Bryan Pringle v. William Adams Jr et al

Filing 164

DECLARATION of Erik Laykin In Support of MOTION for Summary Judgment 159 filed by Defendants David Guetta, Frederick Riesterer, Shapiro Bernstein and Co. (Miller, Donald)

Download PDF
1 2 UNITED STATES DISTRICT COURT 3 CENTRAL DISTRICT OF CALIFORNIA 4 SOUTHERN DIVISION 5 6 BRYAN PRINGLE, an individual, Plaintiff, 7 vs. 8 9 WILLIAM ADAMS, JR.; STACY FERGUSON; ALLAN PINEDA; and 10 JAIME GOMEZ, all individually and collectively as the music group The 11 Black Eyed Peas, et al., Case No. SACV 8:10-CV-01656 JST (RZx) DECLARATION OF ERIK LAYKIN Defendants 12 13 14 15 I, ERIK LAYKIN, declare as follows: 16 17 18 I. EXPERT QUALIFICATIONS 1. I am a Managing Director of the Global Electronic Discovery and 19 Investigations practice of Duff & Phelps, LLC (“D&P”), an independent consulting 20 firm of approximately 1,100 professionals, which is publicly listed on the New York 21 Stock Exchange (DUF). D&P provides litigation, financial, restructuring and 22 operational consulting services to government agencies, legal counsel and 23 companies in a variety of industries. I have been employed by D&P since July 24 2008, and am based in its Los Angeles, California office. 25 2. I am accredited by the Electronic Commerce Council as a specialist in 26 the field of Technology Disputes, Computer Forensics and Electronic Discovery, 27 and have testified in state and federal courts on numerous occasions on matters 28 NY987869.1 217131-10001 DECLARATION OF ERIK LAYKIN 1 related to the investigation, analysis and management of electronic data, computer 2 forensic preservation and analysis, and other information technology disputes. I 3 have managed over 200 matters relating to these issues during the past 10 years. 4 5 6 7 8 9 3. From 2004 through 2008, I was the Director of the Information Technology Investigations practice group at Navigant Consulting, Inc. (NYSE:NCI) and served on the Management Committee of its Discovery Services practice group. In this role, I led teams of professionals that provided electronic discovery, computer forensic and investigative consulting services for a wide variety of national and international clients. 10 11 12 13 14 15 4. From 1997 to 2004, I served as President and Founder of Online Security (OnlineSecurity.com) which was one of world’s first providers of commercial computer forensic services to the legal and business community for the investigation and resolution of disputes. 5. As part of my work at Online Security, I managed and/or developed the 16 initial Computer Forensic service offerings and established standards on behalf of 17 investigative agencies in the United States and Asia, including The Investigative 18 Group International, Kroll & Associates and Pinkerton Consulting & Investigations. 19 6. As a result of the above training and experience, I have become very 20 familiar with a variety of software development technologies, computer systems, 21 programming languages, computer forensic and electronic discovery systems, and 22 standards of practice within the Information Technology industry. 23 7. I have provided expert training on the topics of Computer Forensics, 24 Cyber Crime and Electronic Discovery to numerous organizations including the 25 FBI, the ABA (American Bar Association), the HTCIA (High Tech Crime 26 Investigation Association), AICPA (American Institute of Certified Public 27 28 NY987869.1 217131-10001 2 DECLARATION OF ERIK LAYKIN 1 Accountants), the Government of Malaysia, the Government of the United Arab 2 Emirates, the Government of Taiwan, the Government of Hong Kong and the 3 Government of the People’s Republic of China. 4 5 6 7 8. I have served as an expert witness and investigator, and have been appointed as Special Master in complex cases involving information technology and the disputes which arise from its usage within a business and network environment. My Curriculum Vitae is attached as Exhibit A. 8 9 10 II. BACKGROUND AND SCOPE OF ASSIGNMENT 9. I understand that the Plaintiff, Bryan Pringle, claims that he created a 11 song in 1999 entitled “Take a Dive” (Dance Version), and that Defendants allegedly 12 copied portions of that song when they created the song “I Gotta Feeling,” which 13 was released by The Black Eyed Peas in 2009. 