Post Process

Everything to do with E-discovery & ESI

Archive for the ‘Articles’ Category

Off the Beaten Path: Chess Cheats, OOPs no more, and Have You Seen OMG in the OED?

Posted by rjbiii on March 26, 2011

Would You Like to Play a Game?

Everyday we see how technology is used to better our lives. It allows us to do things we couldn’t do in the past. It helps us overcome our limitations. We’ve also seen how folks use it to game the system to their own advantage. Another example of the latter has surfaced in France, where three chess players were caught trying to…game the game:

The French chess federation has suspended three top players for violating sporting ethics at a chess olympiad in Siberia last September.

The trio are alleged to have used an elaborate scheme involving text messages and computer software to help beat opponents at Khanty-Mansiysk

How did the scheme work? Like so:

According to the French federation, while international grand master Sebastien Feller, 19, was involved in a game, Cyril Marzolo followed developments over the internet and used computer software to establish the best next move. The answer was then sent by means of a coded text message to the third member of the team, Arnaud Hauchard.

The third member would then sit himself at a particular table in the competition hall. Each table represented an agreed square on the chess board. This, according to French media reports, was the most delicate part of the operation.

Not sure how that third part worked. How one would do that without drawing attention to oneself is beyond me. All three players deny the accusation.

Carnegie Mellon Changes its CS Program

An interesting change at Carnegie Mellon is occurring. The school is eliminating OOP entirely from its basic curriculum, as stated by one of the CS Professors in his blog, Existential Type:

Object-oriented programming is eliminated entirely from the introductory curriculum, because it is both anti-modular and anti-parallel by its very nature, and hence unsuitable for a modern CS curriculum. A proposed new course on object-oriented design methodology will be offered at the sophomore level for those students who wish to study this topic.

A report from the Department’s Dean provides the following rationale:

The School of Computer Science at Carnegie Mellon University is planning major revisions to its introductory course sequence in ways that will affect not just our own students, but also the many students from across campus who take computer science courses. Major changes include: 1) revising our introductory courses to promote the principles of computational thinking, for both majors and nonmajors, 2) increasing our emphasis on the need to make software systems highly reliable and the means to achieve this, and 3) preparing students for a future in which programs will achieve high performance by exploiting parallel execution.

I remember when object oriented programming was the cool kid on the block. Oy vey.

So can I use OMG in Scrabble?

So the OED is now adding acronyms esuch as OMG, LOL, and IMHO to the official lexicon:

OMG! The exclamatory online abbreviation has won the approval of the Oxford English Dictionary.

The term — short for “Oh my God” or “Oh my gosh” — is one of dozens of new entries in the authoritative reference book’s latest online update.

….

Editors publish updates to the online Oxford every three months. The Internet version of the dictionary, which launched in 2000, gets 2 million hits a month from subscribers and may eventually replace the mammoth 20-volume printed Oxford English Dictionary, last published in 1989.

By the time the lexicographers finish revising and updating a new edition — a gargantuan task that will take a decade or more — publishers doubt there will be a market for the printed form.

I think my old-school English teachers are probably wondering WTH.

Firefox 4 Essentials

Firefox 4 recently made its debut, to great fanfare. One pre-release article gave us 10 Things to Drool over in FF4.

One of my favorite websites, Web Worker Daily, has posted its list of 11 essential add-ons.

Eye in the Sky…or Ear that’s always Near

Finally, a disturbing report from Germany provides a glimpse into the data collected by telecoms. From the article:

But as a German Green party politician, Malte Spitz, recently learned, we are already continually being tracked whether we volunteer to be or not. Cellphone companies do not typically divulge how much information they collect, so Mr. Spitz went to court to find out exactly what his cellphone company, Deutsche Telekom, knew about his whereabouts.

The results were astounding. In a six-month period — from Aug 31, 2009, to Feb. 28, 2010, Deutsche Telekom had recorded and saved his longitude and latitude coordinates more than 35,000 times. It traced him from a train on the way to Erlangen at the start through to that last night, when he was home in Berlin.

“We are all walking around with little tags, and our tag has a phone number associated with it, who we called and what we do with the phone,” said Sarah E. Williams, an expert on graphic information at Columbia University’s architecture school. “We don’t even know we are giving up that data.”

The fabled “expectation of privacy” is getting narrowing all the time.

