DriveSavers CTO Joins USC Information Technology Advisory Board

Industry leader helps shape the future of data recovery and eDiscovery through an advisory role at the University of Southern California

University of Southern California

NOVATO, Calif. (May 24, 2016) DriveSavers, the worldwide leader in data recovery, eDiscovery and digital forensic solutions, further strengthens its commitment to helping shape the future of data recovery and eDiscovery practices through a new advisory role with the University of Southern California.

DriveSavers Chief Technology Officer Chris Bross was recently invited to represent the company as a member of the University of Southern California, Viterbi School of Engineering, Information Technology Program Industrial Advisory Board (IAB). The 38-member board consists of leaders from computer and storage industries and helps determine strategic direction for the Information Technology Program. Bross’ role includes participation in discussions surrounding courses and curriculum offered.

“I am very humbled and honored to be invited to join the USC, Viterbi School of Engineering, Information Technology Program IAB,” said Bross. “Our field is ever-growing and changing, and I look forward to sharing DriveSavers perspective on the industry and how students best prepare themselves for future employment.”

DriveSavers commitment to data recovery and eDiscovery education also extends outside of higher education, including speaking engagements and involvement in learning tracks at various conferences, as well as continuing education opportunities. Members of the team recently acted as facilitators for a continuing education event for law enforcement officials held by the Silicon Valley Chapter of High Tech Crime Investigation Association (HTCIA). During the event, Bross and DriveSavers Senior Manager of eDiscovery and Forensics Rene Novoa conducted a two-hour training session on Advanced Mobile Forensics, specifically recovering data from damaged smartphones for use in forensic criminal investigation.

Bross will also be presenting a one-hour track focused on SSD forensics at the upcoming Enfuse 2016 conference in Las Vegas. This session will take place on May 25 at 4:30pm. Bross will be presenting alongside Jeff Hedlesky, Forensic Evangelise-FBU at Guidance Software.

To learn more about DriveSavers services and upcoming speaking engagements, visit
www.drivesaversdatarecovery.com or www.drivesaversediscovery.com.

About DriveSavers

DriveSavers, the worldwide leader in data recovery, eDiscovery and digital forensics, provides the fastest, most reliable and only certified secure data recovery and eDiscovery service in the industry. All of the company’s services meet security protocols for financial, legal, corporate and healthcare industries, and it is the only company that posts proof of its annual SOC 2 Type II audit and HIPAA data security and privacy compliance. DriveSavers adheres to U.S. government security protocols, the Gramm-Leach-Bliley Act (GLBA) Data Security Rule, the Data-at-Rest mandate (DAR) and the Sarbanes-Oxley Act (SOX). DriveSavers engineers are trained and certified in all leading encryption and forensic technologies and operate a Certified ISO Class 5 Cleanroom. Customers include: Bank of America, Google, Lucasfilm, NASA, Harvard University, St. Jude Children’s Research Hospital, U.S. Army and Sandia National Laboratories.

CTO Chris Bross Speaking at Enfuse 2016 May 23–26 Booth 223

Enfuse Conference 2016

CEIC is now Enfuse! This conference will take place May 23–26 in Las Vegas.

Enfuse is a three-day security and digital investigations conference where specialists, executives, and experts break new ground for the year ahead.

On Wednesday, May 25, Chris Bross, DriveSavers Chief Technology Officer, alongside Jeff Hedlesky, Forensic Evangelist-FBU at Guidance Software, will be speaking about solid-state drives and new challenges they pose to forensic practitioners. More information about their session below.

DriveSavers will be at booth #223. Stop by to speak with Chris Bross and to hear some fascinating stories about how our digital forensic service has aided legal and criminal investigations.

Learn more about Enfuse 2016.

SSD Forensics

Wednesday, May 25
4:30PM – 5:30PM
Intermediate | Lab

Description

Solid-state drive (SSD) storage is rapidly replacing traditional rotational media drives. Explore how technologies involved with SSDs pose new challenges to forensic practitioners, the inner workings of the newest classes of SSDs and best practices for extracting as much forensically sound information as possible. Updated and expanded for 2016.

Objective

Develop a better understanding of how forensic imaging of SSDs (and other flash memory devices) is both similar to and different from forensic best practices for traditional rotating media.

Prerequisite

Basic understanding of digital forensic concepts, including some experience with DF hardware and software.

