December 18 – Cyber Security: When Hackers Strike Your Business, Will You Be Prepared?

Due to the “Snowvember” storm we had in Buffalo, the Cyber Security CLE event has been rescheduled to Thursday, December 18, 2014.  Same great programming will be provided!

 

SUNY Buffalo Law School & the Law Alumni Association’s GOLD Group presents a CLE* program.

When: Thursday, December 18, 2014 – 8 a.m. to 9 a.m. (registration begins at 7:30 a.m.)
Where: The Buffalo Club, 388 Delaware Avenue, Buffalo NY (free parking)

 

Cyber Security: When Hackers Strike You Business, Will You Be Prepared?

 

 

Presentation Costs
-FREE to paid 2014-2015 LAA Members at the $60 level
-$15 for GOLD Group Members
-$20 for all other
-Cost includes lecture, handouts, and breakfast

 

RSVP:  Call the Law Alumni Office at (716) 645-2107 or register at: www.law.buffalo.edu/AlumniEvents

Questions? Contact Pat Warrington at (716) 645-7885

 

*Earn 1.0 CLE credit in the area of skills – these credits qualify as transitional or non-transitional credits.

 

Panelist Discussion “The Virtual Reality of White Collar Crime”

On December 12, 2013 infoTech Niagara will be hosting a panelist discussion, at the Buffalo Niagara Marriott, on the topic of “The Virtual Reality of White Collar Crime”.  Breakfast will be provided at 7:30 a.m. and the discussion will last until 10:00 a.m.

Panel of experts include:

Dennis C. VaccoB. Kevin Burke, JrMichael McCartney

  • Michael G. McCartney, President & CEO, DIGITS LLC


When:
 Thursday, December 12

Where: Buffalo Niagara Marriott, 1340 Millersport Highway, Amherst, NY 14221

Time:  7:30 a.m. registration & full breakfast buffet; 8:15 a.m. – 9:45 a.m. presentation

Cost:  $20 ITN members; $40 non members

Click here to register for The Virtual Reality of White Collar Crime panelist seminar

Digital Forensic Articles

DIGITS LLC was founded in 2006 to fill the need in the legal and corporate communities for highly skilled digital forensics, proactive cyber security services, corporate computer investigations, cyber security incident response and advisory services, eDiscovery and litigation support services, and general digital forensic consulting needs.

In conjunction to our services, the principles of DIGITS LLC have authored many articles about the digital forensic industry.  Click the link below to read articles in which DIGITS LLC has been published in various media sources.

DIGITS LLC Articles in the News

DIGITS LLC

www.digitsllc.com

DIGITS LLC Introduces Accident Reconstruction Unit

Christopher PuckettInternationally known digital forensic examiners at DIGITS LLC, are now offering Accident Reconstruction Services.  Christopher Puckett has been hired as DIGITS LLC’s Manager of Accident Reconstruction Unit.  Mr. Puckett attended the New York State Police Academy, as well as the Institute of Police Technology and Management (IPTM), in which he specialized in Collision Reconstruction Training.

During his 20 year Law Enforcement career as an Investigator with the New York State Police, Mr. Puckett investigated the states most complicated motor vehicle accidents involving property damage, physical injury, and death.

CDR Systems - Accident Reconstruction“We are excited to add Accident Reconstruction Unit and welcome Christopher Puckett to DIGITS LLC,” said Michael McCartney, President/CEO, DIGITS LLC.  “Mr. Puckett is an expert at forensic mapping and diagramming of any incident to include: motor vehicle collisions, crime scenes, and various non-collision related incidents.”

> Click here to learn more about DIGITS LLC’s Accident Reconstruction Unit

DIGITS LLC

www.digitsllc.com

DIGITS & Harter Secrest & Emery featured on Greater Rochester Enterprise Podcast

Eyes on the Feature, Greater Rochester Economy, WHAM 1180

DIGITS LLC and Harter Secrest & Emery were featured on WHAM 1180’s “Eyes on the Feature” of the Greater Rochester Economy.  Jeff Calabrese, Partner of Harter Secrest & Emery, and Michael McCartney, President/CEO of Digits, discuss non-compete clauses and why it is important for businesses to have them.

Click on each of the links below to listen to each of the segments on non-compete clauses.

Importance of Non-Compete Clauses – 10:35
3 Main Categories of Non-Compete Disputes – 6:29
What Your Computer Usage Could Say About You – 14:38
What to Look For When Recruiting a New Employee – 7:29

DIGITS LLC

www.digitsllc.com

Case Study: Digital Forensic Investigation on Deleted Information

It took a lot of hard work to build you company, equipping it with the latest technology and hand picking your staff.  You would do anything to make revenues grow and profits to increase. And almost anything to to protect it.  It may come to you as a surprise, but possibly the greatest threat does not come from outside your company, but from inside your company.  With all of the technology available and the number of employees, it is possible to be vulnerable to attack from within.

