• Home
  • About
  • CRAIGBALL.COM
  • Disclaimer
  • Log In

Ball in your Court

~ Musings on e-discovery & forensics.

Ball in your Court

Category Archives: Computer Forensics

A Big Thanks to Rob Robinson!

19 Monday Dec 2011

Posted by craigball in Computer Forensics, E-Discovery

≈ 2 Comments

One of the pleasures of my practice is staying abreast of what others have to say about e-discovery and computer forensics.  I try not to miss much, though the chorus of voices has grown markedly in the last five years,  The challenge is choosing wisely for the quality of discourse hasn’t kept pace with the volume.  I’m in the debt of vigilant folks like Rob Robinson, a really nice guy who takes the time to run the traps of blogs and publications to insure that many voices worth hearing are heard.

Rob is Vice President of Marketing for e-discovery service provider, Orange Legal Technologies in Salt Lake City, but like your’s truly, Rob’s based in Austin.  Rob publishes his Unfiltered Orange list through all the major networking streams, so if you want Tweet updates, you can follow @OrangeLT.  I prefer the weekly compendiums which can be seen HERE, subscribed to HERE or added as an RSS feed.

Thanks, Rob!  Great work!

Share this:

  • Email a link to a friend (Opens in new window) Email
  • Print (Opens in new window) Print
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...

A Marvelous Birthday Present for the E-Discovery Community

01 Thursday Dec 2011

Posted by craigball in Computer Forensics, E-Discovery

≈ 9 Comments

Today, December 1, 2011, marks the fifth “birthday” of the federal e-discovery rules amendments. Five is the age when we leave the idle idylls of early childhood and take our first steps on the road to becoming a skilled, educated and productive adult. Five years out from the rules amendments, we’ve yet to see the legal community embrace the ABCs of e-discovery.  Educational resources remain sparse and superficial. Worse, many lawyers cling to the delusion that they can be competent advocates without understanding digital evidence in a world where nearly all evidence is digital. Most lawyers lack any training or tools to examine, sort or search electronically stored information.  Lawyers have lost touch with evidence.

Birthdays and gifts go together, and I can’t imagine a better or more timely “gift” to the e-discovery community than the introduction of a spectacularly powerful software tool called Proof Finder.  For the breakthrough price of $100 dedicated entirely to supporting child literacy, purchasers of Proof Finder will snag a tool having the core capabilities of e-discovery platforms costing thousands of dollars more.  It’s a tool with the power and price tag to get lawyers back in touch with evidence. Continue reading →

Share this:

  • Email a link to a friend (Opens in new window) Email
  • Print (Opens in new window) Print
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...

Imagining the Evidence

26 Saturday Nov 2011

Posted by craigball in Computer Forensics, E-Discovery

≈ 2 Comments

Whether you call it “predictive coding” or “technology assisted search,” the time is nigh when we will leave much of the heavy lifting of search to machines trained to find responsive documents. These tools won’t be the heuristic marvels like HAL-9000 envisioned by Arthur C. Clarke, but they probably won’t try to kill us either.

We’ll train these tools by presenting them with examples of patently responsive documents culled by flesh-and-blood reviewers from key custodians’ ESI. Using sophisticated algorithms that analyze these “seed sets” and identify patterns, the tools will ferret out other documents like the examples. Because we can train the tools to find similar ESI using any documents, we won’t be relegated to using seed sets derived from actual documents. We can train the tools with contrived documents–fabrications of items like the genuine counterparts we hope to find. I call this “imagining the evidence,” and it’s not nearly as crazy as it sounds.

Continue reading →

Share this:

  • Email a link to a friend (Opens in new window) Email
  • Print (Opens in new window) Print
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...

Down Under

25 Tuesday Oct 2011

Posted by craigball in Computer Forensics, E-Discovery, General Technology Posts, Uncategorized

≈ Comments Off on Down Under

Dear Reader,

I’ve been in Australia for a couple of weeks, at an e-discovery conference in Sydney and traveling to see this beautiful and engaging country. Please forgive the paucity of posts while I’m enjoying the land down under.

Sydney may be the most beautiful city I’ve ever seen, and save for a few in South America and South Africa, I’ve seen most of them. Having fabulous weather and generous hosts helped, but all the Sydneysiders we met were friendly and helpful. Nuix mounted a heck of a great users’ conference that encouraged a lot of advanced thinking about the direction of EDD. There aren’t enough superlatives to do the event justice. Peter Mercer of Vound Software kindly shared a day showing my wife and me the glorious northern beaches most tourists never see. So many kindnesses shared by friends and strangers.