14 10. In asserting that he created “Take a Dive” (Dance Version) in 1999, I 15 understand that Pringle relies on an “NRG” file that contains the instrumental tracks 16 of “Take a Dive” (Dance Version). An NRG file is a proprietary file format 17 developed by the makers of the popular commercial CD Rom burning software 18 known as Nero. This software ships pre-installed on many desktop and laptop 19 computers, is downloadable from the Internet and has been available for purchase as 20 a stand-alone software title at most computer and office supply stores throughout the 21 United States. The file format itself is proprietary and encodes whatever data a user 22 wishes to copy from the hard drive of their computer onto a CD Rom or a DVD 23 Rom. The process in which a new NRG file is created and saved from the original 24 source file on the hard drive onto a CD or DVD is known as “burning” a file. 25 26 27 28 11. I understand that Pringle no longer possesses the computer on which he originally created and saved this NRG file, as he claims that computer was stolen NY987869.1 217131-10001 3 DECLARATION OF ERIK LAYKIN 1 from a storage locker in 2000. Instead, Pringle relies on a CD to which he allegedly 2 copied (or “burned”) the NRG file in 1999. (I refer herein to a CD containing an 3 NRG file as an “NRG disc.”) 4 5 6 7 8 9 10 11 12 13 14 12. Pringle first submitted an NRG disc allegedly containing the tracks of “Take a Dive” (Dance Version) in connection with his application for a temporary restraining order (“TRO”) in November 2010. That NRG disc was accompanied by the Declaration of David Gallant, dated November 18, 2010, which purported to authenticate the NRG file as having been last modified on June 14, 1999 and having been burned to the NRG disc on May 17, 2001—after Pringle’s computer equipment was allegedly stolen. Pringle also submitted his own Declaration, dated November 17, 2010, stating that he saved the NRG file that contained “Take a Dive” (Dance Version) to his personal computer on June 14, 1999, and that he burned that NRG file from his computer to a blank CD in May 2001. Pringle even identified the serial number of the NRG disc which allegedly contained “Take a Dive” (Dance Version). 15 16 17 13. I was asked by counsel for Defendants to review the November 18, 2010 Declaration of David Gallant, and to provide my professional expert opinion 18 regarding Mr. Gallant’s methodology and conclusions. Based on that review, I 19 submitted a Declaration, dated November 23, 2010, in which I explained that the 20 process and procedures employed and described by Mr. Gallant were of 21 questionable reliability, that Mr. Gallant’s findings were incomplete, and that Mr. 22 Gallant’s declaration fell short of the standard of care expected in the practice of 23 professional computer forensics. I therefore concluded that Mr. Gallant’s 24 declaration was an insufficient basis on which to authenticate the NRG disc and its 25 contents. 26 14. I understand that, following my November 23, 2010 Declaration, on 27 January 3, 2011, Pringle filed a motion for a preliminary injunction, in which he 28 NY987869.1 217131-10001 4 DECLARATION OF ERIK LAYKIN 1 acknowledged that the NRG disc he had submitted in connection with his TRO 2 motion, and upon which his and Mr. Gallant’s declarations were based, was, in fact, 3 the wrong disc. Pringle submitted a new “correct” NRG disc in connection with his 4 preliminary injunction motion. 5 15. In his motion for a preliminary injunction, Pringle’s counsel 6 represented that Mr. Gallant had analyzed the “correct” NRG disc and assured them 7 that the NRG file on that disc had a creation date in 1999, but that Mr. Gallant was 8 unable to complete his analysis because of the 2010 winter holidays.1 9 16. I have been asked by counsel for the Defendants to provide my 10 professional expert opinion as to whether or not the “correct” NRG disc on which 11 Pringle relies can be used to authenticate the date of creation of the NRG file on that 12 disc. 13 17. 