Attorney Client Privilege, LLC, is a Twin Cities digital forensics, Internet and social media forensic preservation, and information security firm. Examiner Sean L. Harrington is experienced in child pornography investigations, the Adam Walsh Act, corporate investigations, domestic relations, and e-discovery best practices, and maintains professional certifications in computer forensics, information security, regulatory compliance, network engineering, and the LexisNexis CaseMap suite
Digital forensics is commonly used in both criminal law and private investigation. Traditionally it has been associated with criminal law, where evidence is collected to support or oppose a hypothesis before the courts. As with other areas of forensics this is often as part of a wider investigation spanning a number of disciplines. In some cases the collected evidence is used as a form of intelligence gathering, used for other purposes than court proceedings (for example to locate, identify or halt other crimes). As a result intelligence gathering is sometimes held to a less strict forensic standard.
In civil litigation or corporate matters digital forensics forms part of the electronic discovery (or eDiscovery) process. Forensic procedures are similar to those used in criminal investigations, often with different legal requirements and limitations. Outside of the courts digital forensics can form a part of internal corporate investigations.
At ACP, we have experienced digital forensics examiner with expertise in corporate fraud, labor disputes, domestic relations, child pornography, the Adam Walsh Act, electronic discovery, the work product doctrine, and the attorney client privilege. Our expert is available to serve not only as a digital forensics examiner, but also as an expert witness and court-appointed third-party neutral. Reference available upon request.
Mobile devices can be used to save several types of personal information such as contacts, photos, calendars and notes, SMS and MMS messages. Smartphones may additionally contain video, email, web browsing information, location information, and social networking messages and contacts often intentionally, and sometimes unintentionally. This holds true for almost all mobile devices, such as PDAs, SmartPhones and Tablets, e.g. iPhones, iPads. Our forensic experts specialize in the forensic retrieval of data from cell phones and other electronic devices in a manner that preserves the evidence under forensically acceptable conditions, ensuring that it is court-admissible.
Some data may be retrieved and examined during a mobile device forensic investigation, even after being deleted such as Photos & Graphics, Videos, Text Messages, Address book, Call records, notes.
A cell phone forensic investigation includes possible full data retrieval dependent upon the cell phone, PDA, or tablet model. Our mobile device forensic investigator will conduct a thorough examination of the data found on the device's SIM/USIM and any optional internal/external memories
Data acquisition, preparation, preservation, and dissemination of social and behavioral data. Our social media preservation tools can capture data in wide variety formats include originals, PDFs, compress files from popular social media sites, such as Facebook, Twitter, waybackmachine.
I am an experienced digital forensics examiner with expertise in corporate fraud, labor disputes, domestic relations, child pornography, the Adam Walsh Act, The Electronic Communications Privacy Act, the Computer Fraud and Abuse Act, electronic discovery, the work product doctrine, and the attorney client privilege. My experience is drawn from the following disciplines: law, information technology, software engineering, regulatory compliance, risk management, and information security. I am qualified to serve as a digital forensics examiner, expert witness, and court-appointed third-party neutral. I have extensive experience in litigation support, including electronic discovery, the Rules of Evidence, the Rules of Civil Procedure, motions practice, pre-trial practice, and appellate practice. In addition, Attorney Client Privilege, LLC provides information security consulting for law firms and attorneys, including incident response, data breach prevention, network intrusion penetration testing, and security audits.
I maintain professional credentials and certifications in the areas of digital forensics (CHFI No. ECC930566), information security (CISSP No. 335034), regulatory compliance (CSOXP No. 00185), and network engineering MCSE, MCP+i, No. 977426). I have been certified since 2006 on the LexisNexis CaseMap suite.
* withdrew from this position in 2011 pursuant to bylaws upon making services available for criminal defendants
Employee-owned Devices in the workplace: Legal & Technological
(Minnesota State Bar Ass’n Computer & Technology Law Section CLE, March, 2012; Ramsey County Bar Ass'n - June 28 & December 20, 2012)
Individual Liabilities of Releasing Vulnerable Code,” (Minnesota State Bar
Ass’n Computer & Technology Law Section CLE, fall 2011)
The Legal and Financial Consequences of Releasing Vulnerable Software (Minneapolis Fortify User Group Conference, September, 2011)
Digital Forensics Goes Mobile: Evidence You Need to Win in 2011 (MinnCLE & CLE West, spring 2011)
"The 'End of Digital Forensics' or a Just a New Chapter?" (MSBA Computer & Technology Law Section CLE, spring 2011)
Computer Forensics Goes Mobile (Ramsey County Bar Association CLE, December, 2010)
Regulatory Compliance in the Software Development Lifecycle (Twin Cities Rational Users Group Conference, winter 2010)
Computer Forensics for the Litigator (Hamline Law School, spring 2010)
LexisNexis® CaseMap® Case Intake for Paralegals (Hamline Law School, spring 2010)
panelist, Consumer Perspectives on Alternative Legal Services, hosted by HALT (fall 2009)
"Incorporating Extrinsic Evidence into the Digital Forensics Investigation" (Digital Forensic Investigator News winter/fall 2013)
Interview: Nancy Crotti, “Cloud Control: Feeling at ease with online files,”Minn. Lawyer, March, 2012 " http://minnlawyer.com/2012/03/09/cloud-control-feeling-at-ease-with-online-files/ (registration required)
Collaborating with a Digital Forensics Expert: Ultimate Tag Team or Disastrous Duo, Volume 38, Issue 1 of the William Mitchell Law Review (January. 2012)
"Is your client an attorney? Be aware of possible constraints on your investigation. (Part 1)," Forensic Focus Newsletter (Sept. 29, 2011)
"Is your client an attorney? Be aware of possible constraints on your investigation. (Part 2)," Forensic Focus Newsletter (Nov. 29, 2011)
Minnesota State Bar Association Computer & Technology Law Section blog (since 2007), http://mntech.typepad.com
ForensicFocus.com blog contributing author
 I am not licensed to practice law. Therefore, all services provided that are "legal" in character are available only to and under the direct supervision of attorneys licensed to practice in the jurisdiction where the work is to be performed.