(800) 403-0442
Social Media Discovery 101

Social Media Discovery 101

Searching Social media networks is a specialty that’s on the rise and require an expert. With billions of connected devices around the world, it makes sense that more and more civil disputes and crimes are being committed online, and there needs to be a way to investigate social media and help prosecutors and civil attorneys in their discovery efforts.

Social media is an increasingly-popular avenue for evidentiary considerations, which is why we have a dedicated social media forensics service. If you’re a victim, plaintiff, or attorney in need of collecting social media evidence, here’s what you need to know about social media forensics and how the team at Guardian can help.

Why Social Media?

There are an estimated 2.7 billion social media users around the world, meaning there are plenty of opportunities for social media to affect the outcome of your case . With access to social media right on our smartphones, we are connected to social media virtually every day.

Social media privacy agreements are changing regularly, and with stricter information security laws being introduced around the world, we are certificated experts at social media discovery and evidence collection to help you bring your case to court.

Uncovering Data on Social Media

Using Federal Rules of Evidence 902 guidelines our methods are court approved techniques, and represent the best opportunity to have your evidence admitted to the court of law. Guardian’s social media collection services can collect from various social media sites to help your case. Facebook, Instagram, Twitter, LinkedIN, YouTube, Tumblr, etc. There are limited methods and must be self-authenticating FRE 902 (14) to be approved by the court and collected by an expert.

Since social media can be altered by a user at any time, it’s important to act quickly to capture relevant information before it’s gone.

How Social Media Forensics Can Help You

Social media is a public record that can be accessed by virtually anyone, making it a solid resource to help build your case. Whether it’s fraud, identity theft, harassment, or crimes that are often conducted online, social media forensics enables you to collect data that you would not otherwise have.

Guardian Social Media Forensics

We know how important it is to act swiftly when it comes to collecting social media information. If you’re in need of a team that can get you results and help you with your next case, contact the team at Guardian for more information on our social media forensics services.

Contact Guardian Forensics
Guardian Forensics Cycling Team takes on Little Rock Cross Winds Classic

Guardian Forensics Cycling Team takes on Little Rock Cross Winds Classic

In 2019, Guardian Forensics is the proud sponsor of its first Cycling Team that will battle across the Oklahoma and Arkansas races series. The athletes on Team Guardian will compete across multiple race disciplines that include Mountain Bike Cross County, Enduro, Cyclocross, Gravel, and Road races. Team Guardian will make its first appearance in Little Rock, Arkansas February 24th at the Cross Winds Classic. The team will be anchored by Ted Neal, Northside football coach out of Fort Smith Arkansas and Alvey Matlock, a digital forensics expert out of Oklahoma.

About Us

Guardian Forensics is a technology company that provides digital forensics, electronic discovery (eDiscovery) cybersecurity & incident response consulting. Guardian offers best practices in digital forensics with clients in need of collecting, preservation, analysis of digital evidence. Our services are design for providing litigation support in Civil, Corporate, and Criminal casework.

Additionally, Guardian provides incident response and data breach assessments, ransomware, advanced persistent threat services that will verify if an attack occurred, identify the attacker’s path of entry, help eliminate the threat, and determine the overall severity of the breach. Our threat hunting assessments identify problems not normally visible to vulnerability and PEN testing.

A normal day with Guardian ranges from working with clients dealing with all types of legal issues that include:

  • Corporate investigations of Theft of Intellectual Property
  • Data Breaches, Insider threats
  • Fraud of all types
  • Sexual harassment
  • Family law such as divorce and child custody
  • Personal injury cases with distracted driving
  • Advising attorneys working in Criminal defense

Guardian also provides DMX (digital media exploitation) expertise in the federal government sector. Lastly, Guardian volunteers its services and expertise in digital forensics to law enforcement agencies in Oklahoma.

Guardian is an Oklahoma and Arkansas built company that is based in Bentonville Arkansas and Tulsa Oklahoma serving clients nationwide.

eDiscovery and Digital Privacy

eDiscovery and Digital Privacy

The digital age has rapidly shaped how we communicate and function as humans, whether it be with the iPhone, a digital medical device or a virtual gathering site such as Facebook. Most of these advancements have been positive, however, it has also brought an ominous shadow behind us.  eDiscovery is now a very essential tool in civil and criminal cases across the country, so it is important to understand how eDiscovery and digital privacy communicates. For a detailed explanation about eDiscovery and its process, click here.

eDiscovery is unique as it joins the judicial world with the technological one.  In 2018, governments globally are trying to compete with the evolution of the digital world and define individual privacy.  In the United States, there is no overarching law regarding personal data, but the right to privacy is a common law that is incorporated elsewhere and bound through several pieces of legislation.  To name a few:

 

  • Gramm-Leach-Bliley Act (GLBA)
  • Right to Financial Privacy Act (RFPA)  
  • Health Insurance Portability and Accountability Act (HIPAA)  
  • Health Information Technology for Economic & Clinical Health (HITECH) Act  
  • Children’s Online Protection Act (COPA)  
  • State Breach Notification Laws  
  • State Data Transfer Laws

 

These legislatures are in place to protect the privacy of individuals on a basic level and in their everyday lives.  However, when a court case arises that requires digital evidence there are compliance regulations for these. Both eDiscovery and digital privacy can be perplexing, so it can get rather gray on how these procedures comply with eDiscovery.