Advertisements

Posted in Articles, Technology, Trends | Tagged: , , , , , , | Leave a Comment »

Who you gonna call? Electronic gear for “ghost busting”

Posted by rjbiii on March 24, 2011

This is a little off-topic, so I apologize in advance. Gizmag has posted an article showing the gear that “paranormal investigators” use when trying “de-ghost” your home or business. It’s a little sad that the subject is taken seriously in some quarters, but consider the following:

In a survey conducted by CBS News in 2005, it was found that 48 percent of Americans believed in ghosts. Other surveys have put the number at anywhere from around 20 to over 50 percent. While such figures certainly don’t imply that ghosts are real, they do suggest that belief in them is relatively common. When someone does suspect that a ghost is present in their home or business, they will sometimes call in “experts” to ascertain if that is, in fact, the case … and what sort of gear do these ghost hunters use to detect said spirits? We decided to find out.

And if you’re tempted (like me) to utter the immortal phrase “I ain’t afraid of no ghost,” allow me to remind you, via video, of the dangers that lurk should we relax our vigil…

Posted in Articles | Leave a Comment »

A Bad Idea…

Posted by rjbiii on March 22, 2011

Leaving your thumb drive containing child porn in a computer used by multiple employees isn’t too smart. And if your fellow employees are police officers, it’s a real bad idea.

Posted in Articles, Privacy | Leave a Comment »

Off the Beaten Path (Weekend musings, March 12, 2011):

Posted by rjbiii on March 13, 2011

Data is Beautiful

Flowing Data posts a its review of the latest book in the Beautiful Data series. From the article:

While visualization can get very technical, the authors do a good job of keeping things abstract enough so that you know what they’re talking about even if you’re not particularly experienced in the field. They provide enough detail though that it’s still interesting for others.

A lot of people who are interested in visualization think that’s it’s a matter of learning a bunch of tools, but there’s a lot more to it than that. You’re also learning about data, and learning what questions to ask, and if you don’t know what questions to ask, you just end up with visualization that doesn’t really mean anything. Design also plays a role in in conveying the message you want. So it’s great that there’s a resource that can help you get into the experts’ heads.

If anything, it’s just fun to read about the process of how a graphic or tool gets made. For example, Jonathan Feinberg, who designed the ever popular Wordle, explains what went into the work. Some people like to knock it, but he knows plenty well that the stylized word clouds aren’t the best way to visualize data or extract information, or whatever.

Dude…where’s my car?

You may have seen the news that UCSD researchers had engaged in experiments to take control of your car’s computer using various methods, including this one:

But their most interesting attack focused on the car stereo. By adding extra code to a digital music file, they were able to turn a song burned to CD into a Trojan horse. When played on the car’s stereo, this song could alter the firmware of the car’s stereo system, giving attackers an entry point to change other components on the car. This type of attack could be spread on file-sharing networks without arousing suspicion, they believe. “It’s hard to think of something more innocuous than a song,” said Stefan Savage, a professor at the University of California.

Tagging without permission is…permissible Facebook

Evan Brown, the lawyer behind the blog Internet Cases, posts a summary of the issue of “tagging” information on Facebook. From the article:

The court rejected the mother’s assertion that the photos should not be considered as evidence. She argued that because Facebook allows anyone to post pictures and then “tag” or identify the people in the pictures, she never gave permission for the photographs to be published in this manner. The court held that “[t]here is nothing within the law that requires [one’s] permission when someone takes a picture and posts it on a Facebook page. There is nothing that requires [one’s] permission when she [is] “tagged” or identified as a person in those pictures.”

Linking to Trouble

Well, I’m glad Homeland Security is on top of things like this. I feel much safer now.

In a case against a New York website owner, the Department of Homeland Security (DHS) is claiming that merely linking to copyrighted material is a crime.

DHS, along with Immigration and Customs Enforcement (ICE), seized Brian McCarthy’s domain, channelsurfing.net, in late January. The site has now been replaced with a government warning: “This domain has been seized by ICE – Homeland Security Investigations, Special Agent in Charge, New York Office.”

“It is unlawful to reproduce copyrighted material, such as movies, music, software or games, without authorization… First-time offenders convicted of a criminal felony copyright law will face up to five years in federal prison, restitution, forfeiture and fine.”

The advocacy group Demand Progress has claimed that McCarthy never reproduced copyrighted material, and that his website simply linked to other sites.

Posted in Articles, Technology, Trends | Tagged: , , , | Leave a Comment »

Around the Block (March 10, 2011): EU Privacy laws rankle web-site owners, and Howrey’s possible dissolution caused by E-Discovery Vendors?