14 I also understand that Pringle has testified to having discarded two 15 computer hard drives while this litigation was pending—one in December 2010 or 16 January 2011, and another in the summer of 2011. Pringle further testified that, 17 prior to discarding these hard drives, he backed up what he considered to be relevant 18 files, but that he did not back up program files, Internet-related files or temporary 19 data files. 20 18. I have been asked by Defendants’ counsel to provide my professional 21 expert opinion as to whether the process employed by Pringle meets professional 22 standards for electronic data preservation for litigation purposes. I have also been 23 1 I understand that, on November 11, 2011, Pringle’s counsel produced a letter from Mr. Gallant dated August 6, 2011 that purports to date the “correct” NRG disc. 25 Because of substantial prior professional commitments, I have not had sufficient 26 time to analyze Mr. Gallant’s letter and the technical analysis discussed therein. I reserve the right to do so should Pringle rely on Mr. Gallant’s letter in response to 27 this Declaration. 28 NY987869.1 DECLARATION OF ERIK LAYKIN 5 24 217131-10001 1 asked to provide my professional expert opinion as to whether examination of 2 Pringle’s 2009/2010 hard drives might reveal evidence indicating (i) whether 3 Pringle back-dated the NRG disc, and (ii) whether, where and when Pringle 4 downloaded “I Gotta Feeling” music files. 5 19. In conducting my analysis, I have reviewed the following materials: 6 a. Declaration of Bryan Pringle, dated November 17, 2010, in Support 7 of Plaintiff’s Motion for TRO; 8 b. Declaration of David Gallant, dated November 18, 2010, in Support 9 of Plaintiff’s Motion for TRO; 10 c. Memorandum of Points and Authorities in Support of Plaintiff’s Motion for Preliminary Injunction, dated January 3, 2011; 11 12 d. Declaration of Bryan Pringle, dated January 3, 2011, in Support of Plaintiff’s Motion for Preliminary Injunction; 13 14 e. Copies of two CDs produced at the offices of David Gallant on August 8, 2011; and 15 f. Transcript of the Deposition of Bryan Pringle, dated August 24, 2011. 16 17 20. 18 19 I am being compensated at the rate of $525/hour for the analysis and testimony which may be provided in this matter. 20 III. ANALYSIS 21 A. The Date of the NRG File Can Not be Authenticated Without Analysis of the Computer(s) Used to Create the File and to Burn it to the NRG Disc 22 23 24 21. For the reasons discussed below, it is my professional expert opinion 25 that, regardless of the date on which the CD itself was manufactured, it is not 26 possible to authenticate the date on which the NRG file was saved to the NRG disc 27 28 NY987869.1 217131-10001 6 DECLARATION OF ERIK LAYKIN 1 without access to the computer on which the NRG file was saved, and the computer 2 from which the NRG file was burned to the NRG disc. 3 4 5 6 7 8 9 10 11 12 22. Time and date stamps on files are easily modified and cannot be relied upon without corroborating evidence of their authenticity. A user may modify time and date stamps in a variety of ways, the most common of which is to change the system clock on the computer on which the files will be created or saved to. This simple approach will allow the user to create files that are backdated to appear as though they were created on any date and time they choose. A user could back-date a file to 1776 as easily as they could 1976. Subsequently, the files that are created with these backdated file attributes can then be saved to new locations such as other computers, floppy drives, the Internet or even CD Rom or DVD Rom discs, and they will still contain the same falsified time and date stamps. 