Speakers

Jeff Hedlesky

Forensic Evangelist-FBU, Guidance Software

Jeff has been involved in the Technology Sector since 1983, and has worked in and around digital forensics since 2004. His role at GSI is ‘Forensic Evangelist’ for the Forensic Business Unit of Guidance Software. The FBU is responsible for EnCase® Forensic, EnCase® Portable and the Tableau line of digital forensic hardware products. Jeff’s focus is primarily on marketing and business development. He travels far and wide (recently to China, Japan, Mexico, Australia and New Zealand) to recruit and train Guidance authorized distributors and resellers, and to make joint calls on key customers. He also frequently visits the DC area to spend strategic time with our customer community within U.S. Federal agencies, listening as well as speaking.

Chris Bross

CTO, DriveSavers

Chris Bross is the Chief Technology Office at DriveSavers data recovery. Since joining DriveSavers engineering team in 1995, Bross has recovered data on all types of failed storage devices. Today, he manages the R&D team for emerging storage and solid-state devices, and guides the development of new tools and technologies for the forensic and data recovery labs.

WPBF: Special Report: Can information be retrieved from Austin's cellphone?

Originally published by ABC News affiliate WPBF 25 News.

Teens missing at sea since July 24

TEQUESTA, Fla. —The iPhone at the center of a missing persons investigation is now in the hands of Apple.

Tequesta teens Austin Stephanos and Perry Cohen disappeared during a fishing trip nine months ago.

Their boat was recovered off the coast of Bermuda in mid-March, along with Austin’s iPhone 6.

That phone is considered the only communication device that was on board the 19-foot SeaCraft when the boys vanished.

Both families agreed to send the iPhone to Apple on April 29, where it will be analyzed by experts.

Florida Fish and Wildlife officials describe the phone as “significantly and severely” deteriorated, and pictures show the phone damaged and waterlogged.

Is it possible to extract any information from this key piece of evidence? Experts say it’s possible.

Austin's iPhone
Austin’s iPhone

Mike Cobb is the director of engineering at DriveSavers, a California company that specializes in extracting data from damaged phones.

“We had a capital murder case which was thrown into a river and the iPhone was recoverable by us after law enforcement was able to get that,” Cobb told WPBF 25 News anchor/reporter Sanika Dange.

Not only does DriveSavers work on criminal cases, the company is frequently referred to customers by Apple.

When we asked Cobb about the chances of recovering data from an iPhone that was once submerged in water, he responded, “Well one thing that we think of right away is was this phone submerged for the full eight months or was it in some sort of package or plastic?”

Recovery-1-jpg

Cobb says that distinction could make all the difference.

Phones need to be restored to a semi-functional state to extract information. The good news is that once an engineer is able to access some information, all the information should be available, including text messages, photos, videos and GPS locations.

However, there is one major hurdle. Austin Stephanos’ cellphone had been in saltwater for eight months.

“When it goes into the water,” Cobb explained, “it’s going to be starting the corrosion process immediately.”

So what are the first steps when dealing with corrosion? You start by taking the iPhone apart and micro-cleaning certain key components.

Cobb showed WPBF an example of a waterlogged phone that had been dropped in saltwater. Corrosion can be seen on several areas.

new-perry-and-austin-for-web-jpg

The process of retrieving data may sound complicated, but former Apple CEO John Sculley told WPBF it can be done.

“There is precedent for devices that have been severely damaged to recover if not all its information, some information,” he said.

Sculley is close friends with Perry Cohen’s parents, Pam and Nick. Though he has never met the Stephanos family, he told WPBF he feels deeply for both families.

“I think it was important for them to find out as much as they can of the last moments of Perry’s life and bring conclusion to this tragic situation,” he said.

There’s no timeline on when Austin Stephanos and Perry Cohen’s families may have to wait. Cobb says the process of extracting data from phones can be anywhere from a few hours to a few days.

Read more: http://www.wpbf.com/news/special-report-can-information-be-retrieved-from-austins-cellphone/39410134

DriveSavers Teaching at HTCIA Training Event May 11–13

timthumb (1)

Silicon Valley HTCIA 2016 “Back to the Basics” Training Event

Milpitas, CA • May 11–13

The Silicon Valley chapter of the High Tech Crime Investigation Association (HTCIA) will be holding a continuing education training event for law enforcement May 11–13 in Milpitas, CA.

Chris Bross, DriveSavers Chief Technology Officer, and Rene Novoa, DriveSavers Senior Manager of eDiscovery and Forensics, will be teaching a 2-hour session at this continuing education event for law enforcement.

