Category

Litigation

Cell Phones = Plethora of Evidence

By | Criminal Defense, eDiscovery, Employment Law, Litigation | No Comments

cell phones

It’s official – they now outnumber us: tablets, cell phones, and the like. Mobile devices topped the 8 billion mark in 2016, with only 7.5 billion people. Think about all the data floating around and how this data could be potentially relevant in the legal realm. Before we get into that, while many of the principles discussed here apply to most mobile devices, for the purposes of this article we’ll be focusing on smartphones. Smartphones are defined as any phone with advanced computing capabilities (something more than the ability to play snake) and 3G network connectivity. You might use a smartphone to browse Facebook, complete a Google search, check emails, watch a few videos, or even to complete a call.

So now that we have a definition in mind, let’s talk about smartphone use in the U.S. 95% of Americans own a cell phone of some type, while 75% own a smartphone. A majority of users consume more than 2GB (gigabytes) of data per month. Two gigabytes of data may not sound like much, however that would be equivalent to roughly two truckloads full of office documents. As if that were not enough, consider the fact that unlimited data plans are making a comeback (and that the average unlimited plan usage is 7GB per month). The high U.S. ownership numbers span across all demographics – male/female, educated or not, rich or poor. In fact, the only demographic that has less than a 50% smartphone penetration is the 65+ age range – those who already spent a majority of their lives without cell phones.

All of these users – young or old – are using their phones for a number of tasks. They’re sending text messages, they’re checking emails, they’re reading on WebMD about how their headache might mean they have a life-threatening disease (they don’t, but WebMD suggested it), they’re using dozens of applications (apps) – sometimes simultaneously – and they’re (rarely) making calls. Current statistics show that 80-90% of mobile device usage takes place in apps, the heavyweight being Facebook at a whopping 19% of the time spent. Messaging/Social apps fall in at 12%, and internet browsing is not far behind at 10%. Although most users are unaware of it, data associated with their activity is being written to their device (typically in real-time). This data sits idle and is innocuous until potential litigation arises.

In the event that a user’s smartphone activity is of interest, a qualified forensic examiner can easily preserve and/or search the data held on the smartphone. In my experience, the following items were generally the most useful:

  • Active and deleted text messages (deleted text messages can usually be recovered)
  • Facebook conversations (without the need for a password)
  • Internet history
  • Full content of emails
  • Audit logs (they can offer a granular view of user activity, logs of the power cycles or the last computer the phone was plugged into, applications installed, and more)

The implications of the data stored on mobile devices in general is limitless. Below are some examples of how smartphone data can be used in criminal and civil matters.

  • To determine the user’s state of mind/motive/establish an alibi
  • To determine the user’s location at a given time
  • To determine known associates
  • To uncover evidence of plans to go to work for and/or take sensitive information to a competing company
  • Justifications for child custody (or lack thereof)
  • To confirm/validate contractual terms/debts
  • Excessive internet or app usage used to deem a person “addicted to their phone” and unfit for full-time custody of special needs children
  • Proof of infidelity
  • To provide evidence of cyber bullying of a child

After reading all of this, it may seem like the world is your oyster – you can get a hold of a mobile device and all this great evidence automatically rains down from it, right? The legality of gathering this information is a little more complex than that. The biggest issue of all is the right to preserve and/or search the device/data. To determine if you have those rights or will need a court order to gain access to the phone, consider the following:

  • Did you purchase the mobile device, or did someone else?
  • Do you pay the monthly bills?
  • Did you sign anything providing another individual or company the right to access your data, or is it yours and yours alone?
  • For the parents out there – depending on your jurisdiction, the fact that you bought and pay for your child’s phone may still not be enough to allow you the right to take possession of the device and review its content.
  • Husbands and wives – depending on the shared property laws in your jurisdiction, you may or may not have the right to view your spouse’s data.

Does the right to review that data create a roadblock? Certainly. But in reality it’s little more than the thresholds for other evidence. With due legal process, the right can be obtained for a forensic examiner to preserve the devices and their contents, search that data based on the particulars, and present the findings for review. If you’re new to the incorporation of ESI (electronically stored information) in your practice, it may seem like a daunting task. But, as with any new evidence category, there are qualified experts in the digital forensics field ready to help you navigate the waters and ensure you get reliable evidence. Regardless of the type of law you practice, you likely have current cases that could benefit from the inclusion of digital evidence.