Think for a minute, has this happened to you?

Your computers combined with the internet is a powerful tool, used for good and bad.  The ‘delete’ key can correct mistakes or hide wrong doing.  I promise you, if an employee is doing bad, it is not on the company email.  They used out of band email, such as Hotmail or Gmail, and they think it is deleted when they log off.  They have not deleted it, it still exists.

At DIGITS LLC, we are consistently asked if the data exists in various locations.  Often times, we will get a case that originated from the company and the company’s I.T. department. Only to find out that the data has not been deleted- that it actually exists in multiple locations, both on the devises (laptops, smartphones, other network files shares).  Also, third party locations.  We are able to determine and assist clients in determining where their data really lives.  This is critically important in the areas of litigation.  When a company has been served with a litigation hold or recently served with a sapeina, a regulatory compliance seponia, or a lawsuit requesting that certain electronically stored information to be collected, preserved and ultimately produced.

We work with clients regularly to identify where that data is.  Either within their four walls or at some third party location.  We assist our client to properly collect, preserve,and ultimately examining and producing that data which is relevant to their litigation.

These are cases that DIGITS LLC can lend a tremendous amount of value to. We can forensically analyze the laptops, the desktops, the smartphones, as well as the out of band email communications that are taking place between the employee and the outside entities to determine what is really going on.  In Computer Forensics, we can dig deep and find out what your employees are doing.  We can also conduct high level investigations if you have been violated, or think you have been.

Your I.T. person might be the first person to notice that something suspicious has happened.  When they inform you, your first inclination will be to have the I.T. person investigate the problem- this could be the worst possible thing you could do. I.T. professionals are not forensic experts.  They do not use the same tools or have the same certifications that forensic experts hold.  I.T. treats data as data. At DIGITS LLC we treat data as evidence.  If the I.T. professional goes into the electronic devise and damages the evidence, it will be difficult to prove in a court of law, because things change.

When DIGITS LLC completes an investigation, you will have a report that is a thorough and complete depiction, in which your legal team can proceed.  If a problem is detected, DIGITS LLC can get to the bottom of it.  We can stand as an expert witness in the case of litigation.  We can advise your company on proactive prevention and compliance with policies and procedures.

If you find yourself involved with litigation, a regulator compliance matter, give DIGITS LLC a call.  We have assisted clients negate these matters and consulted them with the proper evidence collection, preservation, examination, and production of this information that is relevant specifically to their case.  We can help solve your problem.  DIGITS LLC has done it with over 115 years of law enforcement, decades of experience with digital forensics and advanced technology investigations.  We have been on some of the largest high profile investigations in the country and we can do it for you.  Not only can we help you solve an immediate problem as a reactive approach, but we can also assist you proactively manage and mitigate your risk moving forward so that you can identify issues and deal with those issues before they become a problem.

For additional information, visit our website www.digitsllc.com or call us at 877-216-2511.

Case Study: Digital Forensic Investigation on Corporate Espionage

It took a lot of hard work to build you company, equipping it with the latest technology and hand picking your staff.  You would do anything to make revenues grow and profits to increase. And almost anything to to protect it.  It may come to you as a surprise, but possibly the greatest threat does not come from outside your company, but from inside your company.  With all of the technology available and the number of employees, it is possible to be vulnerable to attack from within.

Think for a minute, has this happened to you? Maybe you discover that an idea of your is suddenly being promoted by your competitor.  The details indicate that it came from within your company- How do you find out, with Computer Forensics! DIGITS LLC has investigated several high profile corporate espionage investigation cases.

A typical senerio: A company has a specific product or proprietary service offered in a marketplace.  You begin to look for private equity investment to take your product or service to the next level.  During the course of those negotiations and investment strategy, you take on a new employee who has been recommended by the investment firm.  The employee is sworn to them. But as a part of the deal, the employee comes with the package.

That employee turns out to be a mole, or co-conspirator, and is particularly planted into that organization for the purposes of gathering inside information, intelligence, and ultimately the inside information that relates to the products propitiatory process.

These are cases that DIGITS LLC can lend a tremendous amount of value to. We can forensically analyze the laptops, the desktops, the smartphones, as well as the out of band email communications that are taking place between the employee and the outside entities to determine what is really going on.  In Computer Forensics, we can dig deep and find out what your employees are doing.  We can also conduct high level investigations if you have been violated, or think you have been.

Your I.T. person might be the first person to notice that something suspicious has happened.  When they inform you, your first inclination will be to have the I.T. person investigate the problem- this could be the worst possible thing you could do. I.T. professionals are not forensic experts.  They do not use the same tools or have the same certifications that forensic experts hold.  I.T. treats data as data. At DIGITS LLC we treat data as evidence.  If the I.T. professional goes into the electronic devise and damages the evidence, it will be difficult to prove in a court of law, because things change.