The Blue Mountains (two hours west of Sydney) and the Great Ocean Road (southwest of Melbourne) are extraordinarily beautiful, rivaling any vistas, anywhere. Yes it’s expensive to visit Australia right now, and it’s a long flight, but it’s well worth every penny and every hour. My only regret is that I didn’t get here sooner!

Share this:

  • Email a link to a friend (Opens in new window) Email
  • Print (Opens in new window) Print
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...

Do We Need a Porn Pass?

01 Saturday Oct 2011

Posted by craigball in Computer Forensics, E-Discovery

≈ Comments Off on Do We Need a Porn Pass?

Ah, porn.  The fabric free entertainment that folks just won’t leave at home.  In his concurring opinion in Jacobellis v. Ohio 378 U.S. 184 (1964), Justice Potter Stewart famously said of hardcore pornography, “I know it when I see it.”  If Justice Stewart had practiced in the era of e-discovery, he’d know it well indeed.

Forensic examiners joke that porn is a perk of the job because we come across it so often on workplace systems, mainly in e-mail.  Most is softcore stuff or cheesecake shared more for humor than titillation; but some can be pretty raw.  It can be tortious, as well…and when subjects skew too young, a felony.

Workplace porn is a problem, perhaps nowhere more so than when it’s inadvertently produced to the other side in e-discovery.  You may wonder, “Does that really happen?”  Let me assure you it occurs with astonishing regularity; and I expect it to happen more as we trade human review for mechanized categorization techniques like predictive coding.  Say what you will about bored contract reviewers, pictures of naked folks afrolic tend to catch their eye.  Not so machines…unless tasked to look for skin tones, and even then baby pictures pass for ‘oh baby’ pictures.

As I sit here shaking my head at a production set where porn crossed over, I ask you dear reader: Do we need a porn pass?

Continue reading →

Share this:

  • Email a link to a friend (Opens in new window) Email
  • Print (Opens in new window) Print
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...

A Changing Definition of Deletion

30 Friday Sep 2011

Posted by craigball in Computer Forensics, E-Discovery

≈ Comments Off on A Changing Definition of Deletion

They’re talking about changing the federal e-discovery rules to lessen the fear and loathing attendant to preservation of ESI.

The unstated impetus is that federal judges can’t be trusted to weigh preservation and mete out sanctions in ways fairly attuned to facts and culpability. The proposed amendments seek to wrest the gavels from cranky judges whose 20/20 hindsight and outsize expectations operate to impose an impossible, perilous standard nationwide.  Or so goes the rhetoric.

It’s a crock.  We give federal judges a job for life, but can’t trust them to do that job wisely and well?!?  Did we not learn anything from the debacle of mandatory sentencing guidelines?

The proposed changes are driven by the second silent goal of sparing litigants (really their technologically challenged counsel) the chore of knowing enough about electronic evidence and information technology to make defensible decisions about preservation.  “Don’t make us learn anything,” they plead, “just make rules specific enough to protect us from not knowing.” The rub with grafting such specificity onto e-discovery is that information technology moves far more swiftly than rule making, such that amendments like those proposed principally benefit those who can’t or won’t keep up. Continue reading →

Share this:

  • Email a link to a friend (Opens in new window) Email
  • Print (Opens in new window) Print
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...

The Shadow Knows

24 Saturday Sep 2011

Posted by craigball in Computer Forensics, E-Discovery

≈ 4 Comments

“You can get anything back from a computer, can’t you?  Even the deleted stuff!”

I get that that a lot, and tend to respond, “Pretty much.”  My lawyer side wants to add, “but it depends.”  Like most in computer forensics, I tend to downplay the challenges and uncertainties of data recovery, not so much to promote forensic examination as to discourage data destruction.  Until a forensic examiner processes the evidence, it’s hard to say whether we can recover particular deleted data; but dollars-to-diamonds, a forensic exam will shed light on the parties and issues.

Lately, the likelihood of recovering deleted files on late-model Windows systems has gone way, way up, even if the data’s been thoroughly flushed from the Recycle Bin.  Microsoft has been gradually integrating a feature called Volume Snapshot Service (a/k/a Volume Shadow Copy Service) into Windows since version XP; but until the advent of Windows 7, you couldn’t truly say the implementation was so refined and entrenched as to permit the recovery of anything a user deletes from a remarkable cache of data called Volume Shadow Copies.

