Monday, November 19, 2012
Preview for Broad Range of Criminal Activity Finds Child Pornography- 6th Cir Reverses Trial Court on Suppression
Thursday, August 2, 2012
A couple of really good recent e-discovery articles
ABA E-Discovery Expert Says Emerging Standards Are Premature
WRAPPING YOUR ARMS AROUND e-DISCOVERY
Judge Scheindlin Issues Strong Opinion on Custodian Self-Collection
Government agencies are expected to protest vociferously arguing it is overburdensome.
Tuesday, July 10, 2012
DNSChanger Surprise!
Saturday, June 16, 2012
Digital devices and miscarriages of justice
.
A 2009 study by the National Academy of Sciences sounded the alarm on faulty forensics. The report said most methods of analysis have not been “rigorously shown to have the capacity to consistently, and with a high degree of certainty, demonstrate a connection between evidence and a specific individual or source.” The report challenged the reliability of ballistics (“toolmark and firearms identification”), bite mark comparisons, blood spatter analysis, handwriting analysis and even fingerprint examination. The report said little about digital forensics, however, because it is still an “emerging” discipline.
It’s time for a critical look.
There is solid science behind much of digital forensics. We know, for example, that computer hard drives must be copied without altering the contents of the disk. Best practices in digital forensics also are solid. But digital forensic analysts don’t always follow best practice.
Consider some of the following examples, which we have witnessed in Connecticut and nearby jurisdictions.
A police officer “expert” found images from “unallocated space,” the part of a hard drive the computer isn’t using, which may contain deleted files. The officer asserted in an examination report that images retrieved from unallocated space were downloaded by the defendant and deleted.
But such an assertion is not supported by fact. Data can get into unallocated space on a hard drive in a number of ways. In this case, the only appearance of the data was in unallocated space. There was no basis for the examiner to assert that the images had ever been “files” that were subsequently “deleted.”
Here’s another example: A computer’s operating system creates hundreds of copies of the same images, which are called “restore points.” A police officer “expert” recently recovered restore points on a defendant’s hard drive that contained the same two child-porn pictures. The officer duplicated the pictures so many times that he recommended charging the defendant with possession of more than 600 images, nearly all of them the same.
Another police officer “expert” violated a court order when he searched for privileged attorney-client documents on a defendant’s computer, and then handed them over to the prosecutor.
Examination reports often include conclusions from examiners that items were “intentionally downloaded” by the defendant. But it is impossible to arrive at such a conclusion without being present when the defendant actually downloaded the material, or without a videotape of the event.
Poor training is a big part of the problem. Thousands of police officers have been trained to perform digital forensics under federal grant programs. But these police officer examiners are not required to possess any special training or education beyond a minimum level. The 40 hours or so of training they receive in the forensic software they use is typically the extent of their computer science background prior to their first case assignment.
Despite the minimal training of many digital forensics examiners, their findings are often unquestioningly accepted as fact.
Digital evidence can be compelling and it is often unambiguous. In too many cases, however, digital forensics experts make assertions about a defendant’s actions that are not supported by fact. Such errors create the risk of false conviction of the innocent and a free pass for the guilty.
We need higher standards and more professionalism in digital forensics. And we need to give digital forensics the sort of close scrutiny that all the other forensic science disciplines have been getting in recent years.
Roger Koppl, a research fellow at the Independent Institute, Oakland, Calif., is a professor of economics and finance at Fairleigh Dickinson University and director of the university’s Institute for Forensic Science Administration. Monique M. Ferraro is a lawyer and information security and digital forensics consultant at Technology Forensics, LLC, Waterbury, CT.
Read more: http://dailycaller.com/2012/06/15/digital-devices-and-miscarriages-of-justice/#ixzz1xzmYtuG4
Wednesday, May 16, 2012
ISC2 Hacked? Batten down your hatches
The ISC2 issues the most prestigious certifications offered in the field of information security- the Certified Information Systems Security Professional (CISSP, which has specializations in architecture, engineering and management), a certification which I hold, the Systems Security Certified Practitioner (SSCP), Certified Authorization Professional (CAP), Certified Secure Software Lifecycle Professional (CSSLP).
If the ISC2 people can get hacked ANYBODY can get hacked. If they aren't secure, NOBODY is secure. If you have important information, back it up and encrypt it. Just sayin.
Monday, May 14, 2012
Child Porn Decision Turns On Downloading Intent
James Kent, a public administration professor at Marist College in Poughkeepsie, N.Y., was convicted of hundreds of counts of procuring and possessing child pornography via the Internet on his work computer. Last week, New York’s highest court reversed the convictions that were based on images located in temporary Internet or “cache” folders on his computer hard drive. The national headlines shouted that the New York Court of Appeals ruled that looking at child porn is not a crime. But neither the decision, nor the technology that guided the justices toward it, is quite that simple.