Ryan Ferreira is a Digital Forensic Examiner at One Source Discovery who specializes in mobile device forensics and call detail record analysis. He has a Master’s degree in Digital Forensics and holds the Certified Computer Examiner (CCE) designation from the International Society of Forensic Computer Examiners, among various other certifications.

Conflicting Search Warrant Rulings for Microsoft and Google

By | Criminal Defense, eDiscovery, Employment Law, Litigation | No Comments

What happened?

On February 3, 2017 a federal magistrate judge ordered Google to comply with a search warrant to produce foreign-stored emails (In re Search Warrant No. 16-960-M-01 to Google). The magistrate judge disagrees with the U.S. Court of Appeals for the Second Circuit’s Microsoft Ireland Warrant Case, which was recently denied rehearing by an evenly divided court. This decision shows that the Justice Department is asking judges outside the Second Circuit to reject the Second Circuit’s ruling — and that at least one judge has agreed.

At issue are two routine Stored Communications Act (SCA) warrants served on Google for the contents of emails. Google responded with the emails that it knows were stored inside the United States, but it refused to turn over emails that could be outside the United States. Because Google breaks up its emails and the network might distribute them anywhere in the world, Google can’t know where many emails are located and declined to produce them under the Second Circuit’s Microsoft case.

The government moved to compel Google to produce all of the emails within the scope of the warrant. Magistrate Judge Thomas J. Rueter ruled that Google has to comply with the warrant in full because “the conduct relevant to the SCA’s focus will occur in the United States” even for the data that is retrieved from outside the United States. According to the judge:

“…[T]he invasions of privacy will occur in the United States; the searches of the electronic data disclosed by Google pursuant to the warrants will occur in the United States when the FBI reviews the copies of the requested data in Pennsylvania. These cases, therefore, involve a permissible domestic application of the SCA, even if other conduct (the electronic transfer of data) occurs abroad.”

The court reasoned that when a network provider is ordered to retrieve information from abroad, that copying of information abroad and sending back to the United States does not count as a Fourth Amendment “search” or “seizure” outside the United States, stating “Electronically transferring data from a server in a foreign country to Google’s data center in California does not amount to a “seizure” because there is no meaningful interference with the account holder’s possessory interest in the user data.”

Further, the court saw no search abroad: “When Google produces the electronic data in accordance with the search warrants and the Government views it, the actual invasion of the account holders’ privacy- the searches – will occur in the United States.”  Because the search and seizure occurred in the United States, not abroad, the relevant privacy invasion was domestic and a domestic warrant could order it.

Legal Analysis

Bob Dibert is a Member at the Frost Brown Todd, LLC Louisville office practicing business litigation and electronic data discovery, privacy & security law. Referencing the warrants to Google and Microsoft, Dibert states, “These cases show how courts can focus on factual details in reaching different results when the law is uncertain.”

“In Microsoft, the data was located in a different country – the Republic of Ireland – and the account (perhaps including the account holder) was in or proximate to Ireland. In Google, the most that could be said about the data was that at least some of it was located somewhere outside the U.S., at least some of the time.”

It’s not clear what the reactions will be, if any, of other nations where US companies store data. While data privacy laws in European Union countries have tightly restricted access to their citizen’s data, particularly by outside nations, treaties and legal agreements include provisions for transferring data for criminal matters.

Dibert elaborates, stating, “Although neither decision discusses the context specifically, the Republic of Ireland has both legislation and treaties to provide assistance to foreign prosecutors and courts in criminal matters. And, it was a challenge in Ireland that ultimately declared U.S. laws to provide inadequate privacy protections for citizens and data located in the European Union (including Ireland). The specific case, Schrems v. Data Protection Commissioner, No. C-362/14 (Court of Justice of the European Union, Oct. 6, 2015), involved transfer of a European user’s Facebook data from Ireland to U.S. servers. So Google did not involve territory where it might have been prudent for Microsoft to tread lightly.”

Where do we go from here?

Many law experts believe that the actions ordered by the judge would still be considered seizure, citing Orin S. Kerr, Fourth Amendment Seizures of Computer Data, 119 Yale L.J. 700, 700 (2010), which argues that copying Fourth Amendment-protected files seizes them under the Fourth Amendment when copying occurs without human observation and interrupts the stream of possession or transmission.