Posted by rjbiii on March 10, 2011

Web Operators inside the UK are complaining that E.U. Privacy directives are putting them at a competitive disadvantage. The Government’s Information Commissioner has stated that “explicit consent” must be given by users before sites can place cookies that “track” their activities on their computers. From the Article:

The reaction [to privacy laws] from start ups has been strong and angry. Nick Halstead, CEO of U.K. start up Mediasift, behind the very popular Tweetmeme service, has been vociferous in his condemnation.

“If users are presented with a pop up every time a cookie is going to be set, they are simply going to go to sites outside of Europe that are not hampered in the same way. It will put us at a major disadvantage compared to American sites.

“On our site, if you re-tweet we set a cookie. That cookie remembers other stories you have re-tweeted. Now that should be a useful thing for users. But you could say that is tracking them.”

Mr. Halstead called on governments to tread very lightly…

See a brilliant interactive demo of what the user experience might look like here.

In the chaos now hovering at Howrey, apparently one party being blamed for the firm’s collapse is E-Discovery Vendors. The quote that got my attention:

Another challenge was the rise of third-party document-discovery specialists that could provide litigation support services at substantially lower rates, he said. Howrey, a law firm with many offices in big cities, and thus, higher costs and couldn’t compete, he added.

Perhaps the problem wasn’t competition, but scope creep on the part of the firm. Lawyers should practice law, and manage the process of e-discovery. Competing with technology firms in a technology field when it isn’t a “core business” is a bad idea. The complaint is that vendors were more efficient than was Howrey at processing data. The firm was, therefore, unable to charge above-market prices for its EDD services, and apparently, this was a vital revenue stream for them. My opinion is that the “law firm as technology vendor” model doesn’t work. Howrey is exhibit A.

Leita Walker and Joel Schroeder pen an article on how to locate and use evidence from social media sites. In, Making Your Case with Social Media, they write:

[I]t’s never too early to start poking around. As soon as counsel contemplates suing or believes their client may be sued, they should investigate their opponent’s online presence. Once litigation commences, litigants may restrict their privacy settings — or remove the sites altogether — making it much more difficult to readily access potentially game-changing evidence.

Of course, once discovery commences, lawyers can employ more formal methods of fact-gathering and move to compel that evidence if met with opposition. Interrogatories should seek to identify an opponent’s screen names and relevant social media usage. Requests for production should seek blog entries and social media posts, and requests for admission should be designed to authenticate such information. In addition, counsel should be prepared to talk about social media and its production format at a Rule 26(f) or other discovery conferences.

Finally, before offering such evidence in court, counsel should be prepared to respond to objections related to relevance, hearsay, and authentication. With regard to the latter, the threshold for admissibility is low, and can be satisfied by the testimony of a witness who has personal knowledge that the evidence is what it purports to be. In fact, courts have held that website printouts need not be authenticated by the site’s owner but can be authenticated, for example, by an attorney who testifies that she visited a particular site, recognized it as the opposing party’s, and printed what she saw on the screen. Jarritos, Inc. v. Los Jarritos (2007).

Posted in Articles, Authentication, International Issues, Privacy, Social Media Sites | Tagged: | Leave a Comment »

Around the block-March 8, 2011: Notes on Facebook and Predictive Coding

Posted by rjbiii on March 8, 2011

A few articles of note that affect electronic discovery, forensics, or cyber-security:

Predictive coding has been a hot topic, and at Prism Legal, Ron Friedman posts his thoughts on how it should be handled by courts:

[Courts] should presume that predictive coding is reliable. The burden of proof should shift to predictive coding opponents to show that it is not reliable.” Let the proponents of human review explain to the court why diverging expert views is better than consistent computers.

Agreed. “Relevance” is ultimately determined by the court. In “human review,” a lead attorney formulates a set of guidelines for document reviewers to follow. This formulation is based on his understanding of the case subject matter, the scope of discovery requests or other communications by the opposing party, and any direction he might receive from the court. The attorney’s understanding of relevance is, in theory, based on an honest attempt to obtain an understanding of the court’s definition of “relevance” for the instant matter. The guidelines then sent down to those attorneys reviewing documents is an attempt to accurately propagate this understanding. Obtaining consistency (and of course, accuracy, to the extent that term can be used here) between reviewers is a difficult (and often, costly) process requiring diligence and proper project management.