When DIGITS LLC completes an investigation, you will have a report that is a thorough and complete depiction, in which your legal team can proceed.  If a problem is detected, DIGITS LLC can get to the bottom of it.  We can stand as an expert witness in the case of litigation.  We can advise your company on proactive prevention and compliance with policies and procedures.

If you find yourself involved with litigation, a regulator compliance matter, give DIGITS LLC a call.  We have assisted clients negate these matters and consulted them with the proper evidence collection, preservation, examination, and production of this information that is relevant specifically to their case.  We can help solve your problem.  DIGITS LLC has done it with over 115 years of law enforcement, decades of experience with digital forensics and advanced technology investigations.  We have been on some of the largest high profile investigations in the country and we can do it for you.  Not only can we help you solve an immediate problem as a reactive approach, but we can also assist you proactively manage and mitigate your risk moving forward so that you can identify issues and deal with those issues before they become a problem.

For additional information, visit our website www.digitsllc.com or call us at 877-216-2511.

Round Table w/ Avalon: Email Threading for e-Discovery – July 2012

Predictive coding is all everyone is talking about these days. But, with predictive coding hogging all the e-discovery headlines, some of the less controversial tools that are used to speed up review have gotten lost in the shuffle.  Email threading is still a great tool to help reviewers make faster and more consistent coding decisions.  More times than not, corporate litigations’ discovery review consist largely of oceans of emails.  The consistently growing number of documents that review teams need to plow their way through is forcing people to be more creative.  This creativity is in both new software development and in the legal teams that have to find a way to meet production deadlines that are impossible to reach using only traditional review methods.

So, what’s email threading?  You know how when you email someone and they respond, the response often contains the original email below there response?  That’s an email thread.  Or maybe you have even gotten an email before that says “read string below” or “read form the bottom up”.  That’s another example of an email thread.  During discovery, each individual email response is a unique document that would normally be reviewed (e.g. the original email, then the response to the original, then the response to the response (see example below).

Email Threading Example

Using the example to the left, there would be three separate documents to be reviewed for discovery.  But, with the aid of email threading software such as Equivio (equivio.com), reviewers would only need to review the final, all inclusive email, in order to make a decision (on relevance, confidentiality, etc.) on the entire thread of emails.  As another example, if you were given an entire email thread that included 10 previous emails that were all just a discussion about weekend golf, which has nothing to do with the case, a single inclusive document could be reviewed and marked “non-responsive”, and it would also mark all the individual emails the same.

Today, so much of our communication with each other is done by email. Given the nature of emailing and the frequency of rapid fire email responses, the number of documents to be reviewed anymore can be astronomical.  The use of email threading tools, in conjunction with the various document review platforms that support the technology, can save review teams thousands of attorney review hours and the client hundreds of thousands (if not millions!) of dollars in review costs,while also creating a more consistent designation of the documents being reviewed.

Using Email Threads

DIGITS LLC Featured in DFI News Summer 2012

President/CEO of DIGITS LLC, Michael McCartney, recently co-wrote an article titled “Wrapping Your Arms Around e-Discovery” with John Horn, partner of Harter Secrest & Emery LLP.

Co-authors, McCartney and Horn, explain that eDiscovery has the potential of consuming a case in at least two ways. First, depending on the level of civility and collaboration between adversaries and the amount of Electronically Stored Information (“ESI”) the parties possess, the costs of production and related motion practice can dwarf those related to litigation on the merits. Second, allegations of spoliation and who failed to preserve ESI can quickly overshadow all other aspects of the case.  McCartney & Horn continue their article by explaining seven steps to cost savings and efficiency.

“Wrapping Your Arms Around e-Discovery” was published by DFI News Digital Forensic Investigator Summer 2012 Digital Edition!

DFI News Digital Forensic Investigator® is a multi-media resource for digital forensic professionals working in academic, government, law enforcement, and corporate settings.

View DFI News Summer 2012 Digital Edition- Featuring DIGITS LCC & HSE’s article “Wrapping Your Arms Around e-Discovery”

#StaySecure from GPU cracking passwords

Earlier this week we posted an article about the Extreme GPU Bruteforcer – a devices that will “Crack passwords w/ 450 Million passwords/Sec Speed“.  A device that is threatening to many.

Our advice to #staysecure

Create alphanumeric passwords.  Your password should contain:

  • Symbols
  • Lower and upper case letters
  • More than 10 characters in length

Any kind of password can be broken using brute force.  However, using the character sequence above, it will take a long time to finish.  Cyber crooks tend to look for quick brake-ins compared to complex.