What the Court of Appeals ruled is that the prosecution must show that a defendant did more than simply view images on a computer screen. According to the majority decision, “some affirmative act is required (printing, saving, downloading, etc.) to show that defendant in fact exercised dominion and control over the images that were on his screen.” But in this case, the justices ruled that the images and videos were apparently downloaded from web sites through the automatic functions of the operating system of the defendant’s computer, and thus there was no proof that the defendant knowingly committed a crime. This holding is consistent with those in some other states and federal circuits, but has not been addressed in Connecticut as yet. This is an important issue because prosecutions are regularly moving forward in the state based on images located in temporary Internet storage and a number of defendants have been convicted.
Accidental Access Generally speaking, when you go to a web site, images are downloaded to temporary storage on your computer — whether it’s a personal computer, pad, laptop or certain smartphones. This temporary storage is called “cache.” The pictures and video are temporarily stored to make it easier for your computer to display those images from the web site if you go back. It makes the processing time faster. This is an automatic process conducted by your computer’s operating system.
Yes, that means you or a client can accidentally access child pornography unknowingly. There may be pictures or videos that depict child pornography that you haven’t viewed that get automatically downloaded and stored in temporary Internet storage or cache. Yes, that means that even if you or a client accidentally access child pornography and try to delete it, if the police find out about it, they will make an arrest, push to prosecute and the resultant conviction will garner a mandatory minimum sentence of incarceration. In Connecticut, for fewer than 20 images, the mandatory minimum term is a year; for 20 to 49 images, two years; for more than 50, three years. One sentenced for a child pornography offense must register as a sex offender upon release from prison.
Compare images located in cache to files intentionally saved by the user. Files saved by a user will be found in folders like “My Documents” or “My Pictures.” Forensic software like EnCase and Forensic Tool Kit can help prosecutors, defense attorneys and their experts figure out whether files have been accessed, modified or deleted and when these actions occurred. Files located in temporary Internet storage most often are never accessed after they have been initially downloaded. That can be interpreted to mean that that the user either didn’t know the files were there or that they couldn’t access the files, or both.
Collectors of child pornography usually have many pictures and videos — they number in the hundreds, thousands, and hundreds of thousands, and serious collectors categorize their collections into folders. It doesn’t take many cases before one can discern the serious offenders.
Unallocated Space
In addition to data in temporary storage and purposefully saved files, there is unallocated space on digital media. Unallocated space may be empty. It may contain complete files, or it may contain incomplete files or data. Sometimes deleted data can be “carved” from unallocated space by forensic software. The software guesses what type of file the data once was and attempts to reconstitute it. Speculating as to the meaning of data in unallocated space is more alchemy than science or law. How the trial court in People v. Kent came to its conclusion that the defendant was guilty of possessing images located in unallocated space but not in temporary Internet is fact specific and should not be applied to data found in unallocated space in general, because unallocated space is a much different animal than temporary Internet storage.
Still, that shouldn’t diminish the impact or import of the court’s holding regarding data held in temporary storage. There are several cases holding that data in unallocated space is not knowingly possessed for the same reasons the court held that files located in temporary Internet storage are not possessed in the Kent case — because the user did not know that the files were being saved and the user could not access the files without specialized software.
In the New York case, Justice Victoria Graffeo wrote in a concurring opinion that, according to the majority opinion in the case, “it is [now] legal in New York to knowingly access and view child pornography.” But it’s not easy to prove that someone viewed something. A person can accidentally access a web site and their computer will download hundreds of pictures or videos. While it is possible to prove that a web site was visited for a certain period of time, it isn’t possible to determine what pictures on that web site someone looked at, or even if the person was looking at the web site the whole time.
Still, police and prosecutors in Connecticut have in the past and today continue to push these cases, even as New York, other states and some federal jurisdictions abandon the practice.
This isn’t a matter of advocating for child pornographers or sex fiends. Everyone agrees that child pornography is odious. The child sex assault and exploitation that the pornography chronicles is, without question, an insult to our humanity and an unrelenting victimization of the minors depicted. No one would ever marginalize those souls or minimize their anguish. Yet, to effectively deal with this issue, we must recognize that there is more to it than the pictures themselves.
Child pornography cases should interest us all because they are at the cutting edge of electronic evidence cases. We will see the most salient legal issues tested in those cases first before the principles are applied to other areas of the law. People v. Kent demonstrates the necessity of analyzing the legal issues rather than focusing on the visceral recoil we experience at the offense. It is a good case to look at because the defendant was guilty in part and not guilty in part. The court held that some of the child pornography on his hard drive was possessed knowingly — the images in unallocated space — but the images stored in cache — in temporary Internet storage — were there without his knowledge and therefore not unlawful. •
Thanks to the Connecticut Law Tribune, where this appeared in the Monday May 14, 2012 issue at http://www.ctlawtribune.com/getarticle.aspx?id=42167 online.
