(800) 403-0442
Lunch & Learn on Social Media and Cell Phones

Lunch & Learn on Social Media and Cell Phones

Our own Alvey Matlock was the guest speaker this month at the Benton County Bar Association’s Lunch & Learn.  His topic was Social Media and Cell Phones.  While you may have missed out on this event, there will be others.  Connect with us to learn about other speaking opportunities that Guardian Forensics can offer.

From the Benton County Bar Association March 2019 Newsletter:

Alvey Matlock is a technology and digital forensics expert with notable success, in Law Enforcement, cyber crime investigations, civil
litigation, corporate investigations, Cyber Data Breach Assessments, and criminal defense casework, training, and investigative experience.

He has 20 plus years of experience in:

  • digital forensic experience comprising of computer
  • cell phone and mobile forensics
  • field deployments in Digital Media Exploitation
  • file system forensics, deleted file recovery
  • evidence collection and imaging
  • advanced imaging of damaged drives
  • password recovery
  • registry analysis
  • JTAG forensic data acquisitions
  • expert witness court testimony and more

His certifications include: Certified Information Systems Security Professional (CISSP), Encase
Certified Examiner (EnCE), Cellebrite Certified Mobile Examiner (CCME), Cellebrite Advanced Extractions, ChipOff, Physical / Logical, XRY Mobile Forensics, Microsoft Certified Systems Engineer (MCSE), and Security+.

Alvey is also a college adjunct professor with experience course developer and public speaking. He is currently
working at the Oklahoma NSU college in the Criminal Justice Program teaching CyberCrime and Digital Forensics courses.

A 2001 graduate with honors from Arkansas Tech University, his degree was in Computer Science with an emphasis in business. Alvey
has extensive technology training and hands on experience with digital forensics, criminal forensics, civil litigation requiring forensics cybersecurity, VMware technology, Cisco networking and security, Vulnerability and Intrusion Prevention System management, and
Business Continuity and Disaster Recovery planning.

Alvey was employed with the Fort Smith Police Department from 2005 until 2017 as their Computer Crimes Investigator, and Sr. Network Manager, overseeing and supporting Public Safety technology, which includes the 911 Communications Center and Regional Mobile Data. His responsibilities have also included manager of the Crime Intel & Analyst program for the department.

Alvey is also a member of the Cyber Investigations unit as a Computer Crimes Investigator, has worked numerous digital forensics cases
involving peer-to-peer, child pornography, kidnapping, financial crimes, Internet Hacking, Human Trafficking, narcotics and property theft for several local, state and federal agencies. Alvey is a member of the Internet Crimes Against Children (ICAC) task force and also participates as a specialized officer for the Fort Smith Police Department.

Alvey is married and regularly attends service at First Baptist Church. His hobbies include piloting a drone, Crossfit, mountain biking,
hunting, and fishing. Alvey was also a proud member of the Air Force National Guard F-16 188th Fighter wing serving as a Sargent from 1996 to 2004.

eDiscovery and Digital Privacy

eDiscovery and Digital Privacy

The digital age has rapidly shaped how we communicate and function as humans, whether it be with the iPhone, a digital medical device or a virtual gathering site such as Facebook. Most of these advancements have been positive, however, it has also brought an ominous shadow behind us.  eDiscovery is now a very essential tool in civil and criminal cases across the country, so it is important to understand how eDiscovery and digital privacy communicates. For a detailed explanation about eDiscovery and its process, click here.

eDiscovery is unique as it joins the judicial world with the technological one.  In 2018, governments globally are trying to compete with the evolution of the digital world and define individual privacy.  In the United States, there is no overarching law regarding personal data, but the right to privacy is a common law that is incorporated elsewhere and bound through several pieces of legislation.  To name a few:

 

  • Gramm-Leach-Bliley Act (GLBA)
  • Right to Financial Privacy Act (RFPA)  
  • Health Insurance Portability and Accountability Act (HIPAA)  
  • Health Information Technology for Economic & Clinical Health (HITECH) Act  
  • Children’s Online Protection Act (COPA)  
  • State Breach Notification Laws  
  • State Data Transfer Laws

 

These legislatures are in place to protect the privacy of individuals on a basic level and in their everyday lives.  However, when a court case arises that requires digital evidence there are compliance regulations for these. Both eDiscovery and digital privacy can be perplexing, so it can get rather gray on how these procedures comply with eDiscovery.

This can be a very complex topic to cover and grasp, so we recommend talking to an eDiscovery specialist and/or a lawyer if you would like details on the constitutional aspects of your case.

 

eDiscovery & Why You Should Know About It

eDiscovery & Why You Should Know About It

eDiscovery is the search, collection and analyzation of digital information on an individual in response to or for the purpose of being used in court (as evidence).  

Every person that uses electronic devices or accesses the internet has a digital record.  The nature of how these devices and/or programs process is excellent for investigative needs.  Digital records usually have a time stamp and geographical and recipient information (to name a few) and they are near impossible to destroy.  Not to mention, thousands of photos are taken of the internet per second.

Electronically stored data can be that broad, but as specific as voicemails, images, social media, emails and entire databases. so what exactly could be used in eDiscovery?  Well, anything in those categories – from spreadsheets, calendars and even your virus protection.

Think about it:  An entire legal case can be sitting on what the digital record said.