13 14 15 16 17 18 23. The dates on which a CD or DVD has been burned can also be modified or backdated using the same technique in which the computer clock is rolled back to some prior point in time. This action would impact the time and date stamps of the actual burning of the CD or DVD. 24. Validating the authenticity of backdated or falsified time and date 19 stamps requires the presence of some secondary data source to which the backdated 20 files can be compared, such as the original computer used to save the file or burn it 21 to a disc. In fraud cases where a computer is used to backdate a particular file, it is 22 not unusual that the original computer would disappear or be disposed of, so as to 23 prevent discovery of the fraud. By examining the original computer used to create 24 and save a file to CD, a computer forensic examiner would likely be able to discover 25 whether the file and CD had been backdated. That is because it would be very 26 challenging, if not impossible, for even the most adroit computer user to falsify the 27 entire record contained on a computer, where there are tens of thousands of 28 NY987869.1 217131-10001 7 DECLARATION OF ERIK LAYKIN 1 references to dates, many of which are maintained “behind the scenes” without the 2 knowledge or influence of the user. 3 4 5 6 7 8 9 25. There is a significant body of knowledge, freely accessible on the Internet to the casual user on the topic of “Anti-Forensics” which is the process of obfuscating the evidentiary trail that a computer forensic examiner would follow. While there are a number of applications, software utilities and “tricks of the trade” that can be deployed to cover up a falsified file date with even limited technical knowledge; by far the most common method used is to simply discard the original computer(s) altogether. 10 11 12 13 14 26. For a thorough analysis, it would be vital to review the original computer which managed the burning of the CD in the first instance, or a forensic backup of that computer. 27. Further complicating matters, persons engaged in the backdating of 15 computer files have also been known to use older computer equipment from the 16 back-dated time period, in order to hide the digital fingerprints often left by software 17 or hardware that was not in existence at that time. Such decommissioned computers 18 can be purchased at second-hand stores, garage sales, flea markets, EBay.com and 19 other sources for as little as $50.00. Similarly, older digital storage media such as 20 CDs, which are also readily available for purchase, have been known to be used to 21 make it more difficult to determine the true date of back-dated files. This is 22 particularly true where, as here, the computer(s) on which the files were created and 23 burned to CD are not available for forensic examination. 24 28. In my experience, it is not uncommon for individuals who use CD Rom 25 discs on a regular basis, such as those in the electronic music industry, to retain a 26 number of unused CDs, and to burn data to those old CDs years later. CD Rom 27 28 NY987869.1 217131-10001 8 DECLARATION OF ERIK LAYKIN 1 discs are often purchased in bulk, for instance in packages of 25, 50, 100 or even 2 250 discs. Indeed, Mr. Pringle testified to having repeatedly sent out demo CDs in 3 batches as large as 200 at a time, over a period of many years. Pringle thus likely 4 had access to old CDs from the late 1990s which he could have used to burn the 5 NRG discs in 2009 or 2010. 6 7 8 9 10 11 12 13 14 29. In my experience as a computer forensic investigator, I find it highly circumspect that an individual such as Pringle, who claims to rely upon computer technology for his craft of creating digital music, has failed to maintain any of his computers which would have a digital relationship of some sort to the files in question. Not only are backups and archives unavailable, which alone is highly unusual, but even his more recent computers used in 2009 and 2010 are unavailable for examination. Through Pringle’s reluctance or inability to provide any of these original computers, he has prevented the files residing on the NRG discs from ever being authenticated or disproved as genuine. 