Thursday, April 26, 2012
HP Pavilion DV7 Review- It's Not Good
All I wanted was a basic functional laptop. I wasn't looking for anything fancy. After lots of research, I chose the HP Pavilion DV7. I had an HP before and I liked it. It was better than the Dells I've had that have gone through power cords and mother boards and hard drives. For the money, it looked like a good deal. It also has a 17" screen, which I figured would be good because I spend a lot of time at the computer (probably 10 hours a day) and I can use as much assistance as I can get with making the display readable. I've had the laptop for about a month, maybe two.
Two keys have fallen off the keyboard. I hesitate to call customer service. As I recall from my last HP, they require you to send the laptop in for service. I may as well save my time and just buy a keyboard because that is never going to happen. There is an odd thing that happens with the mouse or the keystrokes. It is either a combination of keystrokes or a super-sensitivity of the mouse, but at times the cursor flies up to a section of my document while I'm typing and will highlight a section and delete it, or insert the text that I'm typing at the point where it's landed. It can be a big productivity waster, because I find I spend unnecessary time tracking down and correcting errant cursor flitting about in my documents.
Thursday, April 19, 2012
Blackberry P 9981 - $2k for a Phone? Not Happening
Blackberry announced a new phone designed by Porche- the P 9981. Meh. Same keyboard design. Chromey and a bit thinner than my bold. New apps? Can it do all the stuff a Droid or an iPhone can? Does it have the new Microsoft OS? No.
But it has augmented reality abilities and a touch screen. And RIM says it can browse the web faster. All for a mere $2,000.
Did I say $2,000 for a Blackberry? Yes. And how many people are going to buy it? Four, maybe five people so they can keep them in the original box and try to sell them twenty years from now for millions because they'll be 'rare.'
I try not to let myself waste too much time speculating about things like this, but I wonder what the meetings were like that led to the pricing decision on a 2 thousand dollar cell phone. I might pay two thousand dollars for a phone if I could call the spirit world (and someone would answer) or God, maybe for a five minute conversation with the president or Dali Lama. But for a Blackberry? Seriously. I would LOVE to meet the people responsible for the pricing decision and learn from how that lapse of collective reasoning was made.
Sunday, April 15, 2012
The Cybercrime Wave that the Op-Ed Authors Didn't Address
Take a look at the article. Cybercrime isn’t defined. The authors apparently assume we know what they’re talking about. No, we don’t. Is cybercrime Internet facilitated crime that results in financial loss? Is it any activity defined by law as a crime facilitated by the Internet? What, exactly, are they talking about?
By every account, 2011 saw more data breaches than have ever. The first quarter of 2012 is on track to break that record. Online trafficking in child abuse images and infringement of intellectual property is not subsiding as more people enter the Internet community. It increases. We lack the ability to measure the rate at which these activities occur.
person per incident, if that was what the authors of the op-ed article were talking about.
Thankfully, we have seen a reduction in online auction fraud due to improvements in security and practices at the major auction sites. We have seen a drastic reduction in the number of minors lured by predators as well. Today, it is fairly safe to say that the only 13 year olds who are on chat rooms being enticed into sexual relationships are more than likely police officers.
Saturday, April 14, 2012
Electronic Discovery Publication Must Read- Gartner's Magic Quadrant
Wednesday, April 11, 2012
Eleventh Circuit Weighs in -- Encryption Key IS Protected by 5th Amendment
Out of a sense of obligation, I'm posting this update on 5th Amendment protection of encryption passwords. Ho hum. In United States v John Doe, the 11th Circuit ruled that yes, the 5th Amendment does protect one's encryption password as it is testimonial in nature. Right.
Sunday, April 8, 2012
Spam-Smishing-Cramming: Tips
Sunday’s New York Times Technology Section carried two articles that, together, provide some valuable information to cell phone users. First, you’ve probably noticed an increase in spam on your cell phone. If you’ve got texting, you’ve no doubt received at least a couple of spam messages. Apparently, there has been a large increase in phone spam in the past three years, and a spike in phishing spam- termed ‘smishing.’
As with email spam, there’s not much you can do about it. Delete it. Not much point in blocking individual numbers, because it’s unlikely that the same number will spam you more than once. You can sign up for a service that costs money to block the spam texts. You can change your phone number. Wait- no, not really, because if you discontinue your service before your contract expires, you’re subject to an early termination fee. OR, you can do what another article in the Times mentioned in the context of another topic- cramming.
Cramming is what happens when your cellphone bill gets bigger and bigger as your provider tacks on curious charges for things you didn’t ask for and don’t use. Cramming can work insidiously with smishing to make your cellphone bill unwieldy. Here’s how it works. You get an unsolicited text and respond. That gets you signed up for a service that charges your account ten bucks a month. The cellphone company gets a cut of the charge because it bills for it.
The Times blogger brought up an excellent point. Why is it that the default isn’t that all phones don’t block unrequested services unless requested? Instead, what happens is that the companies charge customers and customers pay the charges until they notice that their bills are costing them as much as their mortgages do and they take a look at the itemized bill. When cornered, AT&T and Verizon assured the Times reporter that they will block unrequested services if requested by the subscriber. Note, though, that the customer must request that the services be blocked, so don’t assume it’s happening if you haven’t made the call.