The larger the review team, the greater the challenge. Predictive coding offers the promise of greater consistency. To test its validity, however, the components that might be scrutinized are: the efficacy of the technology used, any “rules” created that affect the tool’s method of classification, and the methodologies behind any creating “sample” datasets used to “train” the tool on what is relevant and what is not.

EDiscovery map offers a primer in how to collect from EU-based data sources.

There is a serious conflict for US firms with affiliates in EEA countries, when they get involved in civil litigation within the US: On the one hand, Federal and State rules mandate retention and production of all relevant data, even data located outside of the US, with the risk of severe penalties by the Courts in case of “spoliation”, and on the other hand, EU data protection laws (applicable to the EEA) mandate very strict data protection rules for “personal data” of their residents, that seriously restricts processing of personal data and transfer of those data to “non-adequate” countries outside of the EEA, with risks of steep fines in case of transgression.

Continuing on, we’ve argued about this before, but the ABA posts an article explaining why e-discovery is killing legal jobs. Not that I agree with the assessment.

The ACEDS staff takes on the subject of EDD and social media:

One of the important issues involved in social networking evidence is admissibility. The Federal Rules of Evidence require evidence to be authenticated before it can be admitted in court. With nearly everyone having the power to create accounts and claim to be someone else, how can one prove the true identity of a username in court?

To help establish authenticity of information gathered from social media sites and intended for use as evidence, testimony from the person who obtains printed screenshots from the social networking web page should be documented, along with details of how and when the pages were accessed and printed.

I agree with this…but I’m not sure how authentication of social media content differs from that associated with the collection of any other website. On the same topic, we now read of Facebook’s “self-collection” tool, which the company has provided its users:

Now, 500 million users of the most popular social network on the planet (which includes not just individuals, but organizations as well) have a mechanism to “self-collect” their data for their own use and safekeeping. Or, they can “self-collect” for use in litigation. In his article, Craig [Ball] likens Facebook’s download function to Staples’ famous easy button. How can an attorney argue an overly burdensome collection when you simply have to click a button?

Discovery requests for Facebook-related data may become ever more prevalent, if you believe Andre Yee when he says that Facebook is the new internet.

Posted in Articles, International Issues, Social Media Sites, Trends | Tagged: , , | Leave a Comment »

E-Discovery hits the Mainstream

Posted by rjbiii on March 6, 2011

The New York Times “discovers” E-Discovery

If you’re reading this, you’ve probably seen the NYT article on e-discovery, and how use of EDD apps is replacing “armies of expensive lawyers.” What was different about this article is not that it looked at the promise of better technology, or that it discussed savings in the discovery phase because of new software, but rather that it used the fact that by better using the new technologies, some attorneys were out of a job. So, the article used e-discovery as a microcosm for the national economy, comparing document reviewer job losses to losses by workers in other fields. The Times refers to a process of “hollowing out” the American economy. While that is interesting, I don’t find the comparison particularly accurate.

I admit that a cottage industry in document review has formed, driven by the obligations imposed by our legal system. The growth of the legal document review industry has accelerated, driven by new technologies and the embrace of “ESI” as relevant objects of examination by the courts and lawmakers. But practicing law, at least at its core, has very little to do with the process of finding and culling most of the documents found in data-sets on a company’s IT infrastructure. Admittedly, the action of classifying a document or file by a reviewer “responsive,” “privileged,” or “not relevant” does involve using judgement, and that judgment must be informed by the legal context in which the review operates. Furthermore, the protocol used to “conduct a reasonable inquiry” into the existence and location of relevant documents must certainly be executed under the management of an engaged and knowledgeable attorney. E-discovery is, in my opinion, a legal project, and not one for IT.

That said, we are currently in a place where e-discovery legal expenses are disproportional to those expenses associated with the rest of the matter. Ultimately, lawyers do not go to law school and into their profession to read and classify computer files. They are not librarians or IG specialists. Most don’t want to be. So, the replacement of “armies of expensive lawyers” made possible by e-discovery technology is something of a “restorative” medicine to the legal process. It should also be noted that technology also was a catalyst for the growth of much of this industry in the first place. Far from “hollowing out” skilled jobs, technology behind search and retrieval, data storage, and digitization of “hard copy” information actually led to the explosive increase of jobs in certain fields.