This training event is open to all law enforcement. HTCIA members receive special pricing.

Learn more about the Silicon Valley HTCIA Back to the Basics Training Conference.

NBC News: Families Cling to Hope That iPhone Holds Clues to Florida Teens Lost at Sea

Originally published by NBC News.

Missing Florida teenagers on boat
Video released by the Florida Fish and Wildlife Conservation Commission Law Enforcement Division shows two missing teens in a boat heading out of Jupiter Inlet to the Atlantic Ocean in July 2015. Image: Florida Fish and Wildlife

An iPhone found stashed inside a compartment of the boat shared by two teenagers who vanished off the Florida coast last summer could hold clues in a confounding mystery: How did the boys — both skilled boaters — disappear at sea?

Data-recovery experts say that while salvaging data from the barnacle-encrusted iPhone 6 — which apparently spent an extended period submerged in saltwater — isn’t impossible, the circumstances suggest extracting any information is a long shot.

The parents of the two teens — friends Perry Cohen and Austin Stephanos, both 14 at the time — are clinging to hope that it could help explain their disappearance. The two families even waged a legal fight over preservation of the cellphone, although that apparently was settled on Friday.

DriveSavers, a data recovery company based in California, says it typically receives more than 300 phones a month in various state of ruin — including some damaged after being dropped in the ocean.

“Most of the phones were in the ocean for short periods, but there were several weeks to months before the customer sent the phones to us for recovery,” said DriveSavers spokesman John Christopher. “That makes a huge difference because the saltwater speeds up the corrosion process and can make the data recovery difficult to impossible.”

Even so, the company has been able to resurrect data in some scenarios, he said.

In the case of Perry and Austin, the phone they were using could have been in the water for eight months, based on the barnacles found on the cracked device when it was recovered.

Another expert, Robert Heller, a digital forensics expert with CKC Consulting in Texas, told NBC News that if the phone can be revived, the contents could include text messages that were never sent, call logs, pictures and possibly GPS-related information.

“At the end of the day, if you have a shred of information that’s recoverable, it can be helpful to painting a better picture of what may or may not have occurred,” he said.

The capsized boat was discovered March 18 by a Norwegian supply ship about 100 miles off the coast of Bermuda. The boys, who remain officially classified as missing persons, were not with it.

The phone was found with two fishing rods and two small tackle boxes on board the 18-foot, single-engine Seacraft vessel, the U.S. Coast Guard said.

The friends had set out on a fishing trip the morning of July 24 from the Jupiter Inlet, just north of West Palm Beach, as severe weather approached. New video released Friday by investigators shows the boys as they cruised around the inlet before heading out to sea that day.

The video was taken by a home with a security camera ahead of their ill-fated trip.

When they didn’t come home after 4 p.m., the Coast Guard was dispatched. They found the abandoned boat two days later. A personal flotation device and the boat’s cover were gone.

A marine salvage company was later sent to tow the vessel back, but by then it had drifted away.

At the time, officials said, they were focused on finding the teens and didn’t have the resources to locate the craft. About two weeks later, the search for the pair was called off.

Read more: http://www.nbcnews.com/news/us-news/families-cling-hope-iphone-holds-clues-florida-teens-loss-sea-n564296

DriveSavers at 2016 National Cyber Crime Conference April 25–27

nccc-2013

Norwood, MA • April 25–27

Massachusetts Attorney General’s Office is hosting the 2016 National Cyber Crime Conference in Norwood, MA. The conference will feature three tracks of instruction: a track for prosecutors, a track for investigators and a track for digital evidence forensic examiners.

Visit DriveSavers at booth #21 to speak directly with Rene Novoa, certified forensic investigator and DriveSavers Senior Manager of eDiscovery and Digital Forensics. Ask about some of the incredible cases DriveSavers has helped to solve!

Learn more about the National Cyber Crime Conference or register to attend.

CBS News: FBI paid more than $1M for San Bernardino iPhone "hack"

Originally published by CBS News.

The FBI said that using third-paries is not the only solution for breaking into encrypted phones.

FBI Director James Comey alluded to the fact the bureau paid more than $1 million for the method used to disable the security feature of the San Bernardino shooter’s iPhone.

At an Aspen Institute discussion in London, Comey said the FBI paid more money than he would make in the time left as FBI director. He has over seven years left on his term and makes roughly just under $200,000 a year based on public files.

“How much did you pay for this software?” Comey was asked.

” A lot,” he said

“Really?”