Saturday, March 24, 2012
Is Your Password Protected by the Constitution?
First, the cases. In USA v Ramona Fricosu, the defendant was ordered to decrypt her encrypted hard drive. Fricosu was accused of bank fraud and the government believed there was evidence on her laptop. She fought the order on the grounds that the government cannot force her to testify against herself, arguing that revealing her password is testimonial. The government responded that a password is not testimonial. Much like ordering a blood test from a suspected drunk driver or swab of the cheek from a suspected sex offender, a password is more like a key to a lock than an admission of guilt or testimony, prosecutors theorized.
The judge in the case issued an early decision, completely weaseling around the Fifth Amendment issue. Instead of dealing with whether or not a password is testimonial and whether or not it invokes the protection of the Fifth Amendment, the court ordered the defendant to provide the government with a non-encrypted version of the computer drive. Thats basically the same thing as providing the password, but the court avoided the big-time constitutional ramifications and the inevitable scrutiny that would ensue.
A 2009 case, U.S. v Boucher, was similar. The U.S. District Court in Vermont ordered the defendant to produce an unencrypted version of the media, avoiding the password issue.
Another recent case held that yes, indeed, a password is testimonial and does implicate the Fifth Amendment protection against self-incrimination. The U.S. Court of Appeals for the 11th Circuit thought more deeply than the common analogies to providing blood or a key to a lock. Here is what the court ruled in In re Grand Jury Duces Tecum, released March 11, 2011.
We hold that the act of Does decryption and production of the contents of the hard drives would sufficiently implicate the Fifth Amendment privilege. We reach this holding by concluding that (1) Does decryption and production of the contents of the drives would be testimonial, not merely a physical act; and (2) the explicit and implicit factual communications associated with the decryption and production are not foregone conclusions.
First, the decryption and production of the hard drives would require the use of the contents of Does mind and could not be fairly characterized as a physical act that would be nontestimonial in nature. We conclude that the decryption and production would be tantamount to testimony by Doe of his knowledge of the existence and location of potentially incriminating files; of his possession, control, and access to the encrypted portions of the drives; and of his capability to decrypt the files.
Form Over Substance
The court seemed to recognize that the mind is a more complex device than a lock. In so doing, it recognized that there is more going on with regard to information technology and securing it than securing a locker. While this recognition is important and gratifying to the information technology sector, it is academic, really a matter of form over substance.
The more important question than, Is a password testimonial, thus implicating the Fifth Amendment protection against self-incrimination? is, Does it make any difference whatsoever? The answer to that second question is twofold and can save the government and defendants lots of money and time. Heres why.
On a technical note, the government has all sorts of programs that defeat passwords. They dont really need the defendant to reveal his or her password. If they are demanding the password, its the one time in a million that they have run into a situation in which they do not have the software or decryption capability to defeat it.
If encryption is employed, a password is required to decrypt the contents. Just as with your BlackBerry or other smartphone, if you dont provide the correct password given a certain number of attempts, the contents of the media are wiped. By wiped, I mean the contents are completely scrubbed. The contents are deleted and overwritten by a neutral character, such as an x or 0 or 1.
Besides (and this may sound cynical), but as a practical matter, whos going to remember their password after all that litigation? Seriously. I had to reset the password to my blog three times last week because I forgot the password. I have to use GPS to get home from places Ive been a million times. And the government is going to order people to remember stuff when theyve been under stress and its been a year or two since theyve even accessed the system?
The probability of the defendants remembering the passwords are slim. So why bother with all the litigation for a moot point? Is it to bankrupt the defendant (because thats what usually happens)? Is it to make a point? (Really, what is the point?) Is it because the government can do it? (We do it because we can!) What happens, if at the end of the day, the defendant really has forgotten the password and the disk gets wiped of its contents? Does the government prosecute the defendant for destroying evidence? (Well, the defendant didnt destroy the evidence, the government did, didnt it?) Does the government prosecute the defendant for obstruction of justice? (Why? Because the defendant cant remember something?)
Of course, I dont have any answers. I dont proclaim to. I just have questions. Lots of them. The philosophical discussions we had in law school about password production and the Fifth Amendment were for fun. The litigation taking place now is for big money. Just walking through the door of a federal courthouse costs a defendant tens of thousands of dollars. Not chump change. Not these days. And the reverberations run deep.
By the way. . . news is that the defendant in the Fricosu case has forgotten her password. Shocking!
Courtesy of the Connecticut Law Tribune, March 26, 2012
Wednesday, March 7, 2012
Sabu Snatch- Will it Instill "Terror" in the Hearts of Anonymous?
They have LulSec’s main guy. He’s a genius. They say he’s a hacker-rockstar. But there are others. LulSec is only a teeny, tiny portion of the conglomeration of hacktivists that make up Anonymous. I worry that the FBI taunts tease those geniuses who sympathize with the group and haven’t taken the plunge into deviant acts into wholesale hacking. The government has thrown down the glove, haven’t they? Seems sort of stupid, given that they’ve been compromised so many times in so many ways so much.