The trend with respect to document review, of course, will continue. Automated classification systems are being tested and, often are touted as being more accurate than “human review.” Much must first be worked out, with respect to acceptance of automated “decisions” with respect to classification methodologies, and even once implemented, some human (attorney) judgment will still be needed. But the days of huge teams of lawyers reviewing data for extensive time periods is numbered. My argument, therefore, is simply that in replacing staff who are eyeballing huge volumes of documents with an eye toward classification for relevancy, technology is not replacing lawyers who are actually practicing law (all legal definitions of that term aside), but will simply allow for the practice of law without the distractions that currently exist. At least it will, once the promise of that technology has been fully realized.

Lexician Piggy-backs on Times Article to Push Legal Project Management

Lexician uses the NYT article as a foundation to emphasis the need for increasing efficiency in E-Discovery matters, specifically by better managing them. From the post:

The NY Times is sending a message that efficiency is now part of the baseline set of “features” in choosing an e-discovery supplier, whether vendor or law firm. They’re sending that message to CFOs everywhere. It won’t take long for that message to flow down to any GCs that have been doing things “the old way.”

Technological features aside, it is also safe to mention that process, both with respect to defensibility and efficiency, has been neglected. Process will become increasingly important (and should be more of a focus than it currently is). Using technology without employing a vetted process is inviting chaos to the party.

Ralph Losey Argues with NYT

Another noted commentator in the field jumped on the NYT article as well. Losey argues that the Times’ proposition that advances in E-Discovery technology costs jobs is contrary to actual circumstances. He notes that new software creates new, highly-skilled positions, rather than eliminating them. Some of this is similar to my position above. I will quibble with the following passage:

The new technologies advancing search and review automation discussed in the story do not replace “expensive lawyers” as alleged. The new software does, however, force lawyers to learn new, more highly skilled tasks. The article seems to overlook the fact that the advanced e-discovery search and review technologies all still require lawyers to operate. They still require skilled attorneys to fit the technologies into a larger legal methodology. They still require the ESI to be understood. The software programs do not run themselves. They are only a tool. They are just a hammer, and without a carpenter, they will not build a case on their own.

Not exactly. Any time new technology comes forward, some positions are lost. Many can be transitioned to new roles, often requiring new skills, as Losey describes in his post. But there will be fewer jobs for document-reviewing attorneys in the future, due to the implementation of technologies that:

1. More efficiently cull out non-responsive data prior to review; and
2. Automatically classify documents (likely based on a human-reviewed sample created at the beginning of the review process).

While other types of jobs may emerge (in such fields as Legal Project Management, Search and Retrieval, Computer Science, etc…), this doesn’t mean that some jobs aren’t lost. They are.

This is a minor disagreement however, as I found myself in agreement with almost all of Losey’s article. I especially enjoyed the embedded Star Trek video of the trial of Capt. Kirk. Nice touch.

Posted in Articles, Trends | 2 Comments »

Around the Block-November 24, 2010

Posted by rjbiii on November 24, 2010

Around the block is a regular feature of Post Process, providing a brief survey of articles and issues of note affecting law and technology.

EU Flag
The EU “Cookie Rule” will soon go into affect. A Computer World article penned by Stewart Room notes that this entails big changes for ISPs. From the article:

These new rules focus in particular on the dropping of cookies onto our equipment. This will only be lawful if the service provider has the subscriber or user’s consent. In order for consent to be valid, it must be freely given, specific and informed, the benchmarks established by the Data Protection Directive.

The EU’s Article 29 Working Party, which is made up of the national data protection regulators and other officials, issued an opinion on cookies and the consent issue earlier in 2010, observing that the new rules will not be satisfied by default browser settings, bulk consents, web user inactivity or the use of opt-outs.

Criticisms of the rule, which appears to require user consent every time a cookie is to be dropped on a computer, include charges that it isn’t practical, that it (along with other regulations) will stifle e-commerce growth, and that such a “pro-privacy” approach will actually work to diminish the user’s enjoyment of the internet.

Facebook

Facebook May Become a More Frequent Target of Discovery. Facebook’s recent announcement that it will introduce a communication system that could replace email may complicate the lives of us working in electronic discovery. Shannon Green, in her article “Facebook Creates a Mess for EDD: Messages,” notes that the service’s large user-base having these additional tools creates additional burdens and risks for future litigants and employers:

The system has three key components: seamless messaging, a social inbox, and conversation history. Facebook engineer Joel Seligstein blogged, “You decide how you want to talk to your friends: via SMS, chat, e-mail or Messages.” Facemail messages will be clustered by sender instead of by the “antiquated” concept of using a subject line.

So far, so good. But what might be most problematic for employers is that Facebook will preserve these messages — text, chat, or smoke signals — forever.