15 16 B. Pringle’s 2009/2010 Hard Drives Would Likely Contain Evidence of Any Backdating of the NRG File 17 18 19 20 21 22 23 24 25 26 27 28 30. Pringle has not produced the computer hard drives that he used in 2009 and 2010 because he disposed of them while the lawsuit was pending. Examination of those drives could yield evidence that Pringle backdated the creation and last accessed dates of the NRG files. This would be found by examining a combination of resources on the hard drive including but not limited to the system registry which logs the connection of all devices to the computer, the file system which maintains last accessed dates and creation dates for every file on the computer, and finally the unallocated space which maintains a variety of data points which are inaccessible by the user and often include best evidence of the creation or deletion of files, and clues to modifications which have taken place on the system. NY987869.1 217131-10001 9 DECLARATION OF ERIK LAYKIN 1 31. In this instance, the computer forensic examiner would most certainly 2 review the unallocated space of Pringle’s hard drives for fragments of files which 3 indicate the actual time and date on which the computer was operating at the time 4 the NRG files were burned. In addition, the computer forensic examiner would 5 review artifacts in the operating system contained on the hard drive for markers that 6 would indicate that the operating system had been impacted by the ‘rolling back’ of 7 the date on the machine. These and other techniques, including analysis of whether 8 or not software was rolled back to earlier versions, could prove or disprove the 9 authenticity of the dates of the NRG file in question. Without employing these and 10 other related techniques, I am not aware of a reasonably reliable way to authenticate 11 the date of files saved to Pringle’s NRG disc. 12 13 14 15 16 17 18 32. Pringle’s disposal of his 2009 and 2010 hard drives also prevented us from examining his recent user activity, which could not only include a review of unallocated space, but also of temporary Internet files and other artifacts, which would provide insight into his activities at that time. This activity could show that the music files in question were actually downloaded from the Internet in 2009 or 2010, after the release of “I Gotta Feeling,” and subsequently backdated and/or modified to appear as though they had been created in 1999. 19 20 33. At present I cannot see any rationale for the failure to preserve the 21 electronic evidence which is central to Pringle’s claims, whether the hard drives or 22 computers were operational or not. In fact, even if the drives were not functioning 23 properly in Pringle’s personal computer, computer forensic techniques could still 24 reliably retrieve the data contained on them for analysis and reporting to this Court. 25 Indeed, a simple search on the Internet for terms such as “Failed Hard Drive”, 26 “Crashed Computer”, Broken Hard Disc” or “Data Restoration”, will yield dozens 27 upon dozens of companies that will gladly receive your hard drive and restore the 28 NY987869.1 217131-10001 10 DECLARATION OF ERIK LAYKIN 1 data. Instead, it appears that Pringle disposed of his hard drives such that the 2 information on them could never be recovered. 3 5 C. Pringle’s 2009/2010 Hard Drives Would Likely Contain Evidence As to When and Where Pringle Downloaded “I Gotta Feeling” Music Files 6 34. 4 While Pringle claims to have saved certain computer files from the hard 7 drives that he used in 2009 and 2010 and discarded during this lawsuit, he has 8 acknowledged that he did not conduct a forensic backup of those hard drives, and, in 9 particular, did not preserve the temporary Internet files, program data or system data 10 from those hard drives. Had these sources been preserved and provided, they would 11 have the capacity to show whether or not, and when, Pringle obtained The Black 12 Eyed Peas’ music from the Internet. 13 35. Had Pringle downloaded these music files from the Internet, the hard 14 drive would likely have a record of this activity stored within the temporary Internet 15 history files, the cookie history files and the download repository. Even if Pringle 16 had downloaded the music files, copied or burned them to another location, and then 17 deleted the files and the Internet history and cookie repositories, there is a strong 18 likelihood that a forensic examination would have found evidence of this activity in 19 the unallocated space of the computer hard drive. It is here that we could have 20 found entire files, fragments of files and logs of computer usage which would have 21 been nearly impossible for the user to manually erase. 