Roundtable at Orange County Law Firm- Keys to Locating & Serving Evasive Subjects

Additional Reading:

Locate / Skip-Trace Investigations

Looking For Someone?  Try the Ex-Factor

Something everyone will need in one way or another, but not too many people know what it really means.

In today’s fast paced world of electronic data sharing, streaming and downloading we create a digital footprint that tells quite a story. Our location, favorite restaurants, habits, pictures and communications of all types (email, text, social media, etc.) are on one or more devices that we carry around with us all day every day. Our devices can tell the whole story and in many cases the whole truth.

Whether you carry an iPAd, iPhone, Android, Samsung Tablet, Laptop, MAC or Blackberry the data that you create, share and delete can be retrieved, recreated and searched to develop information about the past.

Your stored WiFI hotspots, your GPS location information, documents, photos, text messages and much more can be extracted using Digital Forensics.

According to Wikipedia Digital forensics is defined as a branch of forensic science encompassing the recovery and investigation of material found on digital devices, often in relation to computer crime.

Digital forensics is most commonly associated the process of e-discovery in civil and criminal cases where parties request or are required to provided information that has been stored in digital form.

The first step in the digital forensics process is creating an image or exact copy of the drive or device that you will be investigating and searching. This is a key part of the digital forensics investigation because altering data in any way that will be needed as evidence can and will cause it to be thrown out by most courts.

So, before you our your trusted IT professional start digging into the former employees computer look for signs that he or she stole a customer list or downloaded products specs to a flash drive remember that the tampering with and or altering of the metadata on that ex-employees computer could cause any and all evidence of wrongdoing to be excluded from the evidence in your case.

Additional Reading:

Digital Forensics in Domestic Cases, Infidelity & Family Law

Here are some highlights…

  1. Social Media Profiles/Backgrounds- Check your claimant’s and their spouses
  2. Surveillance/Subrosa- Technology is outpacing the privacy laws.  Know what you are getting into and the legal ramifications when you instruct your surveillance/subrosa investigators to test the legal boundaries
  3. Fraud Indicators- The cost of insurance fraud in California is $15 billion each year.  Investigation options and restrictions play a key role in fraud mitigation.

Combined Claims Conference was a Success!

IMG_0986

Additional Viewing:

Welcome Video for Exhibitors & Attendees

Thank you for visiting our booth