Generative adversarial networks (GANs) are a deep-learning model first described by Ian Goodfellow in 2014. GANs use two neural networks – one that creates content and one that analyses it – in a pseudo-game-like adversarial process. According to Goodfellow’s counterfeiter analogy, the generative model can be thought of as analogous to a team of counterfeiters, trying to produce fake currency and use it without detection, while the discriminative model is analogous to the police, trying to detect counterfeit currency. Competition in this game drives both teams to improve their methods until the counterfeits are indistinguishable from the genuine articles.
From the most prevalent predictive coding platforms to the least commonly used technology-assisted review workflows, the Fall 2021 Predictive Coding Technologies and Protocols Survey highlights the preferences and patterns of use of 42 cyber, data, and legal discovery professionals regarding predictive coding technologies and protocols.
According to John Wilson, Chief Information Security Officer and President of Forensics at HaystackID, “When it’s a ‘bet the company’ matter, MEDAL allows professionals to gain the most insight into the activity and usage of mobile devices when it matters the most.” The announcement goes on to share that previously restricted areas on mobile devices include the Secure Folder (Samsung), Private Space (Huawei), KeyChain (iOS), Email (Android and iOS), third-party application data, system and application logs, and deleted content, which are now accessible through MEDAL-enabled extractions. Full-file system and physical extractions from both Android and iOS devices are supported.
From the interplay of digital forensics in eDiscovery to collecting online data for litigation readiness, the August 2021 edition of the Five Great Reads on Cyber, Data, and Legal Discovery newsletter provides a selection of recent research, reports, and articles to update and inform cybersecurity, information governance, and eDiscovery professionals on cyber, data, and legal discovery.
According to this new Tallinn Paper from the NATO Cooperative Cyber Defence Centre of Excellence, public attribution of state-sponsored offensive cyber operations is complex and has political, technical and legal aspects. States can use attribution as a vehicle to advance their political goals, but there is often a risk involved in making a public attribution. Any response from the attacked party, such as attribution or a hack-back, must be carefully considered before being undertaken due to the political implications that such a response would cause.
According to Integreon CEO Bob Rowe, “This year’s Report shed light on how US and UK corporations and law firms are coping with the tremendous challenges of regulatory readiness. Clearly corporations are still struggling to maintain regulatory compliance especially in light of static or inadequate resources. A combination of people, process and technology resources provided by law firms, ALSPs and software vendors are filling the gaps. Looking forward, issues like Brexit, Covid-related legislation, United States data privacy laws, and the LIBOR transition will all require corporations and their legal counsel to step up more.”
Provided for your convenience is a complete transcript of the recent webcast presentation on the topics of ransomware, incident response, and cyber discovery as shared by cyber, information governance, and eDiscovery experts from HaystackID and the EDRM to include Michael Sarlo, Jenny Hamilton, John Brewer, John Wilson, and Mary Mack.
According to Zachary Viders, Managing Director, Global Credit Opportunities at BlackRock, “We are very excited to invest in Morae, which has established itself with a unique brand and valued reputation as a global provider of digital and business transformation solutions for the legal, compliance, and risk management markets. We were impressed with the company’s leadership team and vision, business strategy and their tangible capability to deliver the outcomes their clients care about most.”
According to Miri Mishor-Goldenberg, Cellebrite’s EVP of Customer Services, “Law enforcement’s pathway to digital transformation is a cultural shift that involves technology, people, and business processes all focused on the goal of optimizing the modern investigative lifecycle. Cellebrite Services marks a significant turning point in our ability to share our expertise in Digital Intelligence, along with comprehensive training and robust professional services with public safety and enterprise customers across the globe.”
This report from the US GAO describes an accountability framework for artificial intelligence (AI). The framework is organized around four complementary principles and describes key practices for federal agencies and other entities that are considering and implementing AI systems. Each practice includes a set of questions for entities, auditors, and third-party assessors to consider, along with audit procedures and types of evidence for auditors and third-party assessors to collect.