22 23 24 25 26 27 28 36. It is therefore my opinion that Pringle’s act of discarding his computer hard drives due to their claimed mechanical failures, falls far below the accepted standard of preservation of electronic evidence in litigation, not to mention the common-sense pursuit of his claims in this action. Indeed, it appears that Pringle has used the simplest “anti-forensics” technique available to him to prevent the NY987869.1 217131-10001 11 DECLARATION OF ERIK LAYKIN 1 Defendants and this Court from learning the true nature of the activity that took 2 place on Pringle’s computers, and thus whether or not his claims have any merit. 3 4 5 37. I reserve the right to supplement this report and to revise my opinion to account for any new information that may be made available by Plaintiff, Defendants, their counsel or any other source. 6 7 I declare under penalty of perjury that the foregoing is true and correct. 8 9 10 November 14th, 2011 11 _________________________________ Erik Laykin 12 _______________________ Date 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 NY987869.1 217131-10001 12 DECLARATION OF ERIK LAYKIN Exhibit A to Declaration of Erik Laykin Û®·µ Ô¿§µ·² Ý«®®»²¬ б-·¬·±² Û®·µ Ô¿§µ·²ô ÝØÚ× Ó¿²¿¹·²¹ Ü·®»½¬±® Û®·µ Ô¿§µ·² ·- ¬¸» Ó¿²¿¹·²¹ Ü·®»½¬±® ¿²¼ Ю¿½¬·½» ݱó ݸ¿·® ±º ¬¸» Ü«ºº ¿²¼ и»´°-ô ײ½ò øÒÇÍÛæ ÜËÚ÷ Ù´±¾¿´ Û´»½¬®±²·½ Ü·-½±ª»®§ ¿²¼ ײª»-¬·¹¿¬·±²- Ю¿½¬·½»ò Ó®ò Ô¿§µ·² ³¿²¿¹»- ½±³°´»¨ ·²ª»-¬·¹¿¬·±²- ¿²¼ ¼·-°«¬»- ·² ¿ ©·¼» ª¿®·»¬§ ±º ·²¼«-¬®·»- ¿²¼ ¹»±¹®¿°¸·»- ±² ¾»¸¿´º ±º ´·¬·¹¿²¬-ô ½±®°±®¿¬·±²- ¿²¼ ¹±ª»®²³»²¬ ¿¹»²½·»-ò Ü«ºº ¿²¼ и»´°-ô ײ½ò Ì©± Ý¿´·º±®²·¿ д¿¦¿ íëð ͱ«¬¸ Ù®¿²¼ ߪ»²«» íï-¬ Ú´±±® Ô±- ß²¹»´»-ô Ýß çððéï Ю»ª·±«-´§ Ó®ò Ô¿§µ·² ©¿- ¬¸» Ü·®»½¬±® ±º ײº±®³¿¬·±² Ì»½¸²±´±¹§ ײª»-¬·¹¿¬·±²- ¿¬ Ò¿ª·¹¿²¬ ݱ²-«´¬·²¹ô ײ½ò Ì»´æ îïíòîéðòîíéð Ú¿¨æ îïíòçèëòîëðð Ý»´´æ íïðòîìëòîçðî Ю»-·¼»²¬ ±º Ѳ´·²» Í»½«®·¬§ô ײ½òô ¿ °·±²»»® ·² ¬¸» »³»®¹·²¹ ¼·-½·°´·²» ±º ¸·¹¸ ¬»½¸²±´±¹§ ·²ª»-¬·¹¿¬·±²-ô ½±³°«¬»® º±®»²-·½- ¿²¼ »´»½¬®±²·½ ¼·-½±ª»®§ò »®·µò´¿§µ·²à¼«ºº¿²¼°¸»´°-ò½±³ ̱¼¿§ Ó®ò Ô¿§µ·² ·- ¿² ¿½½®»¼·¬»¼ -°»½·¿´·-¬ ·² ¬¸» ®»¿½¬·ª» ·²ª»-¬·¹¿¬·±² ¿²¼ ¿²¿´§-·- ±º ¼±³»-¬·½ ¿²¼ ·²¬»®²¿¬·±²¿´ ¼·¹·¬¿´ ¬¸»º¬ô ½§¾»®ó¬»®®±®·-³ô ¬®¿¼»³¿®µ ·²º®·²¹»³»²¬ô ±²´·²» °·®¿½§ô ½§¾»® -¯«¿¬¬·²¹ô ·²º±®³¿¬·±² ¬»½¸²±´±¹§ ¼·-°«¬»-ô »´»½¬®±²·½ ¼·-½±ª»®§ °®±¬±½±´- ¿²¼ ½±®°±®¿¬» »-°·±²¿¹»ò Ø» ¸¿- º®»¯«»²¬´§ ¿°°»¿®»¼ ±² ÝÒÒô ÚÑÈô ßÞÝô ÒÞÝô ¿²¼ ÝÞÍ ¿²¼ ¸¿- °¿®¬·½·°¿¬»¼ ±² -»ª»®¿´ Í«¾½±³³·¬¬»» ±² Ü·¹·¬¿´ Ûª·¼»²½»ô ̸» Û´»½¬®±²·½ -«®¿²½» Ú®¿«¼ Ì¿-µ Ú±®½» ¿²¼ ¸» ·- ¬¸» °¿-¬ п½·º·½ η³ Ü·®»½¬±® ±º Ó®ò Ô¿§µ·² ¸¿- ¿´-± -»®ª»¼ ¿- ¿² »¨°»®¬ ©·¬²»--ô ײª»-¬·¹¿¬±® ¿²¼ Í°»½·¿´ Ó¿-¬»® ¬± ¬¸» ½±«®¬ ·² ½±³°´»¨ ½¿-»- ·²ª±´ª·²¹ ·²º±®³¿¬·±² ¬»½¸²±´±¹§ ¿²¼ ¬¸» ¼·-°«¬»©¸·½¸ ¿®·-» º®±³ ·¬- «-¿¹» ©·¬¸·² ¿ ¾«-·²»-- ¿²¼ ²»¬©±®µ »²ª·®±²³»²¬ò ̸®±«¹¸ ¸·- ¿¾·´·¬§ ¬± ¼·-¬·´´ ¿²¼ -·³°´·º§ ¿ ¾®±¿¼ ®¿²¹» ±º ¬»½¸²±´±¹§ ½±²½»°¬- ¿²¼ ·--«»-ô ³¿²§ ±º ¸·- ½´·»²¬- ¸¿ª» -«½½»--º«´´§ ®»-±´ª»¼ ¬¸»·® ¼·-°«¬»-ò Duff & Phelps, LLC 350 South Grand Avenue Suite 3100 Los Angeles, CA 90071 T F +1 213 270 2300 +1 213 270 2301 erik.laykin@duffandphelps.com www.duffandphelps.com Page 2 of 13 Í»´»½¬·±² ±º Ò±¬»©±®¬¸§ Ý¿-»Ô¿®¹»-¬ Þ¿²µ®«°¬½§ ·² ËÍ Ø·-¬±®§ Ѳ ¾»¸¿´º ±º ß²¬±² Îò Ê¿´«µ¿-ô ݸ¿·®³¿² ±º Ö»²²»® ú Þ´±½µ Ѳ ¾»¸¿´º ±º ¬¸» ½±«®¬ ¿°°±·²¬»¼ »¨¿³·²»®ô Ó®ò Ô¿§µ·² ´»¼ ¬¸» ¬»¿³ ®»-°±²-·¾´» º±® ³¿²¿¹·²¹ ¬¸» ¼¿¬¿ ®»¯«»-¬ô ½±´´»½¬·±² ¿²¼ ¿²¿´§-·- »ºº±®¬ º±® ¬¸» º·²¿²½·¿´ ·²ª»-¬·¹¿¬·±² ±º ¬¸» ´¿®¹»-¬ ¾¿²µ®«°¬½§ ·² ËÍ ¸·-¬±®§ò ײ °®±ª·¼·²¹ -«°°±®¬ ¬± ¬¸» º·²¿²½·¿´ ¿²¿´§-·- ¬»¿³-ô Ó®ò Ô¿§µ·² ¼·®»½¬»¼ ¬¸» ½±´´»½¬·±²ô ¿²¿´§-·- ¿²¼ ¼·-¬®·¾«¬·±² ±º ±ª»® ìð ³·´´·±² °¿¹»- ±º ¼±½«³»²¬- ½«´´»¼ º®±³ é °»¬¿¾§¬»- ±º ¼¿¬¿ ·² ±ª»® îôêðð ¹´±¾¿´ -§-¬»³-ò ̸» »ºº±®¬ ®»-«´¬»¼ ·² ¿ ½±³°®»¸»²-·ª» îôîðð °¿¹» ®»°±®¬ ±² ¬¸» ½¿«-»- ±º ¬¸» Í»°¬»³¾»® îððè º¿·´«®» ±º Ô»¸³¿² Þ®±¬¸»®- ©¸·½¸ ©¿¼»´·ª»®»¼ ¬± -»ª»®¿´ ¾®¿²½¸»- ±º ¬¸» ËÍ ¹±ª»®²³»²¬ò Ù´±¾¿´ ײ¬»´´»½¬«¿´ Ю±°»®¬§ ¿²¼ כּ²¬ Ü·-°«¬» Ѳ ¾»¸¿´º ±º Õ»´´»§ Ü®§» ¿²¼ É¿®®»² ß°°±·²¬»¼ »¨°»®¬ ©·¬²»-- ±² ¾»¸¿´º ±º ¼»º»²¼¿²¬ô ¿ Û«®±°»¿² ¾¿-»¼ ¹´±¾¿´ Ú±®¬«²» ëð ݱ³°¿²§ »²¹¿¹»¼ ·² ¿² ·²¬»´´»½¬«¿´ °®±°»®¬§ ¼·-°«¬» ©·¬¸ ¿² ß³»®·½¿² Ú±®¬«²» ïðð ½±³°¿²§ò ̸» ¿½¬·±²ô ©¸·½¸ ©¿- º·´»¼ ·² îððí ®»-¬»¼ »¨°»®¬ ·² ¬¸» ³¿¬¬»® Ó®ò Ô¿§µ·² ¼·®»½¬»¼ ¬¸» ³¿²¿¹»³»²¬ ¿²¼ ®»¬®·»ª¿´ ±º ¿®½¸·ª¿´ ¼¿¬¿ º®±³ ¿½½»-- ¬± ¼¿¬¿¾¿-»- ±°»®¿¬»¼ ¾§ ¬¸» ¼»º»²¼¿²¬ò