Tuesday, March 6, 2012
Time to Look at Computer Search Process?
Courtesy of CT Law Tribune
March 5, 2012
Last week, a Manchester Superior Court judge vacated the one remaining charge against former Granby karate instructor Patrick Lenarz, who had served nearly four years in prison on a charge of risk of injury to a minor. The reversal of his 2005 conviction was the groundbreaking remedy fashioned by Connecticut’s Supreme Court. It decided nothing less than exoneration would suffice, because an unconstitutional search of Lenarz’s home computer by the Connecticut State Crime Lab improperly divulged attorney-client trial strategy.
After Lenarz was freed, his defense lawyer, Kevin Ferry, was exultant, but he also said he had hoped the high court would also enunciate a new standard for computer searches. “In my opinion, since electronic data is such an important part of peoples’ lives now, and people keep their private thoughts and papers and lawyer communications on their iPhones and laptops, there’s got to be a fundamental change in the procedures that apply when a search warrant is issued and those things are searched. I was kind of hoping that the Supreme Court would have come up with one in Lenarz, but they didn’t.”
Watertown lawyer and computer forensics expert Monique Mattei Ferraro is thinking the same way. She left the state crime lab in 2004, just before Lenarz’s computer was brought in for examination. She’s concerned that the lab’s internal systems are not designed to focus on a search warrant, or to properly utilize specialized computer-searching software to exclude evidence for which no probable cause has been found. A new opportunity presents itself for the lab and its technicians to start doing so now, as it upgrades its procedures in the wake of last year’s temporary loss of accreditation due to its DNA lab shortcomings. At the crime lab, Major William Podgorski said that new procedures are underway to have an independent prosecutor oversee attorney-client document searches. Ferraro spoke with Senior Writer Thomas B. Scheffey.
LAW TRIBUNE: Remind me what happened to Patrick Lenarz’s computer after police began to investigate him.
MONIQUE MATTEI FERRARO: He was accused of sexual assault by a couple of his karate students, and the police who were investigating made some nexus between the sexual assault charges and child pornography. They did a search warrant for his home computer and submitted it to the computer crimes forensic unit for a digital forensic examination.n to investigate him.
Forensic technology expert Monique Mattei Ferraro said it is up to state crime lab examiners, and not just police detectives or prosecutors, to comply with terms of search warrants.
After the police got a warrant to seize the guy’s computer, within 24 hours, Lenarz’s attorney got an order from the court saying you can’t look at certain documents, because they are privileged documents intended for my lawyer. So what’s the first thing the lab does? They go in and rifle through his documents, print them out and give them to the police, who give them to the prosecution. Therein is the prosecutorial misconduct. Nobody [had previously faulted] the lab or the police. Finally, [last week], Kevin Ferry mentioned that it was the fault of the computer crimes lab. And it is unquestionably their fault. They ran roughshod over this guy’s rights. Once they became aware of these privileged documents, they went right in and looked for them, printed them out, and gave them to the police. The lab, as a government entity, is covered by the Constitution. Their position is, they don’t ask anybody for a copy of the search warrant or consent to search because “the police officers tell us what to look for, and we trust that they’re going to tell us the truth.” That’s not right — the examiner is ultimately responsible.
LAW TRIBUNE: Why is a warrant so important for a computer search?
FERRARO: [A computer] contains an enormous amount of information — more than your house does, more than the Library of Congress, potentially. If the average murder scene is a bedroom, imagine that a computer hard drive is the equivalent of the Town of Wilton or the City of Hartford — filled with all of the owner’s private thoughts and activities that may have accrued over the course of several years. When the police have access to it, they have lots of time and resources at their disposal, to look through it.
LAW TRIBUNE: There were several steps before the improper material reached the prosecutor. What went wrong here?
FERRARO: Within 24 hours of the seizure of the computer, Lenarz and his attorney obtained a court order that prohibited the examiners from looking at documents prepared for trial, that were privileged. This court order was in effect when the computer was submitted to the crime lab. Notwithstanding the order, the lab searched through the computer, they looked at the documents, printed them out and gave them over to the police. The search warrant was quite clear that the computer crimes lab was to look for child pornography. Child pornography is nothing like documents, and digital forensic software is quite able to distinguish between pictures and documents.
LAW TRIBUNE: Even computer novices know they’re completely different types of files.
FERRARO: And digital forensic software quite easily filters out any documents in a search — that’s one of the beauties of it. It’s very, very easy. You look at the search warrant, you go by the search warrant and you gather the data the search warrant tells you to look for.
LAW TRIBUNE: So what should come out of this?
FERRARO: At the very least, the Department of Public Safety and the computer crimes lab should learn some lessons from it. Certainly Mr. Lenarz’s life was damaged — he spent three years, nine months in prison because of this. I think that what happened is an indicator of the poor supervision and the bias that existed at the lab and within the Department of Public Safety at the time. I think right now there’s an excellent opportunity for the department to change their ways. And I sincerely hope they take advantage of this opportunity.