“More – let’s see. More than I will make in the remainder of this job, which is seven years and four months, for sure,” Comey said.

” Wow.”

“And so it’s a – but it was in my view, worth it, because it’s a tool that helps us with a 5c running iOS9, which is a bit of a corner case, increasingly as the devices develop and move on to the 6 and 6s and whatnot and iOS’s change, but I think it’s very, very important that we get into that device.” Comey said.

He did not give a more specific figure.

A law enforcement source told CBS News last week that so far nothing of real significance has been found on the San Bernardino terrorist’s iPhone, which was unlocked by the FBI last month without the help of Apple.

It was stressed that the FBI continues to analyze the information on the cellphone seized in the investigation, senior investigative producer Pat Milton reported.

Investigators spent months trying to gain access to data on the locked iPhone used by San Bernardino gunman Syed Rizwan Farook, believing that it might hold information on the plans or contacts of the attackers, who killed 14 people on December 2, 2015.

Apple was fighting a court order to assist the FBI in bypassing the phone’s security measures. On March 28, the FBI announced that it had managed to unlock the phone and was dropping the court fight with Apple.

The FBI has not disclosed what method it used to access the data on the iPhone but the method is believed to have been developed by a third party, a private entity, the government has refused to identify.

Comey said two weeks ago that the bureau has not decided whether to share details with Apple about how it hacked into Farook’s iPhone 5c.

“If we tell Apple, they’re going to fix it and we’re back where we started,” Comey said. “As silly as it may sound, we may end up there. We just haven’t decided yet.”

The bureau has told local police departments that it will help them unlock cellphones in cases where it could provide evidence, CBS News John Blackstone reported.

But cracking the code is easier said than done.

When the FBI launched its search for a way to unlock Farook’s iPhone 5c, the technicians at a California company called Drivesavers were among those who took up the challenge. They have plenty of experience rescuing broken iPhones.

“You know, we see anywhere from a 100 to 300 iPhones a month right now,” Michael Cobb, Drivesavers’ director of engineering, told CBS News.

Cobb said his team can remove the chip that holds a phone’s encrypted data — but they can’t just read what is on it.

“The encryption is not simple to retrieve,” he said.

A company the FBI has not identified found a way around Apple’s encryption. The effort at Drivesavers shows what they had to overcome. Try the wrong password too many times and the phone wipes its memory clean.

“In the case of the 5c, you only have 10 attempts before the iPhone gets erased,” Cobb explained.

To make sure the chip doesn’t get erased, they copy it. Then put it in a device they’ve created that simulates an iPhone but lets them reset the chip’s password counter to zero after every ten attempts.

“It all depends on how fast you would be able to pull the data off, make that copy, do your 10 attempts,” Cobb said.

Drivesavers hasn’t yet defeated Apple’s password protection, but over the past 30 years, they have retrieved information from computers that have been burned, broken and deliberately smashed.

While law enforcement comes looking for evidence, many of Drivesavers’ clients are family members trying to recover the messages and photographs of a loved one who has died — leaving behind their phone, but not their password.

Read more: http://www.cbsnews.com/news/fbi-paid-more-than-1-million-for-san-bernardino-iphone-hack-james-comey/

Proposed Encryption Legislation and What it Means

By Scott Moyer, DriveSavers President

Unless you are just this moment rejoining society after months spent stranded on a technology-free desert island, you are well aware of the recent controversial disagreement between the FBI and Apple involving an iPhone 5C that once belonged to San Bernardino shooter, Syed Rizwan Farook.

Amidst this highly publicized dispute, Sen. Richard Burr, R-N.C., and Sen. Dianne Feinstein, D-CA., have begun preparing a bill to be proposed to the U.S. Senate. If passed, the law will be titled the “Compliance with Court Orders Act of 2016.”

We’ve read through a draft of the bill in circulation in order to determine how it may affect DriveSavers. Here’s our take.

What the Bill Proposes

If passed, this Act would require that all original manufacturers of hardware (devices) and software (programs) recover readable data from any device when served a court order to do so. It also requires that this be completed in “a timely manner.”

The bill does not require that manufacturers provide the government or any government entity with the tools or knowledge used to access encrypted devices or software, just that encrypted data be rendered unencrypted and readable in a timely fashion whenever a court order is served. As we understand this bill, any methods could remain secret and proprietary to the manufacturers themselves.

Reading Between the Lines

Current encryption technology has been developed so that only the owner of a device has access to that device. Just like a construction company does not have keys to each building it has built, not even a manufacturer can pick up an encrypted laptop or smartphone and just open it up without the owner of the device providing the key. And just like with a building, the owner can change that key and lock any time.