Ù´±¾¿´ ݧ¾»® Ý®·³» ݱ²-°·®¿½§ Ѳ ¾»¸¿´º ±º Þ¿µ»® ر-¬»¬´»® ß- »¨°»®¬ ©·¬²»-- ¿²¼ Í°»½·¿´ Ó¿-¬»® ¬± ¬¸» Ú»¼»®¿´ ݱ«®¬ô Ó®ò Ô¿§µ·² ³¿²¿¹»¼ ¬¸» -¬®¿¬»¹·½ °®»-»®ª¿¬·±²ô ¿²¿´§-·- ¿²¼ ¼·-½±ª»®§ ±² -»ª»®¿´ ½±²¬·²»²¬-ô Ó®ò Ô¿§µ·² -«½½»--º«´´§ ¿½¯«·®»¼ ¼·¹·¬¿´ »ª·¼»²½» ©¸·½¸ ¬¸©¿®¬»¼ ¿ ³¿¶±® ¹´±¾¿´ ½§¾»® ½®·³» ½±²-°·®¿½§ ©¸·½¸ ·²½´«¼»¼ ¾±¬¸ ·²¬»´´»½¬«¿´ °®±°»®¬§ ¬¸»º¬ ¿²¼ ¬®¿¼» -»½®»¬ ³·-¿°°®±°®·¿¬·±² ·² ©¸·½¸ ¬¸» °´¿·²¬·ºº ¸¿¼ ¿´®»¿¼§ -«ºº»®»¼ ½±²-·¼»®¿¾´» ´±--ò ß- ¿ ®»-«´¬ ±º Ó®ò Ù´±¾¿´ Ì®¿¼»³¿®µ ײº®·²¹»³»²¬ ¿²¼ Ì®¿¼» Í»½®»¬ ̸»º¬ Ó¿¬¬»® Ѳ ¾»¸¿´º ±º Õ»´´§ Ü®§» ¿²¼ É¿®®»² ©¿- ¿°°±·²¬»¼ »¨°»®¬ ©·¬²»-- ·² ¿ ¬®¿¼»³¿®µ ·²º®·²¹»³»²¬ ³¿¬¬»®ô ª¿´«»¼ ¿¬ ±ª»® êð ³·´´·±² ¼±´´¿®-ô ©¸·½¸ ¸¿¼ ´·²¹»®»¼ º±® -»ª»®¿´ §»¿®-ò ̸®±«¹¸ »¨¬»²-·ª» ¼·-½±ª»®§ ¿²¼ °®»¬®·¿´ ·²ª»-¬·¹¿¬·±²-ô Ó®ò Ô¿§µ·² ¿²¼ ¬¸» »´»½¬®±²·½ »ª·¼»²½» ¬»¿³ ©¿- ¿¾´» ¬± »-¬¿¾´·-¸ -«¾-¬¿²¬·¿´ »ª·¼»²½» º¿ª±®¿¾´» ¬± ¬¸» °±-·¬·±² ±º ¬¸» ¼»º»²¼¿²¬ô ¬¸»®»¾§ ¸»´°·²¹ ¬± ·²¼«½» °±-·¬·ª» »¿®´§ -»¬¬´»³»²¬ò Page 3 of 13 Ý¿´·º±®²·¿ ײ-«®¿²½» Ú®¿«¼ Ó¿¬¬»® Ѳ ¾»¸¿´º ±º Ú±®¼ô É¿´µ»®ô Ø¿¹¹»®¬§ ¿²¼ Þ»¸¿® Ѳ ¾»¸¿´º ±º -»ª»®¿´ ½±ó¼»º»²¼¿²¬ ·²-«®¿²½» ½¿®®·»®-ô Ó®ò Ô¿§µ·² ©¿- ¿°°±·²¬»¼ »¨°»®¬ º±® ¬¸» °«®°±-» ±º ¬»-¬·º§·²¹ ¿- ¬± ¬¸» ³¿®µ»¬ ª¿´«» ±º ¿² ±²´·²» ¾«-·²»-- ©¸·½¸ ¸¿¼ -«ºº»®»¼ ¿ ½¿¬¿-¬®±°¸·½ º·®» -»ª»®¿´ §»¿®- »¿®´·»® ¿²¼ ¸¿¼ º·´»¼ ¿ ½´¿·³ º±® »¨±®¾·¬¿²¬ ´±--»- ¾¿-»¼ ±² ·²º´¿¬»¼ ½¿®®·»®- º±® ¿² ¿³±«²¬ »¯«¿´ ¬± ¿ -³¿´´ º®¿½¬·±² ±º ¬¸»·® ±®·¹·²¿´ ½´¿·³ò Ò¿¬·±²¿´ ײ¬»´´»½¬«¿´ Ю±°»®¬§ ̸»º¬ ¿²¼ ˲º¿·® ݱ³°»¬·¬·±² Ü·-°«¬» Ѳ ¾»¸¿´º ±º Ù±±¼©·² Ю±½¬»® ¾¿-»¼ ±² ¬¸» «²º¿·® «-¿¹» ±º ½±³°«¬»® ½±¼»ò Ó®ò Ô¿§µ·² ¿²¼ ¸·- ¬»¿³ »¨¿³·²»¼ ¬¸±«-¿²¼- ±º °¿¹»- ±º ¼¿¬¿¾¿-» ¿²¼ °®±¹®¿³³·²¹ ½±¼» º®±³ ¾±¬¸ °´¿·²¬·ºº ¿²¼ ¼»º»²¼¿²¬ ¿²¼ °®±ª·¼»¼ ¿ ¾¿-·º±® ¬¸» ¿®¹«³»²¬ ¬¸¿¬ ¬¸» ¼»º»²¼¿²¬ ¸¿¼ ¾±¬¸ ·²º®·²¹»¼ ±² °´¿·²¬·ºº- ·²¬»´´»½¬«¿´ °®±°»®¬§ ¿²¼ ¬ -»¬¬´»¼ ±² ¬»®³- º¿ª±®¿¾´» ¬± ¬¸» °´¿·²¬·ººò Í»´»½¬·±² ±º λ½»²¬ ¿²¼ Ë°½±³·²¹ Ю»-»²¬¿¬·±²Conference 2nd Annual World Congress of Forensics Chongqing, China Oct 2011 International Association of Privacy Professionals Privacy Academy 2011 Dallas, TX September 2011 IQPC 11th eDiscovery Summit San Francisco, CA April 2011 RSA 2011 / 8th Annual Executive Security Action Forum San Francisco, CA February 2011 1st Annual World Congress of Forensics Conference Dalian, China October 2010 Hacker Halted USA Conference Miami, FL October 2010 Asia Anti Fraud Conference Jakarta, Indonesia August 2010 Association of Information Technology Professionals Panel Discussion Los Angeles, CA July 2010 Annual National IASA Conference: Insurance Accounting and Systems Association Dallas, TX June 2010 Greenberg Traurig Litigation Skills Academy Chicago, IL May 2010 Topic Speaker Speaker Speaker "How an eDiscovery Special Master can Reduce your Risks and Costs in the Courtroom" eDiscovery Strategies in a World with Clouds, Social Media and User-owned Devices Chair Cyber Crimes, Computer Forensics and IP toward Business Law Speaker The National Cyber Corps: A Call to Action Faculty International Seminar on Information Technology, Cyber Crimes and Computer Forensic series Panelist / Moderator Protecting Client Data in the Investigative Computer Forensics: A hands on primer for leveraging computer forensics to preserve evidence and prevent fraud. Faculty Computer Forensics Page 4 of 13 Topic Conference Annual Symposium on Risk Management Hong Kong March 2010 Information Systems Security Association (ISSA) New York, NY February 2010 Legal Technology CEO Summit New York, NY January 2010 HTCIA Asia Pacific Annual Conference Hong Kong December 2009 Greenberg Traurig Shareholders Mock Trial Houston TX October 2009 AICPA National Conference FL September 2009 Orlando, Hacker Halted USA Conference Miami, FL September 2009 Greenberg Traurig Litigation Skills Academy Tampa, FL May 2009 US Trustees Annual Conference Los Angeles, CA May 2009 US Department of Defense CyberCrime Summit January 2009 Practicing Law Institute National CLE December 2008 Annual Risk Symposium Hong Kong 2008 Hacker Halted USA Myrtle Beach, SC 2008 IASA Seattle, WA 2008 Microsoft Asian Partners Symposium Taiwan 2008 Integrated Security Conference Hong Kong 2008 Greenberg Traurig Litigation Skills Academy Washington, DC 2007 Malaysian Prime M on Cyber Terrorism and Cyber Crime