Because of the ambiguity of the location of the data that results from the methods Google uses to store data, some data service providers may re-think whether to pursue this hybrid model as opposed to the more “cut-and-dry” methods. Will Google completely overhaul the way they store data?  Probably not. But by appealing the decision, they will force the issue with the courts to address the Fourth Amendment ambiguities. Stay tuned.

 

Suggested Quote to break out: “These cases show how courts can focus on factual details in reaching different results when the law is uncertain.” -Bob Dibert, Frost Brown Todd

andyCobbDr. Cobb currently serves as Partner at One Source Discovery, a local, full
service eDiscovery firm. He developed the strict procedures used during
forensic collections and analysis to ensure accuracy, verifiability and
repeatability. Dr. Cobb is the creator of BlackBox, the patented remote
forensic collection software tool. Prior to his position at One Source
Discovery, he was the founder and President/CEO of AC Forensics and
Assistant Professor at the University of Louisville. Dr. Cobb has served as
a consultant on hundreds of Electronic Discovery matters, provided expert
testimony on various Computer Forensics matters in Federal and State
Courts, given several talks and CLE’s related to electronic discovery, and
published numerous technology journal articles.

Brace Yourself… for the Impacts of the FRE 902 Amendments

By | eDiscovery, Litigation | No Comments

Federal Rules of Evidence 902 (FRE 902) generally outlines evidence that can be described as “self-authenticating”, meaning they don’t require extrinsic evidence of authenticity in order to be admitted. Some examples of self-authenticating documents are public records that are signed and sealed, newspapers and certified copies of government documents. Often times, trial attorneys rely on FRE 902 for the authentication of evidence that is crucial to their cases. In order for digital evidence to be introduced in court, the source of this electronic evidence (also known as electronically stored information or ESI, for short) must be verified, a process known as authentication.

Recent additions to FRE which go into effect December 2017, seek to clarify and streamline the acceptable authentication methods for system-generated electronic records and for data copied from storage media thus making it easier to authenticate ESI evidence. Later we will discuss the impacts of the amendments, but first let’s briefly review and define them.

The 902 Amendments
“(13) Certified Records Generated by an Electronic Process or System. A record generated by an electronic process or system that produces an accurate result, as shown by a certification of a qualified person that complies with the certification requirements of Rule 902(11) or (12). The proponent must also meet the notice requirements of Rule 902(11).”

Here an electronic process or system can mean any IT system, for example, an email system.

“(14) Certified Data Copied from an Electronic Device, Storage Medium, or File. Data copied from an electronic device, storage medium, or file, if authenticated by a process of digital identification, as shown by a certification of a qualified person that complies with the certification requirements of Rule 902(11) or (12).”

Here an electronic device could be a phone or a laptop, for example. A storage medium could be a thumb drive, a CD or a computer hard drive.

It is Important to note that both of these additions require notice per Rule 902 (11) or Rule 902 (12), which stipulates, among other things, that the certification be produced to opposing parties for inspection, thus opening the door for a possible certification/authentication challenge.

The amendments will have broad implications on the processes that data custodians and attorneys follow when producing potentially relevant ESI evidence for legal matters. Chad Main, attorney and the founder of Percipient, a legal technology company, defines data custodians in lay terms as, “a witness (or potential witness) with control of relevant evidence.” He provides the following example: Assume in a products liability case an employee authored the “smoking gun” research document and saved the document on his or her computer. The employee is the “custodian” of the document because he or she has control of it. However, the data custodian is not always the owner of the data. The data custodian can also be a system administrator or IT department within an organization.

One of the biggest impacts will affect the practice known as custodian “self-collection.” Self-collection occurs when the data collection is performed by custodian of the potentially relevant data, rather than independent and qualified third party. The problem with self-collection is that it takes place without the expertise or means to authenticate the data being collected. Guidance software, creator of EnCase, has identified the following eight areas of risk of self collection:

  • Employee has a potential self-interest and intentionally deletes, omits or modifies the ESI.
  • Employee has a potential self-interest and properly preserves the ESI, but opposing counsel discredits the collection based on the self interest.
  • Employee is too busy and uninterested in the case and ignores the preservation instructions.
  • Employee completes the preservation in a haphazard manner and accidentally omits relevant ESI.
  • Employee does not understand how to properly preserve relevant ESI and accidentally deletes or modifies the evidence.
  • Employee moves the ESI to another folder causing changes to important file system metadata.
  • Employee misinterprets the preservation instructions and omits relevant ESI.
  • Employee moves the data to a central location, thereby destroying the context of the document in regards to where it was originally stored.