This can be a very complex topic to cover and grasp, so we recommend talking to an eDiscovery specialist and/or a lawyer if you would like details on the constitutional aspects of your case.

 

eDiscovery & Why You Should Know About It

eDiscovery & Why You Should Know About It

eDiscovery is the search, collection and analyzation of digital information on an individual in response to or for the purpose of being used in court (as evidence).  

Every person that uses electronic devices or accesses the internet has a digital record.  The nature of how these devices and/or programs process is excellent for investigative needs.  Digital records usually have a time stamp and geographical and recipient information (to name a few) and they are near impossible to destroy.  Not to mention, thousands of photos are taken of the internet per second.

Electronically stored data can be that broad, but as specific as voicemails, images, social media, emails and entire databases. so what exactly could be used in eDiscovery?  Well, anything in those categories – from spreadsheets, calendars and even your virus protection.

Think about it:  An entire legal case can be sitting on what the digital record said.

So how does eDiscovery’s process work?  If you are in a legal battle and either party would like to use electronic information as evidence, eDiscovery will be necessary.  The best way to execute this is by using a digital forensics expert. Guardian has extensive experience in building successful cases in digital forensics, eDiscovery and with law enforcement in general.  Our team works to protect the integrity of the information until it is used in court. These experts are educated on the process necessary to analyze, recover and save the information in accordance with the rules to submit evidence to the court.  

 

eDiscovery itself, however, is not merely attached to merely technology, it connects political, security, personal and constitutional pieces. Click here to get more detailed information on this collaborative effort and your digital privacy rights.

Beating the Cyberattack: Preventing Cyberattacks

Beating the Cyberattack: Preventing Cyberattacks

Owning or running a business is more than a full-time job. The bottom line is an always looming reminder that you need to do more, to produce or even sell more to keep business going. Not only that, but you also must worry about the day-to-day workings of your business. And one of the biggest concerns for many business owners is their IT needs. With the growing threat of cyber attacks and data breaches, for many businesses, it is a matter of time before they are hit with an attack. If this happens to your business, know that there is help in the form of cyber forensics professionals who can help you recover and find out who attacked you. If your company hasn’t faced an attack, the following tips are here to help you avoid future cybercrime and therefore begin preventing cyberattacks:

Monitor your networks.

Keeping a close eye on your network will help cut down on potentially harmful attacks. Your employees might hate not being able to surf the web at will but having a closely monitored and closed network will promote cyber safety.

Keep up with the updates.

Too many times, companies put off OS updates and program updates. It is seen as a loss of valuable work time that can’t be replaced. So, the updates wait. Not updating programs or OS’s means your company infrastructure doesn’t have the latest upgrades to its cyber protection as well. This leaves you vulnerable. Keep the updates up to date to keep your tech safe.

Spend the money.

When companies want to save money they usually skimp on the IT department, hardware or software. Big mistake. Not having the new or newest protective programs leaves you open for attack. What’s more, hiring under-experienced IT won’t give you the talent to keep things as safe as they should be. Don’t skimp on software or talent.

Email security is a must.

More than one employee has opened a seemingly harmless email only to allow cybercriminals access to the company database. Optimizing email security protocols and rigorous employee training makes it more difficult for criminals to gain access to your company files.

Cybercrime is a sad reality of today’s business world. Prevention is the key to saving time, money and stress. However, if you find your company has experienced a data breach or cyber-attack, contact a digital forensics investigator to find out who is responsible and how to avoid future attacks.

Digital Forensics and Corporate Fraud

Digital Forensics and Corporate Fraud

Corporate Fraud: Activities undertaken by an individual or company that are done in a dishonest or illegal manner, and are designed to give an advantage to the perpetrating individual or company.

A generation ago, company plans and assets were tangible. Filing cabinets could be found in many an office, overflowing with paper spreadsheets and ledger books full of information that made the business succeed or fail.

Today, computers, laptops, tablets, servers and cloud storage have become the repositories of company secrets and success. But like the early days of business, there have always been individuals within the company willing to cheat, steal and misrepresent to make themselves or their business come out on top.

Instead of white out and erasers used to change information on paper, files are deleted, digital spreadsheets are illegally altered and corporate fraud has become a digital battleground.

Many times, the investigation starts with a whistleblower sending an email or a phone call. Then the big guns are sent in. A Computer forensics investigator or team of investigators come in and start digging into the digital information.

Emails will be searched, digital activities mapped, information changes noted and when employees log on and off will be noted. All this data isn’t just gathered, it is organized and examined closely. Activity patterns are created and a digital footprint starts to appear for the person(s) being investigated.

Investigations don’t always need a whistleblower to start things off. Often, if upper management is suspicious of illicit activities or even quiet computer crime, a digital forensics team will be called in to investigate.

Once the information is gathered, examined and the guilty parties found, then the case can be created. Most digital forensic investigators, like the pro’s at Guardian Forensics, will give expert testimony supporting the evidence that has been found.

Litigation should be decisive with the evidence and the expert witnesses who found it testifying.

As long as there is something to be gained through fraud, there will continue to be dishonest business actions. With the help of the right computer forensic investigators, the truth will be found and the guilty punished.