LAW TRIBUNE: What would you like to see?
FERRARO: They are still not requesting consent or search warrants before examining a computer. They don’t use a search warrant as a guide when they do an examination of a computer. They go by the request for service. ...There is nothing at the lab now that would prevent a situation like Lenarz from happening again. Nothing. •
Monday, February 13, 2012
A Minnow Swims In The Giant Legal Tech Sea
Trade show is awesome, just not geared toward small firms
Editor’s Note: Earlier this month, ALM, the parent company of the Law Tribune, presented its annual LegalTech expo in New York City. Attorney Monique Ferraro, manager of Technology Forensics LLC in Waterbury, offered to attend the event and report on it from the perspective of someone running a small law firm.
By MONIQUE M. FERRARO
The pocket protector Star Trekky side of me secretly hoped LegalTech would be a gathering of my people. So, when I walked in and spotted a guy who was dressed head to toe in an outfit that looked like he just emerged straight out of The Matrix, I was psyched.
Wrong room. Drats.
Pointed in the right direction, I entered the exhibit hall where the blue suits and armies of similarly clad “teams” clamored. Two entire floors of the New York Hilton on 6th Avenue were filled with more than 200 vendors. Without question, this event was both impressive and over-stimulating.
Legal Tech is Gotham’s annual gargantuan gathering of geeks, lawyers and their support staff. It is daunting to take on the whole two floors of exhibits, but my mission was to find software to track time and bring it into billing for a small firm. Trying to find a turn-key solution has proven frustrating so far, and demos eat up our time and resources.
We’ve narrowed down the search to a few products, but I figured that if there was a place in the world that would have what I was looking for, Legal Tech would be it. So, with empty brief case ready to receive
my SWAG (Stuff We All Get), I went in search of software. It was good to have a focus, because one could easily spend days roaming from vendor to vendor learning about the different products they offer.
It didn’t take long to fill the SWAG bag —stress ball, computer mug, a bazillion pens, a light-up ball for my dog, a Nerf thing for my son. A lot of the vendors gave away iPads. It seemed to me that the attendees probably used iPads as coasters. If the vendors wanted to impress the attendees, they should have given away helicopters. That might have made an impression.
Lots Of E-Discovery
Unfortunately, I didn’t find many products for small firms. Maybe next year when I have more time and am more familiar with the layout I’ll find more technology for the little people. Just from eyeballing the vendors, it’s a pretty fair estimate that at least half or more of them were hawking e-discovery, information management or digital forensics.
There was a lot going on with e-discovery. The field seems to have taken on a life of its own with all sorts of confusing products and services provided that, upon my review, were either just fancy names for something that’s been done for a long time or something that really shouldn’t be done by software vendors.
For instance, “early case assessment” is simply the act of taking stock of the information technology resources a party has in hand prior to producing materials for electronic discovery in a particular case. One would think that every company with general counsel would have a good idea of the electronically stored data it possesses prior to litigation. Maybe I expect too much, but it seems to me that given a particular case “early case assessment” shouldn’t require a roomful of blue suits.
“Predictive coding” is a technology patented by Recommind that purportedly automates the review process and cuts costs by 45 percent to 70 percent. By all accounts, the other e-discovery vendors were peeved when Recommind obtained the patent. Document review is wildly expensive. If it works, it will be great. If it doesn’t work, how will the results be measured and how will we know? The parties and counsel who take the risk take a big risk.
Some of the e-discovery software seems promising. Some offer de-duplication — which reduces the number of duplicate documents. There are, of course, arguments for not de-duplicating. For one thing, it takes some important decisions out of the hands of the attorney that should probably remain with the litigator rather than the software engineer. Certainly, it’s a process that should be undertaken only after the attorney has all the information about e-discovery, the electronically stored information in the specific case, and how the specific software used for e-discovery in the specific case operates.
A very interesting group of products is offered by a Hartford company. TyMetrix offers corporate legal departments software that analyzes how well their outsourced firms are doing based on various performance measures. But general counsel aren’t the only beneficiaries. The company delivers metric software for law firms to track their productivity and compare themselves against competitors in the market.
Continuing legal education sessions echoed the vendor displays. There was a session on technology-assisted review in e-discovery, a session on international e-discovery … so many classes on e-discovery that a lawyer could immerse oneself in it and theoretically learn all the angles. Again, it seems from the material and various offerings to be very complicated. But e-discovery really isn’t.
For lawyers interested in technology other than e-discovery, there were some very interesting sessions on information management and productivity analytics. There were presentations on the effects of social media on trials and juries and quite a few sessions on cloud computing. Social media discovery was buzzing everywhere. There was a session on iPad apps for lawyers.
An emerging field that one of the sessions addressed was reputation management for law firms — upon researching that topic, I found that a subscription for reputation management can cost upwards of $15,000 to $20,000 a year.