“It’s definitely a problem in that it means these e-mails will be outside the boundaries of their retention policy,” said Rudy Rouhana, an attorney and director of product marketing at Daegis, a provider of e-discovery services. “So, if they typically delete e-mail every 90 days, 2 years, etc., they will be unable to enforce that on e-mails created in this system,” he said.

Protect your data when traveling internationally. Wired has posted an article in their “How-to” Wiki on protecting your data during border crossings. From the article:

But recently, we’ve seen incidents of computer security experts with ties to WikiLeaks and white hat hackers being stopped by government agents and having their laptops and phones thoroughly inspected.

Unless you work in computer research, or if you have ties to whistleblowers or cybersecurity journalists, the chance is very, very slim that your electronics will be searched. But even if you don’t think you’re up to anything that would arouse the suspicion of the Feds, you should still take precautions. Also, the threat of theft or snooping is something you should pay attention to, no matter how far from home you wander.

Note that these rights extend only to U.S. citizens. Any foreign visitor can be refused entry to the country by border officials on almost any grounds, even if you have a visa.

Posted in Around the Block, Articles, email, International Issues, Privacy | Tagged: | Leave a Comment »

Around the block: 10/18/10

Posted by rjbiii on October 18, 2010

A few articles of note:

Unsurprisingly, to those who have been paying attention, some of Facebook’s apps transmit personally identifiable data. This breaks Facebook’s rules and raises many of the same privacy questions that has dogged the site in recent times. From the a WSJ article on the issue:

The problem has ties to the growing field of companies that build detailed databases on people in order to track them online—a practice the Journal has been examining in its What They Know series. It’s unclear how long the breach was in place. On Sunday, a Facebook spokesman said it is taking steps to “dramatically limit” the exposure of users’ personal information.

“A Facebook user ID may be inadvertently shared by a user’s Internet browser or by an application,” the spokesman said. Knowledge of an ID “does not permit access to anyone’s private information on Facebook,” he said, adding that the company would introduce new technology to contain the problem identified by the Journal.

The Ensigns blog has posted an interesting article on Search, perhaps inaptly entitled E-Discovery Search: The Truth, the Statistical Truth, and Nothing But the Statistical Truth. It is a very good primer on search, rather than on statistical methodology that one might surmise from the title. It is, however, a good article. An example is a passage on Latent Semantic Indexing:

What does “Latent” mean? Roughly speaking, it means “hidden.” And “Semantic” means, again roughly, “meaning.”

So, the phrase is actually descriptive of what we are trying to accomplish: find the hidden meanings (patterns) in a collection of documents, not because of the specific words we choose as input, but because of the other words in the documents containing the words we did choose and their “co-occurrence” with words in other documents, documents which do not contain our search terms.

Law.com provides you 10 helpful tips for managing cases. In 10 Tips for Effective Litigation Case Management, there is more than just a nod to applying project management principles to help with ROI and making decisions, an approach of which I greatly approve. From the article:

The past decade has ushered in significant new challenges in litigation case management. These include: the explosion in electronic discovery, the increasing importance of cross-border cooperation in litigation and investigations, and the expectation that counsel will keep abreast of, and communicate to their clients, changes in relevant legal rules and precedent on a virtually real-time basis.

These challenges have been accelerated by the global financial crisis, which has led clients to become more comfortable asking for, and coming to expect, services and fee arrangements tailored to their unique needs and goals. We are in an era of increasing competition and increasingly sophisticated legal consumers. The goal must be maximizing client value without sacrificing quality service. In the end, after all, the business of law really is all about the client and achieving its objectives.

In brief, other topics include:

Posted in Articles, Privacy, Project Management, Search Engine Technology | Tagged: , , , , | Leave a Comment »

Around the Block for 9/1/10-Technical Articles of Note

Posted by rjbiii on September 1, 2010

On the Mandiant blog, Nick Harbor reflects on the topic of DLL Search Order Hijacking. Using this method, a person can, by placing a DLL file in a directory accessed by the targeted application, execute malicious code. An advisory on the subject, issued by Acros Security, can be found here.

In CSI SQL Server, Jasmin Azemovic discusses collecting evidence from MS SQL Server systems. Most of the article deals with handling and auditing logs, and it’s a nice read.

Attorney and technology consultant Craig Ball weighs in with a discussion of the the mechanics of email communications, in his article, E-Mail Isn’t as Ethereal as You Might Think.

Posted in Articles, email | Tagged: , , , , | Leave a Comment »