digital forensicsWe live in a world where almost everything we do leaves a digital footprint. We use our phones to help us find where we’re going, pick a restaurant for dinner, find a doctor, read the news, shop online, and a million other things. Then we tell our friends about those things via text, email, and social media. As we type in all these queries and messages, our phones learn what words we plan to use and fix our errors as we go. While auto-correct can lead to some funny accidents, it can alse lead to a criminal conviction. That’s where digital forensics comes in.

When defending a white-collar crime case, attorneys know that the prosecution is going to investigate every angle of the incident and of the defendant.  The crime isn’t just what occurred and who did it, the crime is also who knew about it, when they knew about it, did they plan for it and what did they say or do after the crime occurred.  The digital world is an avenue into this important information.  Actually, the digital world is more like multiple 6-lane highways with multiple exits, entrances and paths to this information.  On top of that, law enforcement is typically ahead of the curve when it comes to discovering how to use digital evidence to tell the tale of a crime.

Let me give you an example of how a very common attribute of our digital lives was used in an uncommon way for a criminal matter.  Everyone is familiar with auto-correct?  It is that function which corrects your spelling mistakes (or changes them to a word you didn’t embarrassingly expect).  The other part of auto-correct is that it allows you to save uncommon words, usually names, to prevent them from being changed.  Seems harmless, right?  Well, in one case, it wasn’t.  The case involved an individual accused of insider trading.  His alibi went so far as to say that the person from whom he allegedly acquired the insider information was someone he had never met.  The information supplier, however, had an unusually spelled name. In examining the defendant’s computer, it was found that he had saved this name in his auto-correct database, so it would never be altered to something else.

The above is just one example of digital evidence used in a white-collar crime case.  There are a host of others.  But usually the defense attorney in a case like this isn’t too interested in finding all the good and bad about their client as they may be more interested in combating all the “bad” that the prosecution is going to dig up.  It is in this area that digital forensics can be most helpful.

Discovery provided by the prosecution consists of documents, emails, etc.  It is the defense attorney’s job to piece that discovery together to understand how it is going to be used.  Pretty easy when you are talking about words written by a human being in the form of letters, memos or otherwise.  Pretty difficult, though, when you are talking about “word” written by a computer.

When presented with discovery from the prosecution that provides information on Jumplists, LNK files, Shellbags, browser history and the Windows Registry, are you going to understand what that means and how the prosecution is going to use it?  Probably not, but that is where the digital forensic expert comes in.  They can read and interpret that data, understand what it means, understand what type of timeline of activity is being put together and understand what these computer words can say about the defendant.

Digital Forensics can also be used to determine the source of a cybersecurity breach. If you believe you may have been the victim of an attack, or need an investigation into digital activities, Great Lakes Computer corporation can help. 

cyber insurance webinar

Having Trouble Obtaining Cyber Insurance? You’re Not Alone

Learn How to secure & insure your organization, plus, get FREE pizza!   IT has gone from being a minor part of most businesses (particularly smal ...
Apple Operating System Vulnerability Leads to Critical Updates

Apple Operating System Vulnerability Leads to Critical Updates

It seems like there is constantly a new update for the Apple platform. Just last month (August 2022), Apple announced the 15.6.1 update which included ...

Cyber Insurance is Becoming Harder to Obtain

As the complexities and diverse risk profiles for protecting business IT security increase, cyber insurance coverage is becoming harder to obtain. Bef ...