Enlist An Army
Bottom line: LegalTech New York is stunning. For big law to hook up with big e-discovery, it was a perfect match. For mid-sized law to learn about its options for e-discovery, information management and other legal technology, it was awesome. For small law, it was an amazing display of technology, but not so helpful.
To take in all that Legal Tech has to offer, one would have to enlist an army whose members would attend various programs in addition to checking out the vendors. With my little narrow focus, I was a single, very small minnow seeking a teeny piece of algae in an ocean of sharks, piranha, and barracuda vying for the blue whales.
To get the most out of the event, check out the “virtual show” online this year at www.legaltechshow.com and, later on, see how you like the vendors that plan to participate next year. It is very inexpensive to attend the keynotes and exhibits. A full-day or full-event pass is expensive, so unless you work for a big firm or have money to burn, it’s prohibitive. However, there is excellent content that is worth the investment if you look through the itinerary ahead of time and plan your schedule for a day or two well in advance. If you team up with a colleague, you can share what you learn afterward.•
Reprinted from the Connecticut Law Tribune, Published Monday, February 13, 2012
I added the pictures.
Saturday, February 4, 2012
Anonymous Update: Interception of FBI and Scotland Yard Communications
But don't let me minimize the magnitude of this event. No one has EVER done this. Intercepting law enforcement communications is a big deal. They’re supposed to be secure. It’s bad enough that the US Department of Justice website was taken down in January. Now the FBI has had its live communications intercepted. What does that mean?
Hacktivists: Robin Hoods Of The New Millenia
We saw this played out last month when the group Anonymous took down the U.S. Department of Justice, Warner Music and the Recording Industry Association of America web sites on Jan. 19. The hacks were in retaliation for the shutdown of Megaupload, an Internet site used to facilitate sharing large files, such as movies and large caches of music. The owner of the site and three others were arrested. Several million dollars in assets were seized. The Justice Department alleges that Megaupload’s primary use was to unlawfully traffic copyrighted material.
The takedown of the DOJ and RIAA sites are the most recent in a slew of exploits Anonymous claims responsibility for. Should you be concerned? Hell yes. First, let’s talk about who Anonymous is. Second, let’s talk about what that means for us lawyers and, most importantly, how that might impact us in our pockets short and long term. Finally, I offer an observation on the future of Anonymous and our information and communications technology.
Barely known a year ago, Anonymous has emerged as a powerful hacktivist group. (Hacktivists are computer network hackers who claim that their cyber crimes are motivated by political activism.) The group uses the Guy Fawkes mask as its symbol. Probably the most notorious traitor in English history, Fawkes led the Gunpowder Plot of 1605 in England. The goal of the plot was to blow up the Houses of Parliament. Although nowhere near successful, the conspirators actually got gunpowder close to Parliament. Fawkes was arrested after one of his co-conspirators sent a note alerting one of the Lords. Fawkes was subsequently tortured and executed, but he maintained his anonymity for several months under questioning. The English celebrate Bonfire Night each year to commemorate his capture and the safety of the queen. Fawkes’ effigy is burned on the fires, and the mask has become his symbol. Today, the mask is an emblem of anonymity and audacious challenge to the government.
Facilitating Uprisings
It isn’t so much that Anonymous hackers don't like the government and big business. They don’t. It’s more that their allure is that they come off looking like the Robin Hoods of the new millennium. In a very short span of time, they have amassed an enormous following and garnered the support and respect of many. Anonymous was instrumental in facilitating the uprising in Tunisia and has been central to the Arab Spring. They have been very active in the Occupy Wall Street movement, referring to themselves as, “the 99%.”
Their overarching message in blogs, on YouTube videos and in media releases is that they advocate for truth, freedom, freedom of speech on the Internet, the right of the people to protest and assemble and to right wrongs. Who can argue with that?
They have no leadership, but there are many supporters and obviously participants in the collective have signifcant technical skill sets and knowledge. Their targets have ranged from the government of Tunisia to NATO. They claim responsibility for taking down Sony PlayStation service, the CIA web site and the San Fransisco Bay Area Rapid Transit system web site. In December of 2011, Anonymous hacked Straffor — a company in the business of information security and intelligence — and used client credit card information to make donations to charitable organizations.
After the technology security company HBGary claimed to have infiltrated Anonymous, the group retaliated by shutting down the company’s phone system, hacking its web site, and publishing e-mails and other documents taken from their servers. Other victims of Anonymous attacks include the CIA, Facebook and a rapidly growing list of governments, academic institutions and corporations.
Lost Confidence
Why should we care? Well, as with terrorist attacks, when institutions we trust are compromised, that threatens our security. Our economy still hasn’t recovered from the Sept. 11 attacks. Consider the travel industry. Airlines are forever changed. Our confidence is still shaken. The hacking and security compromises of government, academic and corporate information and communications technology by Anonymous have similar ramifications.
