
The story is true. The name and location have been changed to protect potential guilt.
A few years ago, Debby Johnson, a lawyer at a large corporation based in Kansas City, contacted me about a relatively simple thing. I went from the San Francisco Institute to the Sacramento office, copied the computer's disk drive and found the email sent from the petitioner to his brothers and sisters. This case was a product liability law of tens of millions of dollars. Although plaintiffs did not have symptoms at the moment, claiming that health was impaired by international defective products. What was the product? Let's say it is coffee.
I went downtown Sacramento from the cool bay area of the summer. There it was 106 degrees. I knew I was sweating, but I was cool. I was surprised if someone else was in hot water soon.
It is not unusual to see my clients. The computer can be shipped to me in my laboratory, but Debbie was in the lawyer 's law firm of plaintiff. In the conference room of the oak panel, we received consultation with "opposite side" stainiff himself. He was sitting in the conference room with an honorable computer, but I was satisfied, but I could not find the angry e-mail that I thought was sent years ago. My client believed that this group sent e-mails to his brothers and disbelieved his argument.
I removed the hard disk from our human system, made a forensic copy and analyzed it. I was surprised that the size of the hard disk is 100 GB. The capacity drive was completely new, and it was unusual in the case just after entering the market. I was told that I was watching about 20% of the size, so I prepared for a much smaller disk drive. Fortunately, as the electronics superstore was nearby, I wore a sneaker jacket and activated my minivan / labwagon air conditioner (the beauty was just 200,000 miles on the day I wrote this) Or more). A little over for a new gear. A little later after rubber melted in 45 minutes, I returned to the scene, I wrote a letter to all sectors and cleanse up a new disk drive outright.
If satisfied, I set up the copy process. At that time, I was participating in Diskology 's Disk Jockey, but I did not seem to be able to handle a large - scale drive like that. I probably just used Byte Back with the forensic Intel box I had. I started the copying process and it went without obstacles. But while copying was in progress, I was wondering - was this not a pretty big drive being done at the time of the claimed e-mail? And in that respect, this computer was not very fast in that era. Did you really come to market before these e-mails were written? I began to doubt that the game was stolen and never found e-mails that were completely deleted on that computer.
I talked about Debby and the problem. My opinion was that it is correct that the work is useless this computer. I said that I am looking for them, but I did not want to waste customer cash. Debby asked me to investigate component problems. The era when I returned to the headquarters. I later had some inquiries on the manufacturer and several Google searches, so I was convinced that this group did not write these emails on this computer. Windows XP became too new, disk drives were modern and past weeks, computers were behind the email 1 to 2 months.
Debby was called a contradictory lawyer. I did not know why this was not the original system until he checked with his guy. Since it was not working, he found out that he set "in the trashcan curve". The court was not happy. My only solution was to copy the personal computer to nine brothers and sisters in the four provinces and look up the harassing e-mails.
Do you think they were happy to hear from me? If your brothers put you in such a place, would you be you? Each of them must agree that the perfect stranger (who worked with their beloved brothers) came to their house and could see everything on their personal computers It was. The most striking example of their dissatisfaction was from the brothers of the Green Vellette of the former Vietnamese era which was said to have not spent 2-3 years of birthday. I understood that.
The other lawyer turned out to have never telled this group that computer forensic people had to call and cooperate with them. When I told Debby the resistance of justice I opposed, I found it. She straightened it with a counsel attorney. And the next phone I went to my brother was more suited.
During the next few days I tried to copy private data from state to state, town, town, brothers, brothers, brothers, and nine innocent families. But that is a story of itself ... I spare a lot of details on you. On my return I was asked to search all the data from the protocol. I call his struggle "coffee". I printed the found reference and sent a copy to the contending attorney for judgment with the judge for privilege and relevance review. Debby and her company created only reminders, not seeing data until secret or irrelevant things were retrieved.
What did I find? I found a real email around the alleged mail. The whole family was talking about brothers' fight against coffee, individual survey of coffee, future litigation concerning coffee. At one point, someone's e-mail pointed out that this person's Burgess is looking at who's e-mail, but is it not reasonable not to talk about coffee? They agreed. They talked about "C-Word" only now.
When I did electronic discovery and digital forensic analysis, what else did I find? Well, for the most part, I can not talk about it. There are a few things that I do not want to talk to your computer, but I am convinced. There is something on my computer that I do not want to talk about either. E - Discovery must often be a fairly private process.
However, there was a particularly interesting discovery. When I called Green Beret Brother (GBB) from the town's sister and asked me to make a copy of his computer, he told me that he was obliged. When I get there, he first reads and signs a statement that I will not be held responsible for any damage of me or my equipment, unintended or otherwise Begged. I was a bit scared from a man trained in the stealth, war, and unwilling Gerlot art. However, since the paper did not look like a legal document, I signed it if it would do my job. He was pleasant enough, his music was good and the copy did not get in the way. And I survived and was not marred - plus, indeed!
In my laboratory, I found what happened last in my computer. About 1 minute after my call permission, GBB sent an e-mail to myself and deleted it immediately. Subjects were all uppercase, "coffee" was. There is no "C-Word" to deceive for him. The message in the body was simple and concise. "If you find this mail, F *** YOU !!!!!" That would be nice if he knows how to feel and can freely express it. Also, deleted pictures were attached to deleted e-mails. When it recovers, it turned out to be a very recent recent middle finger picture - probably GBB fingers. Visual AIDS helps you to understand the subject. Do not you think so?
After all, I made about 75 pages of documentation that I thought was relevant. Of course, I needed to include the mission of GBB. As expected, conflicting lawyers called everything an honorable person or a privileged person. Also, as expected, the judge allowed me to send a line to the client that modified all of the documents I made. Everyone liked it was a bit of a literate created by the GBB.
About The Brother - The court not only is not very honest he is the most important data on his original computer was discarded, he not only is evidently impaired by the coffee due to evidence and the associated e-mail There is no such thing. The incident was defeated, Debbie and her company became happy, the GBB became a legend.
This is just one of many "CSI * - Computer Forensics Files: the real case of Burgess Forensics". Please listen to more fraud stories that are not inspired by computer forensics.
* There are more than 160 definitions of CSI in acronyms.thefreedictionary.com in the free dictionary. Select Computer Scene Survey.

EmoticonEmoticon