Properly applying FRE 902 (14) will now involve using specialized digital forensic tools that support authentication methods, such as the practice known as digital hashing. Digital hashing produces a digital “fingerprint” of a chunk of data such as a file or even the contents of an entire hard drive. For example, the simple action of changing the letter “O” to the the number “0” within a file stored on a hard drive, changes the hash for the entire hard drive.

Digital forensics experts routinely use hashing methods to verify that copies of digital evidence match the original data from which the copies are made, i.e. their hashes or “fingerprints” match. The figure shows an example of a hashing algorithm called Message Digest 5 or MD5, which produces a 32-character alpha-numeric fingerprint for a file, email or entire hard drive.

Self-collection has always been inherently risky because it provides a ripe opportunity for challenges. The new amendments to the FRE place more focus on how ESI is collected and authenticated than ever before. Amendment FRE 902(14), in particular, draws a bright red line by requiring that the digital evidence be verified by a “Qualified person”. To drive home the point, the committee notes even go as far as to spell out that digital verification techniques, such as the hashing techniques discussed above, must now be used to verify digital evidence.

The impact of these amendments, especially considering the rapid volume in which data is created, should not be ignored. Experts predict that the FRE amendments, while aiming to clarify and support proper certification of digital evidence, will also provide a foundation for parties to more readily challenge the admission of digital evidence in court. To mitigate or even bypass these challenges altogether, parties presenting digital evidence would be wise to ensure that all ESI evidence is certified either by having qualified digital forensic technicians perform the preservation and collection of the ESI or by setting up reliable systems that utilize built-in, tested digital verification methods when copying digital evidence.

Your Firm is a Potential Target for Cyber Criminals

By | Criminal Defense, Data Breach, eDiscovery, Employment Law, Litigation | No Comments

Legal professionals take note: your firm is a potential target for cyber criminals. Recently, three Chinese citizens have been charged in the United States with insider trading activities based on information obtained through breaching multiple law firms. This fact illuminates that law firms are a prime target for cyber attackers. Given the nature of communication and documents that often comprise legal work product, it comes as no surprise that the same information can be used for financial gain if it falls into the hands of an unscrupulous party. Regardless of the type of cases handled by a firm, the resulting communication and work product could be useful to an attacker. For those firms working in mergers and acquisitions, the work product potentially becomes even more valuable.

The previously mentioned attack leading to insider trading activities was allegedly made possible through hacking into law firms and mining for information related to buyouts and other useful data for insider trading. To some, this comes as no surprise. Leveraging the wealth of information maintained by law firms, particularly those dealing with large corporations, is a natural and potentially lucrative avenue for cyber attackers. In Spring 2016, dozens of law firms were targeted by Russian hackers in an effort to obtain confidential information to be used for insider trading. It is clear that law firms are an enticing target for cyber criminals. Information technology and security may not be a focal point of law school, but it is a vital piece of protecting the information entrusted to law firms by their clients.

Simply put, law firms produce and store data that is often of great interest to cyber criminals. Whether it is information regarding an upcoming merger, bankruptcy, patent, or any other intellectual property, the type of data generated at law firms can be extremely valuable to attackers looking to profit from confidential information. Consider the attackers vantage point: breaching the security and gaining access to a specific corporation may yield fruitful information, but the effort and time involved in successfully hacking the company typically results in information about a single organization. If the same effort were applied to carrying out a successful cyber attack on a law firm, hackers could potentially gain access to confidential information regarding a multitude of companies in a single attack. To defend themselves, firms must take action through implementation and proper execution of cyber security policies and procedures.

It is imperative that law firms recognize the risk of a cyber attack and take appropriate actions to mitigate the chances of a data breach. There are numerous technology controls such as firewalls, intrusion detection and prevention systems, anti-virus, and sophisticated log aggregation and monitoring tools. While all of these are important and useful in their own right, it is the user that can play the most significant role in preventing or unwittingly facilitating a cyber attack. Users are more easily manipulated and coerced than firewalls and other technical measures, and must therefore be aware of the types of threats they are likely to encounter and trained on spotting issues and mitigating the successfulness of an attack.

