Bard, Chief Technology Officer Jim Alsup, Director PATCtech Scott Lucas, Instructor and Examiner Brian Sprinkle, Case Manager

More information

Membership, Credit and Service Application

Membership, Credit and Service Application Membership, Credit and Service Application 510 Broadway PO Box 136 Abercrombie, ND 58001 T: 701-553-8309 866-553-8309 F: 701-553-8396 www.redrivercomm.com membersupport@redrivercomm.com Date Membership

More information

Case 1:99-mc Document 298 Filed 04/13/12 Page 1 of 7 PageID #: IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE

Case 1:99-mc Document 298 Filed 04/13/12 Page 1 of 7 PageID #: IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE Case 1:99-mc-09999 Document 298 Filed 04/13/12 Page 1 of 7 PageID #: 17417 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE GOLDEN BRIDGE TECHNOLOGY, INC., vs. Plaintiff, LG ELECTRONICS

More information

COMPUTER FORENSICS (CFRS)

COMPUTER FORENSICS (CFRS) Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics

More information

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE I. Description of Course: 1. Department/Course: CNET - 174 2. Title: Computer Forensics 3. Cross Reference: 4. Units: 3 Lec Hrs:

More information

Case: 1:17-cv Document #: 1 Filed: 07/25/17 Page 1 of 9 PageID #:1

Case: 1:17-cv Document #: 1 Filed: 07/25/17 Page 1 of 9 PageID #:1 Case: 1:17-cv-05460 Document #: 1 Filed: 07/25/17 Page 1 of 9 PageID #:1 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION Sharpe Innovations, Inc., Plaintiff,

More information

Verizon Wireless Manual Activation Fee Promo Code 2013

Verizon Wireless Manual Activation Fee Promo Code 2013 Verizon Wireless Manual Activation Fee Promo Code 2013 #BAL A code you can dial from your mobile phone to check the current balance on Activation Fee A one-time fee for initiating service on a mobile device.

More information

The Use of Technology to Enhance Investigation

The Use of Technology to Enhance Investigation The Use of Technology to Enhance Investigation Of High Profile Corruption Cases. Centre for Socio-Legal Studies Objectives By the end of this keynote, participants will be knowledgeable on: 1. Open Source

More information

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION I. Purpose To provide guidance to schools and administrative offices regarding the maintenance, retention,

More information

MEMORANDUM AND ORDER ON PLAINTIFFS' MOTION TO COMPEL

MEMORANDUM AND ORDER ON PLAINTIFFS' MOTION TO COMPEL National Economic Research Associates, Inc. v. EvansMass.Super.,2006. Superior Court of Massachusetts. NATIONAL ECONOMIC RESEARCH ASSOCIATES, INC. and Marsh & McLennan Companies, Inc., Plaintiffs v. David

More information

You may use the Service to either access, establish or change the following:

You may use the Service to either access, establish or change the following: Online Access Agreement June 18, 2015 (Revision date) I. Introduction This Online Access Agreement (this "Agreement") contains the terms that govern your use of the Participants' Private Area of the www.afmsagaftrafund.org

More information

Carol Judd. PURDUE UNIVERSITY COOPERATIVE EXTENSION SERVICE Pike County. October 15, Dear 4-H Family,

Carol Judd. PURDUE UNIVERSITY COOPERATIVE EXTENSION SERVICE Pike County. October 15, Dear 4-H Family, PURDUE UNIVERSITY COOPERATIVE EXTENSION SERVICE Pike County October 15, 2014 Dear 4-H Family, Indiana 4-H has adopted a new data management system that is being implemented for the 2015 4-H program year.

More information

ETSY.COM - PRIVACY POLICY

ETSY.COM - PRIVACY POLICY At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,

More information

Century Bank Mobile. Android and iphone Application Guide

Century Bank Mobile. Android and iphone Application Guide Century Bank Mobile Android and iphone Application Guide October 19, 2018 Contents Mobile Web Banking Enrollment... 4 Enrolling through Online Banking... 4 Accessing the Mobile App... 5 Enrolling through

More information

EXPERT WITNESS: Completion of a perfect circle

EXPERT WITNESS: Completion of a perfect circle An Agency Under MOSTI EXPERT WITNESS: Completion of a perfect circle Cyber Forensics Workshop, Doha,Qatar February 21, 2008 By R.Azrina R.Othman CyberSecurity Malaysia Copyright 2008 CyberSecurity Malaysia

More information

Vocabulary Bank organized by module

Vocabulary Bank organized by module Vocabulary Bank organized by module Module 1: Choosing a Computer Application: also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software

More information

Applications for Preservation and Production in our Digital World

Applications for Preservation and Production in our Digital World Applications for Preservation and Production in our Digital World Gavin W. Manes, Ph.D. President, Digital Forensics Professionals, Inc. Research Assistant Professor, The University of Tulsa Background

More information

Electronic Surveillance & Constitutional/Legislative Protections

Electronic Surveillance & Constitutional/Legislative Protections Electronic Surveillance & Constitutional/Legislative Protections Eric Vos Federal Defender District of Puerto Rico Eric_Vos@ao.uscourts.gov What is Electronic Surveillance? Not? What We Will Cover Cell

More information

Hawaii Sprint Relay Store Wireless Order Form

Hawaii Sprint Relay Store Wireless Order Form Customer s Name: First Name Middle Initial Last Name New Activation? OR Upgrade? Phone Number: - - Select one Phone and Color You Wish to Order Apple iphone 8 Available 64GB Apple iphone 8 Available in

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

Curriculum Vitae Detective Paul A. Lindvay #5497 Arizona Department of Public Safety Computer Forensics Unit

Curriculum Vitae Detective Paul A. Lindvay #5497 Arizona Department of Public Safety Computer Forensics Unit Computer Forensics Training (1005 Hours) Cybercop 315 Windows Artifacts Attended: May 2014 (32 hours) in Phoenix, AZ Advanced Computer Forensic Analysis and Incident Response Attended: February 2014 (36

More information

Archive Legislation: archiving in the United Kingdom. The key laws that affect your business

Archive Legislation:  archiving in the United Kingdom. The key laws that affect your business Archive Legislation: Email archiving in the United Kingdom The key laws that affect your business Contents Laws regulating archiving, who they apply to and the penalties 3 Who is affected? 3 All private

More information