Volume shadow copies are old news to my digital forensics colleagues, but I suspect they are largely unknown to the e-discovery community.  Though a boon to forensics, volume shadow copies may prove a headache in e-discovery because their contents represent reasonably accessible ESI; that is, much more potentially probative evidence that you can’t simply ignore. So, for heaven’s sake, don’t tell anybody. 😉 Continue reading →

Share this:

  • Email a link to a friend (Opens in new window) Email
  • Print (Opens in new window) Print
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...

De-NISTing: De-FECTive

31 Wednesday Aug 2011

Posted by craigball in Computer Forensics, E-Discovery

≈ 10 Comments

If you’re on this turf, chances are you already know that de-NISTing is a technique used in e-discovery and computer forensics to reduce the number of files requiring review by excluding standard components of the computer’s operating system and off-the-shelf software applications like Word, Excel and other parts of Microsoft Office.  Everyone has this  digital detritus on their systems; things like Windows screen saver images, document templates, clip art, system sound files and so forth.  It’s the stuff that comes straight off the installation disks, and it’s just noise to a document review.

It’s called “de-NISTing” because those noise files are identified by matching their hash values (i.e., digital fingerprints) to a huge list of software hash values maintained and published by the National Software Reference Library, a branch of the National Institute for Standards and Technology (NIST).  The NIST list is free to download, and pretty much everyone who processes data for e-discovery and computer forensic examination uses it.  If you’re paying a vendor to de-NIST, you probably think you’re getting value for the service.  I expect nearly everybody who de-NISTs believes that they’re culling the most common operating system and application files.  I mean, that’s the whole point, right?

Sorry to burst your bubble. Continue reading →

Share this:

  • Email a link to a friend (Opens in new window) Email
  • Print (Opens in new window) Print
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...

“Whether I shall turn out to be the hero of my own life, or whether that station will be held by anybody else, these pages must show.”

20 Saturday Aug 2011

Posted by craigball in Computer Forensics, E-Discovery, General Technology Posts, Uncategorized

≈ 1 Comment

I christen this blog with words from David Copperfield, my favorite book by my favorite author, Charles Dickens.  I want the heroes of this site to be its readers: the lawyers, judges, support personnel and others with the wisdom to know they must master electronic evidence and the temerity to try.

Blogging is an indulgence and a responsibility.  If I want you to visit, I’ve got to give you something worth your time.  Here, I’ll share things I’ve picked up about electronic discovery and computer forensics, striving to make those topics as interesting, exciting and engaging for you as they are for me.  If I occasionally eke out a well-turned phrase or make you smile, all the better.  Now and then, I may indulge in a personal post about something else, but I trust you’ll skip anything that doesn’t catch your fancy. Continue reading →

Share this:

  • Email a link to a friend (Opens in new window) Email
  • Print (Opens in new window) Print
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
Like Loading...
Newer posts →
Follow Ball in your Court on WordPress.com

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,232 other subscribers

Recent Posts

  • The EDRM Isn’t Broken; It’s Misunderstood. March 18, 2026
  • Detecting Deep Fakes February 24, 2026
  • A Fun Way to Build AI Fluency February 21, 2026
  • Electronic Evidence Workbook 2026 February 18, 2026
  • The Most Important Thing I’ve Read This Year February 12, 2026

Archives

RSS Feed RSS - Posts

CRAIGBALL.COM

Helping lawyers master technology

Categories

EDD Blogroll

  • CS DISCO Blog
  • eDiscovery Today (Doug Austin)
  • Minerva 26 (Kelly Twigger)
  • Illuminating eDiscovery (Lighthouse)
  • eDiscovery Journal (Greg Buckles)
  • Sedona Conference
  • E-Discovery Law Alert (Gibbons)
  • E-D Team (Ralph Losey)
  • Complex Discovery (Rob Robinson)
  • GLTC (Tom O'Connor)
  • Basics of E-Discovery (Exterro)
  • Corporate E-Discovery Blog (Zapproved )
  • The Relativity Blog

Admin

  • Create account
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Enter your email address to follow Ball in Your Court and receive notifications of new posts by email.

Website Powered by WordPress.com.

  • Subscribe Subscribed
    • Ball in your Court
    • Join 2,084 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Ball in your Court
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

    %d