So how does eDiscovery’s process work?  If you are in a legal battle and either party would like to use electronic information as evidence, eDiscovery will be necessary.  The best way to execute this is by using a digital forensics expert. Guardian has extensive experience in building successful cases in digital forensics, eDiscovery and with law enforcement in general.  Our team works to protect the integrity of the information until it is used in court. These experts are educated on the process necessary to analyze, recover and save the information in accordance with the rules to submit evidence to the court.  

 

eDiscovery itself, however, is not merely attached to merely technology, it connects political, security, personal and constitutional pieces. Click here to get more detailed information on this collaborative effort and your digital privacy rights.

Guardian Forensics is sponsoring booth at the Oklahoma Bar Annual Conference

Guardian Forensics is sponsoring booth at the Oklahoma Bar Annual Conference

Oklahoma Bar.2018, November 7-8, Guardian Booth

Guardian Forensics provides Attorneys the best in Digital Forensics, eDiscovery, & Cyber Security Services.

Supporting the Boomer Sooner Attorneys to Unlock the Truth with a combination of services in Digital Forensics, eDiscovery, and Cyber Security. Guardian will be making its presence known at this year’s Oklahoma Bar conference being hosted in Tulsa, OK. Working with the best legal professionals in Oklahoma is an honor and challenge unique to each case. Take the time to come by our booth and meet Team Guardian and one of our digital forensics experts, Alvey Matlock.

Forensics experts in Computers | Cell Phones | Cloud | Drones | Social Media

Visit Guardian Forensics

Unlocking the Truth.

These are not ordinary times. It’s imperative for you to make the right choice when selecting a digital forensics company. Visit us at the Guardian Booth and allows us to begin supporting your complex legal and regulatory challenges, constantly changing technology complexity in litigation, cyber risk, and the need to help drive a safe business strategy.

Corporate investigations include Intellectual Property | Data Breach Assessments | Employee Misconduct

Workplace Cyberbullying

Workplace Cyberbullying

Bullying seems to be a buzzword in today’s society. What was once a simple act of the big, mean kid picking on the smaller, defenseless child has moved to the new arena of cyberspace. Too many horrific stories outline the drastic actions some adolescents take to get away from the bullying. Thankfully, there are laws to protect and prosecute when it comes to school-age minors.

But outside of schoolyards, few know about the damage workplace cyberbullying has caused good employees.

As it becomes the norm to sit back and pass judgment in a few typed responses, the rise of the workplace bully has been inevitable. Emboldened by not having to think or even look that person in the eye when they send out those emails or posts, too many employees have targeted coworkers for harassment.

Employees on the receiving end of this type of bullying don’t always know where to go or who to ask for help. Is this an HR matter or do you go straight to the boss? In many cases, to make it stop, the employee first must collect some “evidence” if you will. If an employee is the subject of co-worker bullying, it’s important not to snap out a response. First, the employee needs evidence no matter how much waiting and collecting might hurt.

Being firm and up-front with the bullies and stating that you expect the harassment to end is the next step. The important thing is to remain calm and firm. Don’t waver or give them any outs when it comes to your expectations. Keep an eye out to see if they take your expectations seriously.

If the bullying persists, seek out HR or even your boss and bring your evidence to them. Sometimes, bullying can lead to job termination and the threat of being unemployed will stop the actions immediately.

For the company owner or manager, stopping cyberbullying before it starts is a better tactic. If there have been reports of misdeeds and bullying, but scarce proof, it’s time to call in a digital forensics expert to do the digging and find the culprit.

In extreme cases of bullying, where litigation gets involved, having a computer expert witness will help protect the company, victim, and ensure that the guilty party gets their punishment.

Bullying isn’t just for kids anymore. Know what you can do to protect yourself in the workplace and make a stand.
Beating the Cyberattack: Preventing Cyberattacks

Beating the Cyberattack: Preventing Cyberattacks

Owning or running a business is more than a full-time job. The bottom line is an always looming reminder that you need to do more, to produce or even sell more to keep business going. Not only that, but you also must worry about the day-to-day workings of your business. And one of the biggest concerns for many business owners is their IT needs. With the growing threat of cyber attacks and data breaches, for many businesses, it is a matter of time before they are hit with an attack. If this happens to your business, know that there is help in the form of cyber forensics professionals who can help you recover and find out who attacked you. If your company hasn’t faced an attack, the following tips are here to help you avoid future cybercrime and therefore begin preventing cyberattacks:

Monitor your networks.

Keeping a close eye on your network will help cut down on potentially harmful attacks. Your employees might hate not being able to surf the web at will but having a closely monitored and closed network will promote cyber safety.

Keep up with the updates.

Too many times, companies put off OS updates and program updates. It is seen as a loss of valuable work time that can’t be replaced. So, the updates wait. Not updating programs or OS’s means your company infrastructure doesn’t have the latest upgrades to its cyber protection as well. This leaves you vulnerable. Keep the updates up to date to keep your tech safe.

Spend the money.

When companies want to save money they usually skimp on the IT department, hardware or software. Big mistake. Not having the new or newest protective programs leaves you open for attack. What’s more, hiring under-experienced IT won’t give you the talent to keep things as safe as they should be. Don’t skimp on software or talent.

Email security is a must.

More than one employee has opened a seemingly harmless email only to allow cybercriminals access to the company database. Optimizing email security protocols and rigorous employee training makes it more difficult for criminals to gain access to your company files.

Cybercrime is a sad reality of today’s business world. Prevention is the key to saving time, money and stress. However, if you find your company has experienced a data breach or cyber-attack, contact a digital forensics investigator to find out who is responsible and how to avoid future attacks.