If a construction company wanted to maintain a way into a building even after it has been sold, the company would need to build a secret door that even the owner of the building does not know the location of. Otherwise, the new owner of the building could simply change the lock and the construction company would not be able to get in. The issue of manufacturers accessing encrypted devices after sale is similar.

At DriveSavers, we believe there is theoretically a way into any device, regardless of the quality of the encryption technology. However, the way into most encrypted devices has not yet been discovered, even by the companies that created them. If the way in is not already known, it could take years of research and development to figure it out, and years longer to actually complete implementation and then access the decrypted data.

Requiring that manufacturers access data from a device quickly any time a court order is served means that, like a construction company that wants to be able to freely enter buildings after they have been sold, manufacturers must begin building secret ways into their encrypted devices and software. Secret decryption paths, known as “backdoors”, would then allow them timely entry to devices whenever court orders are served.

As stated above, the bill does not require that manufacturers provide the government or any government entity with the tools or knowledge to use any backdoor built into encrypted devices or software, just that encrypted data be rendered unencrypted and readable in a timely fashion whenever a court order is served. As we understand this bill, any backdoor could remain secret and proprietary to the manufacturers.

It is important to note that the mere existence of a backdoor, whether the details are public or not, increases the likelihood that non-manufacturers could discover this method of accessing an encrypted device through standard research and development. It is also important to note that each new release of a device, software or operating system could theoretically carry with it a different backdoor from the previous, making it more difficult—but not impossible—for an outside party to decipher the way into such a device.

What About Currently Existing Devices and Software?

Will manufacturers be required to develop backdoor solutions for devices already in the market? Or only for those not yet available to the public? This is just one question that this proposed bill raises.

We do not know if all currently existing encryption technologies can have backdoors programmed into them. True, software encryption could theoretically be changed through a software update; however, what about hardware encryption? For example, hard drives currently exist that require separate physical components be brought together (referred to as a “handshake”) in order to decrypt the data they hold. Can a backdoor be built to enter these super secure devices? If not, will manufacturers be held accountable anyway?

We speculate that firmware could theoretically be updated to accept a different handshake, but we don’t know for certain that this is true or how the firmware could be injected into a locked device.

How Data Recovery and Digital Forensic Firms may be Affected

Third parties would not likely be directly served this type of court order. Instead, data recovery and digital forensic companies may only be approached in cases where there is physical damage to a device that a manufacturer does not have the tools to bypass. In such instances, a third-party data recovery or digital forensic firm would likely be hired to pull a complete image from the device, still encrypted. This encrypted image would then be provided back to the manufacturer to unlock using their built-in backdoor.

There are a couple ways this bill may affect those of us with robust research and development teams, such as DriveSavers. If a backdoor is built into a device or software, we can potentially discover and open it, allowing us greater opportunities for data recovery in the, unfortunately, common situation where a family is trying to access a deceased loved one’s device. This bill would also present greater opportunity for companies like DriveSavers to help law enforcement in identifying and prosecuting criminals.

Of course, if there’s something we can figure out, there are likely others out there with the potential to also figure it out—sometimes, people who we wish wouldn’t. As with everything, there’s a good side and a bad side to this bill. We’ll just have to wait and see where it leads.

HR.BLR.com: eDiscovery 101 for Human Resources

Originally published by HR.BLR.com.

electronic discovery

By Rene Novoa, senior manager of eDiscovery and Digital Forensics

In today’s digital world, it’s increasingly common for businesses to go “paperless.” Oftentimes, the conversion to digital includes documentation prepared and maintained by human resource (HR) departments. These documents could include everything from handbooks and company policies to employee reviews and payroll documentation.

Choosing to keep important files and documents stored in computers, rather than file cabinets, has many benefits, including search-friendliness and storage efficiency. Electronically gated and stored files also include metadata that keeps track of when, how, and by whom the files were created, modified, viewed, transmitted, and deleted—potentially useful information that is unavailable in paper form.

Although going paperless with company data has many benefits, these benefits also present new challenges when it comes to data organization and preservation, especially in the event of an HR-related lawsuit.

In the event that a possible HR-related lawsuit is on the horizon, HR is often responsible for preserving and providing all relevant company data from each of the devices where that data may live. The preservation of digital communications, including internal e-mail and social media posts, can also create large volumes of data that may be important in employee-related litigation.