Although it is doubtful anyone will be dissuaded from making purchases online, I don’t think anyone who knows about the incidents has the same confidence that the Justice Department web site is secure or that the RIAA is safe from attack.
It doesn’t take much. That’s the theory and success behind terrorism and hacktivism.One success reverberates to create a great sense of threat. That’s why we spent so much money on homeland security. That’s why we spent so much money on two wars. If you boil the impetus down behind all the billions of dollars spent on the security and all the billions lost in revenue by our economy, it all goes back to the events of 9/11 and the hijackers.
“Do you want to see Anonymous rise up? Try to shut down the message.” OK, we get the message that the group doesn’t want Internet censorship or oppression. But how does that jibe with law enforcement’s struggle to beat back the rising tide of cyber-wrongs — serious injustices such as online child exploitation, violent crimes, human trafficking, theft, fraud, and intellectual property infringement? If Anonymous really is the Robin Hood of the new millennium, right those wrongs for us.
Anonymous has hacked many child pornography sites and taken down large criminal enterprises in the past. If its members would concentrate more on righting those wrongs — maybe by developing technology to identify and obliterate images that depict child sex abuse or that infringe on intellectual property rights — that would free up a lot of law enforcement resources. It would also reduce our tax burden substantially. It may relieve me of a great deal of my workload, but it would be a reduction I’d be happy to take.
Friday, February 3, 2012
Oxymorons: Google Privacy v Microsoft Uber Alles
What the critics are griping about is the potential for Google to use targeted marketing across its many platforms. Google may amass our searches and send ads to our smartphone or to our gmail banner. Most of us won’t notice.
There have been calls for Congress to ‘do something.’ Um, like what? I hesitate to show my impatience, but, do folks realize that Google is actually a corporation that is out to make money and not a government entity? If you want to dictate Google policy, buy stock and get on the Board of Directors. OR, maybe you can just use . . . the. . . other Google. Hmmmm.
To that end, Microsoft has pitched its own bitch. The corporation launched a print ad campaign decrying the Google privacy policy, implying that we no longer have any protection from the prying eyes of the leering corporation and its minions. Sour grapes. Microsoft wishes it was Google. And, it wishes it could come up with both a single policy to govern all of its many concerns and track all of us as effectively and profitably as Google uber alles.
Thursday, January 19, 2012
Anonymous Struck USDOJ.gov HARD
Tuesday, January 17, 2012
Zappos and Other Hacks
6pm, another online retailer that happens to have my account information was also hacked and claims that ‘only’ the personally identifying information, like names, addresses, last four digits of the credit cards and passwords of its customers. The company assured us that our credit card information had not been accessed.
Well woop-de-do. . . Individuals don’t seem to care much about their data or where it’s stored or whether it is compromised. After all, they’re on all sorts of mailing lists and they get spammed from all directions, they’re called constantly- barraged by an endless stream of advertising. We rightly assume that the law protects us from credit card fraud and individual data breaches. The fact that our credit card information hasn’t been compromised really isn’t a big issue, is it. After all, our liability as individual consumers amounts to $50, and that’s usually waived by the credit card company in these situations. The real issue is much, much more serious.
While vendors are going around touting cloud computing, every day we hear of large scale hacks of e-commerce providers, government, cloud computing vendors and academia. What could Zappos or 6pm have done differently? How is it possible that the CIA and NATO and Straffor have been hacked?
The crux is that security is mostly a reactive endeavor. There’s only so much that can be done prophylactically. The grand plans that many security vendors market may sound sexy, but they will always be a step behind the conspiracies of the bad guys looking to breach your system and steal your data. That’s just the way law enforcement and security works. The best you can hope for is to have a good structure in place for responding to threats when they happen and a team that can assemble to both quash the security breach and anticipate future threats.
Monday, January 16, 2012
Anonymous Coverage on CNN and the History Behind the Mask
Monday, January 9, 2012
Consumer Electronics Show and Anonymous on TV this Week- YAY!
And, although the CNN website sucks and the information is not posted there, it’s reported on the network that on Sunday Jan 14 at 8 p.m. there’s going to be a program on Anonymous.
They’re the hacking group that claims responsibility for the biggest exploits of 2011. Sure, I’ll admit that buying into media coverage of a hacking group like Anonymous is the same thing as sopping up the clap trap fed to us by terrorists. But, ignoring Anonymous is something we do at our peril, apparently. They’ve hacked the CIA and NATO and Straffor. Anonymous is really scary and important because they are, no kidding, smarter than we are in lots of ways. And, we’re doing a crappy job of protect ourselves against the threats they pose.
For one thing, they’re making pretty easy work of showing up our top flight security and intelligence resources- like NATO and Straffor and the CIA. You’d think those sources would be locked down pretty tight- you know, there’d be solid access controls, encryption, if the sites were compromised they wouldn’t be back up unless they were hack-proof. NOT. Although I definitely do not subscribe to feeding the beast, I do admit we’re being taken to school. I, for one, am going to be watching.