Call Now Toll Free

888.220.3101
Hot Legal Issues. High-Tech Solutions.
toll free: 888.220.3101
Contact Us Today

Blog Archives

Just Text Me: Top 4 Questions Digital Forensics Experts Are Asked Regarding Text Message Evidence

The first text message was sent in 1994, at a time when phones did not have keyboards and the sender had to type the message on an actual computer.  Over the last twenty-three years, text messaging – texting, lol – has quickly become one of the most popular forms of communication. Whether for work or for personal communication, texting is easy, accessible, fast and efficient. Most people feel a wave of anxiety any time they mistakenly forget their phone at …

May 2017 Alert: Ransomware

To all clients and friends of Capsicum Group, LLC: On Friday, the world was hit with one of the most significant, widespread and coordinated ransomware attacks: “WannaCry” aka “WannaCrypt.” Ransomware is a malicious cyber hacker program that locks data up and encrypts data – making it inaccessible to the owner – until a ransom is paid or the data / system is restored. The ransom is typically requested in Bitcoin, an anonymized form of digital currency, and WannaCry is requesting …

How to Turn Digital Video into a Star Witness

We live in a world in which video surveillance is omnipresent. Nowadays, we hardly bat an eye at finding ourselves reflected in a closed-circuit television (CCTV) screen in a supermarket, or realizing a friend took a video from last week’s brunch and posted it to social media. Video security footage, as well as footage from casual observers, exists in nearly every dimension of society, from law enforcement to the office to the privacy of our own home webcams. When it …

Making Smart Decisions in the Early Stages of E-Discovery

In cases where digitally stored information offers definitive evidence, such as corporate fraud or intellectual property theft, the role of e-discovery is crucial. E-discovery is essentially the digital version of paper discovery, and involves the retrieval and review of electronically stored information (ESI). It is a complex and, at times, mundane task, requiring careful planning, data acquisition, review and analysis, secure storage to prevent spoliation, reliable data hosting and the production of documents that can be used in court. Typically, …

Think You Can Get Away Without a Code Review? Think Again.

When discussing security options with our clients, we frequently hear them dismiss code review as an unnecessary extra. However, that perception couldn’t be further from the truth. Code review, a process in which software code is inspected for vulnerabilities before, during and after its implementation, is a necessary part of any cybersecurity strategy, especially if your company is about to implement a new program.   Although code writers are often brilliant scientists and artists, they may not be security specialists, …

Cell Phone Encryption – What’s Your Call?

When you read a letter or post that starts… “A Message to Our Customers – This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake” – as does the letter Apple’s CEO Tim Cook recently released urging consumer involvement in the discussion regarding privacy right – do you read on or move on? Capsicum Group urges you to read on, be informed, and render your opinion regarding this …

New Year, Same White Collar Fears

It’s that special time of year again! As we turn the page on the calendar from December 2015 to January 2016, New Years’ resolutions are made, encouraging us to act with good will towards humankind, to live life ethically. Sadly, however, just because this time of year warrants promises to be the best we can be, doesn’t mean that the world gets a reprieve from greed and deception. The calls that Capsicum Group has answered to investigate cases of white …

Capsicum Group, LLC Welcomes Bill Smead, Pam King and Maritza Chang

Capsicum Group is proud to announce the recent hire of Senior Consultants Bill Smead, Pam King and Maritza Chang. The addition of Smead, King and Chang to the team propels Capsicum Group, LLC further towards the cutting edge of solving high-tech issues for its clients.  Properly presented digital evidence is irrefutable, and in some cases, digital evidence may be the only existing evidence. Capsicum’s computer forensics team is experienced in all areas of digital forensics and investigations, and has recovered …

Computer Forensics and Social Media – Another Successful CLE

Capsicum’s Sandy Goldstein and Hillary Hames conducted a CLE in Fort Lauderdale on April 1, 2015 entitled “Computer Forensics and Social Media”. The session was presented to a team of insurance defense attorneys and addressed data security, electronic discovery utilizing social media platforms, what types of private information can be found on the Internet and other public places as well as an introduction to computer forensic methods. This topic is one in a series of CLEs that Capsicum offers on …

Capsicum Presents at Florida NELA Conference

Capsicum Group’s Leeza Garber and Hillary Hames enjoyed a captive audience at the Florida NELA Spring Conference!  The presentation covered the hot topic of the use of social media in employment matters, outlined the recommended protocol for forensic investigations and highlighted developments in related case law.  We were thrilled with the response and are excited to be a resource to such a great organization!