This is where eDiscovery comes in.

What is eDiscovery?

eDiscovery, or electronic discovery, is the process of sifting through a large amount of data and finding any pieces that may be relevant to a specific legal action or dispute. This process is called upon when electronically stored information (ESI) must be provided for use in litigation, a lawsuit, or an investigation, such as the alleged unlawful firing of an employee. eDiscovery may also be used to find data related to suspected employee misconduct.

Some of the possible HR-related scenarios or allegations that would require eDiscovery include:

  • Employee misconduct
  • Employer misconduct
  • Employment discrimination
  • Worker safety and OSHA compliance
  • Employee privacy
  • Negligent hiring
  • Negligent retention
  • Harassment
  • Retaliation
  • Union relations
  • Copyright infringement
  • Theft of company property, physical or intellectual
  • Defamation (of an employee or of the company)

When pending or actual litigation arises, it is important for the HR department, as the primary caretaker of ESI, to understand how and where the data is stored. The goal is to allow the company to identify and access relevant data as fast and efficiently as possible. This process is most effective when the HR and IT departments work together with in-house and/or outside legal counsel and an eDiscovery service.

Preparing for eDiscovery

eDiscovery doesn’t have to be scary. Some simple proactive measures, known as information governance (IG), can make the eDiscovery process both more streamlined and effective, should the need arise.

Work with your IT department to put the following IG policies into place:

1. Develop an ESI lifecycle plan

Learn and keep track of how long your company is legally required to maintain specific files. Use that information to develop a plan for storing ESI that must be retained and for destruction of data once its retention period has ended.

2. Use current storage technology

Oftentimes, technology moves forward more quickly than your files. Be sure to always keep all data on current devices. You do not want important data to get trapped on obsolete technology, such as floppy disks.

3. Be organized

Making sure that file names and folder names are clear and easy to understand ensures that the correct ESI can be located quickly when needed. It helps to decide on a naming convention and stick to it.

Anybody tasked with searching your company’s ESI should be able to answer the following questions:

  • Who has access to this file?
  • What is this information?
  • Where is this information stored?
  • When was this file created or last modified?
  • Why is this information being retained?
  • How is this data being stored/protected?

4. Security

Maintain proper cybersecurity that conforms to government or industry regulations. Install appropriate firewalls, password protection, encryption, and other measures as detailed in published industry regulations and as recommended by your company IT or chief security officer (CSO).

5. Back it up

The court is not kind to those who have lost relevant data due to hard drive crash and ineffective backup. Maintain and regularly test effective data backup measures. Loss of relevant data due to a hard drive crash and ineffective backup has been cause for spoliation fines.

6. Educate

Make sure any person who has access to data that must be maintained for legal or regulatory purposes has full understanding of company IG policies as they relate to the data that person wishes to access. For example, a manager must be aware of IG policies as they relate to employee reviews. A payroll clerk must be aware of IG policies as they relate to final paychecks.

Keep these policies in mind. When it comes to eDiscovery, the best advice we have for HR professionals is to be prepared. Consider identifying an eDiscovery partner and legal counsel and retaining these partners before the need arises. Your eDiscovery partner, along with your company’s IT department, can help to develop a plan and workflow for each possible situation. Arming yourself with a basic understanding of eDiscovery and a plan should allow everything to go smoothly.

Rene Novoa is a certified forensic investigator and manager of eDiscovery and digital forensics at DriveSavers. Since joining DriveSavers in 2001, Novoa has performed data recovery on thousands of storage devices plagued with mechanical failures, physical damage and logical corruption. Over the past 5 years, he has focused his efforts on developing proprietary forensic processes for failed devices. His understanding of emerging technologies helps solve new forensic challenges. Rene manages high-level client relationships and is the Vice President of the North Bay HTCIA chapter.

Read more: http://hr.blr.com/HR-news/HR-Administration/Employee-Privacy/eDiscovery-101-Human-Resources/

New Advancements in Bitlocker Data Recovery Capabilities

bitlocker

With new tools and techniques developed by DriveSavers, we help security conscious companies using Bitlocker encryption to regain access to their data and get back to business quickly.

DriveSavers has been recovering data from Bitlocker encrypted drives since its inception in 2004. However, new proprietary advancements now allow DriveSavers to overcome additional obstacles and recover data even in cases of corrupt or damaged encrypted volumes.

Locked out of Bitlocker? We can save it!

Learn more about DriveSavers business disaster recovery.

Learn more about DriveSavers High Security Service.