A technique known as spear phishing is one of the most common methods attackers use to gain unauthorized entry into an organization. In a spear phishing attack, a very targeted email is sent to a specific party in hopes that the recipient will click a link within the email, opening a malicious attachment, or otherwise unintentionally degrade the security of the system enough to allow the attacker access. Spear phishing emails often contain seemingly personalized information, addressed to the correct recipient and perhaps referencing a past event the recipient spoke at or attended. Providing these types of details is an attempt to implicitly build trust with the recipient and detract from the true nefarious purpose of the message. In some cases, attacks like these can be blocked using technical controls. However, if not blocked by an email filter or other technical control, it is up to the recipient of the message to make the final determination on whether or not to complete the call-to-action urged in the email. This is where user awareness and training pay off. Users that are trained on spotting spear phishing attempts and other common scams can help a law firm prevent data breaches by blocking the initial effort of a cyber criminal.

Regardless of the security controls, policies, and procedures that a firm chooses to implement, it is clear that law firms are and will continue to be a target of cyber criminals. The recent charges filed against three Chinese citizens for allegedly hacking into law firms and leveraging confidential data to make millions off trades based on the stolen data is unlikely to be the only one of its kind. The valuable data held at law firms paints a target on the back of firms across the country. If your firm is lagging behind on its cyber security practices, now is the time to catch up. Protecting the information bestowed to firms by their clients extends well beyond the confines of the courtroom and into the digital realm of networks, data, and hackers looking to take advantage of vulnerable systems.

Jason Hale is a Digital Forensic Examiner at One Source Discovery who specializes in incident response. Jason has a Master’s degree in Digital Forensics and holds the Certified Computer Examiner (CCE) designation from the International Society of Forensic Computer Examiners and the GIAC Certified Forensic Analyst (GCFA) designation from the Global Information Assurance Certification.

Ryan Ferreira testifies about call detail records

By | Criminal Defense, Employment Law, Litigation | No Comments

Digital Forensics Expert, Ryan Ferreira, MSc, CCE explains Call Detail Records. Call Detail Records are often used when there is an allegation related to an individual being at a location at a particular time.

Looking back at 2016: Can Hillary’s emails teach us anything?

By | eDiscovery, Litigation | No Comments

The Hillary Clinton Email Saga, By The Numbers

From Visually.

 

Looking back at 2016: Can Hillary’s emails teach us anything?

by Andy Cobb, PhD, CCE

Introduction
While many cases that affected the practice of electronic discovery popped up in 2016, no eDiscovery topic got more attention or had more impact than the Hillary Clinton email server saga. Are there some lessons we can all take away from the Hillary email debacle? Yes. But before we discuss those lessons, let’s refresh our memories on what happened during the Clinton email debacle according to the USA Today’s summary:

March 2, 2015: The New York Times reports that Hillary Clinton used a private email server while serving as Secretary of State.

March 10, 2015: Clinton defends her use of a private server, saying it was for “convenience” so she could use a single device for personal and business use. “Looking back, it would have been better for me to use two separate phones and two separate e-mail accounts,” she said. “I thought using one device would be simpler. Obviously, it hasn’t worked out that way.”

July 24, 2015: The inspectors general at the State Department and Director of National Intelligence ask the Justice Department to review whether classified information was compromised in Clinton’s use of private email.

August 2015: A federal official confirms the FBI is investigating.

Aug. 11, 2015: Clinton’s campaign says she has directed that her server be turned over to the Justice Department

May 25, 2016: The inspector general at the State Department issues a report critical of Clinton’s use of private email, saying department policies dating to 2005 require that “normal day-to-day operations” be conducted on government computers.

July 1, 2016: Attorney General Loretta Lynch says she will accept recommendations from the FBI and career prosecutors in the email case in an attempt to dispel criticism of her potential conflict of interest after she met with former president Bill Clinton on a Phoenix tarmac.

July 2, 2016: Clinton is interviewed by the FBI for 3-1/2 hours in Washington, D.C.

July 5, 2016: FBI Director James Comey announces the recommendation not to prosecute Clinton.

October 28, 2016: In a letter to Congress, Comey says the FBI is reviewing new emails related to Clinton’s time as secretary of state, according to a letter sent to eight congressional committee chairmen. The emails are discovered as part of an investigation into Anthony Weiner and were sent or received by Clinton aide Abedin.

