CLE Topics
Your Digital Evidence is Lying to You
Presenter: Pete James
This CLE will explore how digital evidence can be unintentionally misinterpreted, or purposely manipulated to mislead investigators and digital forensic examiners. We will share examples of how easy it is to manipulate digital data, and discuss best practices for proper data collection so manipulation can be identified.
How Cellphone Tracking Can Help (or Hurt) Your Case
Presenter: Pete James
This 1-hour CLE explains how data saved on cellphones can authenticate locations of devices at specific times. If your client’s (or opposing client’s) location is important, learn what information is available, how accurate it is, and how to get it.
Admissibility and Use of Digital Evidence at Trial
Presenter: Brian Chase
This CLE explores the Federal Rules of Evidence applicable to digital evidence. Attendees will learn about relevant case law and how to authenticate or challenge the admission of digital evidence at trial. We will explain how to use digital evidence effectively at trial and how to incorporate it into an overarching story or theory of a case.
Search and Seizure in the Digital Realm
Presenter: Brian Chase
From Jones to Riley to Carpenter, the Supreme Court has changed the landscape of 4th and 5th Amendment law in the digital realm. This CLE will explore the effects of these landmark cases and identify areas of further challenges for the defense. Attendees will learn about how courts are applying the 4th and 5th Amendments to new forms of digital evidence and will learn to spot potential Constitutional Issues involving digital devices.
Storytelling with Digital Evidence
Presenter: Brian Chase
Storytelling is a powerful and effective way to present your case to a judge or jury, but how do you use digital evidence in a story? How can you effectively communicate technical evidence to a non-technical audience? This CLE explores why we use storytelling and how attorneys can use storytelling to effectively present complicated digital evidence in a simple and easy to follow format.
How to Find and Use Location Information in Litigation
Presenter: Brian Chase
Determining the location of an individual at a specific point in time can make or break a case. You can use location data to present an alibi in defense, discredit a witness or party, show how long someone was on the road prior to a crash, establish where a digital contract was signed, and more. This unique webinar will show you how to find and use location data in your case. We will answer your live questions and walk through real-world location analysis. You will come away knowing where to find data to support your case, as well as how to analyze some of the data yourself.
Obtaining Digital Evidence Through Discovery and Investigation
Presenter: Brian Chase
This CLE covers how attorneys can obtain digital evidence through their own investigation and through the use of discovery rules. Attendees will learn about applicable discovery rules and how those may be applied to digital evidence. This presentation will focus on the Federal Rules of Civil Procedure and the related case law.
Your Home is Spying on You – A Look at Internet of Things Forensics
Presenter: Brian Chase
More and more homes contain smart devices: Amazon Alexa, Google Home, Nest Thermostat, Smart TVs, Roombas, and more. These devices store all kinds of activities and send that data to the cloud. This CLE explores the types of data available, looks at some cases where that data was used, and discusses the law regarding the collection of this type of data.
Your Digital Evidence Is Lying To You
Presenter: Pete James
This CLE will explore how digital evidence can be unintentionally misinterpreted, or purposely manipulated to mislead investigators and digital forensic examiners. We will share examples of how easy it is to manipulate digital data and discuss best practices for proper data collection so manipulation can be identified.
Intellectual Property Theft, Following the Trail of a Digital Thief
Presenter: Pete James
This CLE will teach how intellectual property theft is committed, who commits it, and when this occurs. We will discuss the digital trail left behind and how forensic analysis can reveal what really happened.