The Importance of Data that Doesn’t Exist – Part Two (Missing Data Sources)

By Dr Tristan Jenkinson Introduction In part one of this series of articles, I spoke about the importance of data that is not present, and the use of timelines in investigating where missing data may exist. In this article, I discuss data that may be missing (or may appear to be missing). Those working in … Continue reading The Importance of Data that Doesn’t Exist – Part Two (Missing Data Sources)

The Importance of Data that Doesn’t Exist – Part One (Timelines)

By Dr Tristan Jenkinson Introduction Happy New Year and welcome to 2023 on the eDiscovery Channel! Towards the end of last year, I saw a short post from Steve Nouri discussing survivorship bias. The principle is something that you may have seen discussed before (it regularly gets shared on sites such as LinkedIn). Nouri’s post … Continue reading The Importance of Data that Doesn’t Exist – Part One (Timelines)

Cryptocurrency – The good, the bad and the ugly

By: Dr Tristan Jenkinson Introduction Helping users who have lost access to their cryptocurrency investments is a noble endeavour… but there is definitely a sliding scale on the measure of good intentions where hackers and cryptocurrency meet. This article discusses some of the good, bad and ugly of stories from the last week (or so) … Continue reading Cryptocurrency – The good, the bad and the ugly

The Apple CSAM Scanning Discussion – Part One

By: Dr Tristan Jenkinson Introduction In June this year, Apple CEO Tim Cook stated that “At Apple, we believe that privacy is a fundamental human right”, echoing a statement that he made back in 2015. This latest interview followed in the footsteps of an ad campaign which stated “Privacy – that’s iPhone”, which focused on … Continue reading The Apple CSAM Scanning Discussion – Part One

Targeted attack from Signal forces Cellebrite to remove functionality

By: Dr Tristan Jenkinson and Alex Harrison Introduction Together with many other people in our industry, we have both spoken anecdotally about the arms race between the creators of new technology, and the development of processes that allow the data from that technology to be analysed. As new user devices, software and applications are developed, … Continue reading Targeted attack from Signal forces Cellebrite to remove functionality

Craig Wright Satoshi Claims to Hit UK Courts

By: Dr Tristan Jenkinson Introduction I have written numerous times in the past about Craig Wright, most notably on his ongoing court case with Ira Kleiman. Wright is now taking action in the courts of England and Wales which could see a legal decision on Wright’s claim he is Satoshi Nakamoto – the pseudonymous creator … Continue reading Craig Wright Satoshi Claims to Hit UK Courts

A Conflicted Expert and Holiday Illness Claims

By: Dr Tristan Jenkinson The Case in Bux Recently, Gordon Exall posted regarding the decision in Bux v The General Medical Council. The case highlights the importance of an expert witness’s duties – in particular with regard to the disclosure of conflict of interest. While the Bux case relates to the medical profession, the comments … Continue reading A Conflicted Expert and Holiday Illness Claims

Nothing’s DKIMpossible – Manually Verifying DKIM, a CTF Solution, and Implications

By: Dr Tristan Jenkinson Introduction I have recently been taking part in a capture the flag challenge focused on email forensics – see for example an article that I put out on LinkedIn here. The competition completed last week and I am very happy to have finished in third place. One of the challenges involved … Continue reading Nothing’s DKIMpossible – Manually Verifying DKIM, a CTF Solution, and Implications

EU/UK Data Flows – An Update

By: Dr Tristan Jenkinson Following on from my previous article, the Financial Times are reporting that they have seen a draft decision from the European Commission which finds that the UK does have adequate data privacy protections in place. The decision, which the FT suggest is expected to be approved some time this week, would … Continue reading EU/UK Data Flows – An Update