• July 1, 2010 - Mediated Investigative Electronic Discovery
A recent Federal Courts Law Review article titled “Mediated
Investigative E-Discovery” (V4#1) asserts, in essence, that an
improved approach to the discovery process would be to have a neutral
expert perform the discovery processes for both sides in a legal case,
and also mediate disputes between the sides. The apparent motivation
is the limitations of keyword searches, but even the article itself
largely dismisses this by identifying that a different process in in
fact in use today. Indeed the article cites examples where judges are
forced to identify specific search terms for technical discovery, an
approach that defies rationality in the context of all of the things a
judge has to do and the import of a judge in the justice system.
• June 1, 2010 - The difference between responsibility and control
In providing information protection, people within an enterprise have
responsibilities defined by governance. But they also have only
limited control over what the enterprise does. A reasonable
explanation for why protection fails to meet management goals is that
the people who are responsible for protection, at all levels, don't
have or exert adequate control to affect the desired outcomes. This
difference between responsibility (R) and control (C) is at the core
of how and why protection fails, and is one of the least understood
and least measured quantities in protection today.
• May 21, 2010 - A Method for Forensic Analysis of Control
Abstract—This paper examines technical underpinnings for the notion of
control as identified in laws and regulations in order to provide a
technical basis for performing forensic analysis of digital forensic
evidence in cases where taking control over systems or mechanisms is
the issue.
• May 20, 2010 - Forensic Fonts Paper published in SADFE
Like other latent evidence that cannot be directly perceived by
people, bit sequences have to be presented through tools.
Presentations of digital forensic evidence often involve the
presentation of text versions of bit sequences representing traces of
events that took place within digital systems. This paper is about
creating fonts for the examination and presentation of particular
classes of bit sequences presented in particular ways in legal
situations. Unlike fonts used for other purposes, fonts for forensics
are less about the beauty of the presentation and more about the
tradeoff between readability and being definitive about what is
present. In other words, what you see is what you get, rather than
what you see is what looks nice.
• May 20, 2010 - Forensic Fonts Slides presented at SADFE
Read full details at http://all.net/
- This communication is confidential to the parties it is intended to
serve -
Fred Cohen & Associates tel/fax: 925-454-0171
http://all.net/ 572 Leona Drive Livermore, CA 94550
Join http://groups.google.com/group/fca-announce for our mailing list