November 6, 2016 — Based on a review of the newly discovered emails, Comey tells lawmakers that the agency has not changed its opinion that Clinton should not face criminal charges.

Sifting Through the Talking Points
After all of this, Clinton’s campaign Communications Director, Jen Palmieri said she was “glad this matter is resolved.” Trump, however, pushed back against the announcement: “Right now, she is being protected by a rigged system,” Trump said Sunday night at a rally in Michigan. “It’s a totally rigged system. I’ve been saying it for a long time. You can’t review 650,000 new emails in eight days. You can’t do it, folks.”

Actually you can – easily. And you can do it in a matter of a couple of days. It’s a matter of filtering emails by metadata (fields such as: to, from, dates, etc.). 650,000 emails become a few hundred with some smart filtering and maybe some keyword searching. Which brings us to Comey, who said the email review wouldn’t be complete until after the election. This is what we call managing expectation in our industry.

What Can we Take Away from how this played out?
From an information governance and Ediscovery perspective, Clinton’s use of a personal server to send State Department messages, some of which were at some point deemed classified, was clearly a mistake. One must keep in mind that the records/emails policies of the state department were fluid from 2000 through 2014, when they were strengthened. We’ve seen this same tightening of records retention policies in the private sector over the past decade, with the appending of the Federal Rules of Civil procedure and court decisions. Clearly she didn’t err on the side of caution, which is always the best policy. Our advice would have been to keep the email sets entirely separate – separate email accounts, separate physical server, separate service provider, separate location. Notice the emphasis on separate. There is a lesson here for all of us: keep professional and personal emails separate. At the very least, in the event of an inquiry, this practice prevents the work of having to sort out which emails are professional and which ones are personal.

BYOD and Hillary
If there was one trend that emerged in 2016 for which Clinton’s personal/State Department emails were a metaphor, and a serious topic that will remain a concern for information governance past 2016, it’s the critical importance of BYOD (Bring-Your-Own-Device) policies. These policies are designed to address issues related to an organization’s data being stored on devices that are owned by employees or associates, rather than being owned by the organization. Even though an individual may have two different email addresses, they may still have one device in a BYOD-friendly environment. So a client using their own personal device for professional and personal communication can, at the very least, complicate discovery.

For example, say a client sends you, their attorney, a question via text and a privileged conversation ensues. The following week, opposing counsel issues a discovery request for client’s phone because they believe there are relevant, non-privileged communications relating to the legal matter at hand. Now you must take the extra step (and the client must incur the extra cost) of reviewing the information on the phone since you knew there were protected text messages and possible emails, before other information is turned over.

Takeaways
The key, as was missing with Clinton’s handling of her emails, is to have in place, and follow, good records retention and BYOD policies outlining how communications should be preserved and managed. Ideally, IT (Information Technology) and the legal department should collaborate on policies for the security of corporate data (and devices that data could be transferred to/ accessed from). Specifically, policies that contain the following elements can make a big difference:

-Restrictions on usage of devices on unsecure networks, which can be common attack venues for hackers
-Encryption of sensitive corporate data should be implemented to prevent access by those other than the end-user and/or select IT staff
-Regular audits of the system to ensure securities are in place and effective
-The capability to remotely wipe a lost or stolen device

Additionally, from a legal standpoint there are certain guidelines that can prevent lawsuits arising from an employee’s loss of data. Some of those measures can be captured in an agreement signed between the employer and each employee with elements such as:

-Acknowledgement by the employee that personal data on BYOD devices is subject to potential exposure during discovery proceedings

-Acknowledgement that the data on the device may be wiped if the device is lost or stolen

-An indemnity clause, stating that while the employer will make efforts to protect employee’s personal data on devices, the employee acknowledges that data placed on the device is at risk of deletion

-Acknowledgement that the employer has the right to audit device(s) upon request

Conclusion
Hillary Clinton’s email server has brought into the public eye the complications of having personal and professional communications in the same location (and may have cost her the election!). Unfortunately, this issue is not limited to presidential candidates; it can have major impacts on individuals everywhere involved in discovery for legal matters.

andyCobb

Andy Cobb is a Partner with One Source Discovery, a full-service eDiscovery firm, and is the creator of the patent-pending BlackBox remote forensic collection software tool. He has served as a consultant on eDiscovery matters, provided expert testimony on various computer forensics matters and published numerous technology journal articles.