Business Email Compromise Scam: What Is It and How To Guard Against It

The Business Email Compromise (or BEC) scam has been around for many years and seems to be enjoying a resurgence in popularity lately.  At its essence, the BEC scam involves ...

Read More

Sharing Devices and Accounts

Sharing Devices and Accounts Unless you live alone, you probably share a device or an account with someone else in your home.  Perhaps it’s a family tablet that you and ...

Read More

Spoliation – Case Terminating Sanctions

Spoliation – Case Terminating Sanctions Case Terminating Sanctions.  It’s the spoliation unicorn.  The rare event that counsel either dreams of or has nightmares about.  In my fifteen-plus years of working ...

Read More

ESI Collections

ESI Collections In a previous post, we set out a general road map for handling the intake of a new ESI (Electronically Stored Information) matter.  Frankly, what new matter does ...

Read More

Cell Phones and Mobile Device ESI Collection

The days of limiting an ESI collection to computers, email and server data are long behind us in the world of computer forensics and e-discovery.  Chances are very good that ...

Read More

Reflections On The OPM Data Breach

As I sit here reading my data breach notice from the United States Office of Personnel Management regarding their loss of my personal information (name, DOB, SS#), I can’t help ...

Read More

Computer Forensics – One for the “win” column (v1)

Recently, Peak was asked to assist a law firm who’s client, a large service provider (we will call them “Company A”), had had an account manager leave abruptly and go ...

Read More

Apple Time Machine as a Discoverable Data Source in Forensics and Ediscovery

For years, parties to litigation have been demanding the production of data from various electronic sources. These sources have included desktop computers, laptops, servers, emails, and, most recently, mobile devices ...

Read More