Kuala Lumpur 2007 Taiwan Privacy Association Taipei 2007 ABA Employment Section National Conference New Orleans, LA 2007 Hacker Halted 2007 Dubai IAPP Privacy Summit 2007 Washington, DC Hacker Halted Peoples Republic of China 2006 Symposium on Risk Management 2006 Hong Kong Keynote Speaker Computer Forensics Panelist "Shifts in the CISO's Domain Authenticity, Admissibility and the Future of Forensics." Speaker Intersection of Law, Technology and Capital Investigating Accounting and Financial Fraud in Asia Faculty Computer Forensics Computer Forensics in Accounting Investigations The Intersection of Technology and Crime Faculty & Keynote Computer Forensics Complex Data Management in Bankruptcy Matters The Chinese Cyber War Machine Electronic Discovery in the Financial Sector Forensic Data Collection in Foreign Jurisdictions The Chinese Cyber War Machine Forensics for the Insurance Industry The Global Cyber Security Footprint Keynote Speech Hackers and CyberCrime Comes of Age Faculty and Keynote Computer Forensics and Electronic Discovery Guest Faculty and Conference Chairman Keynote Speech on Digital Privacy for Launch of Association Investigating Mass Personal Identity Theft Keynote: Penetration Testing Methodologies Investigations and Litigation in the European Union Keynote CyberCrime: A Global Outlook Digital Disaster: How Digital Data can Destroy your Business Page 5 of 13 Topic Conference 3rd Annual Integrated Security Conference and Storage World 2006 International Technology Law Association 35thAnnual Congress San Francisco 2006 Middle East Security Conference Abu Dhabi Hacker Halted 2005 Dubai Hacker Halted 2005 Singapore Direct Selling Association 2005 Baltimore, MD HTCIA (High Tech Crime Investigators Association) Los Angeles IASA 2005 Anaheim, CA Lex Mundi European Annual Conference Prague Hacker Halted 2005 Mexico City Symposium on Risk Management 2005 Hong Kong American Conference Institute New York, NY Techno-Security 2005 Myrtle Beach, SC InfoSecurity 2004 New York, NY Hacker Halted / Asian Computer Forensic Conference Kuala, Lumpur CA World 2004 Las Vegas, NV Software Council of Southern California Los Angeles, CA IDG Integrated Security Asian Expo 2004 - Singapore Informatics Symposium on Computer Forensics and Cyber Crime Hong Kong Security Industry Roundtable 2004 Miami, FL th Annual Industry Conference Washington, DC USC Marshall School of Business Roundtable 2003 Los Angeles, CA CA World 2003 Las Vegas, NV Los Angeles Venture Association Los Angeles, CA California CPA Educational Foundation Conference 2003 San Francisco, CA Association of Internet Professionals Los Angeles, CA Asian Development Bank : 36th Annual World Shanghai, China Privacy Risks in the Enterprise Navigating the new threat landscape: Exploring methods and protecting critical business infrastructures Global Internet Money Laundering Global Internet Money Laundering The State of Personal Data Privacy Best Practices in Security and Disaster Recovery Ethical Considerations in Electronic Discovery Insurance Industry Investigations Challenges in Electronic Evidence Collection Cyber Crime Technology Risk Management Best Practices Responding to Insurance Industry Investigations Hardware Based Computer Forensic Acquisitions with the Logicube Electronic Evidence Fundamentals Keynote Information Espionage Risks of OutSourcing Risks of OutSourcing Keynote Cyber Terrorism Keynote Information Espionage Computers and Terrorists Computer Forensics: Incident Response and Best Practices Pan-Pacific Strategies to Secure the M-Commerce Marketplace Convergence of Physical and I.T. Security: A New Dynamic Economic Espionage, Fraud and Embezzlement Digital Evidence and Monitoring for Electronic Fraud Security in the Connected World Global Security Risks in the Energy Industry Page 6 of 13 Topic Conference Information Systems Audit and Control Association : 30th Annual United Kingdom National Crime Squad Conference London, UK Association of Certified Fraud Examiners Irvine, CA ComTech Santa Barbara, CA Association of Trial Lawyers of America Atlanta, GA Federal Bureau of Investigations Los Angeles, CA International Security Conference and Exposition LinuxWorld New York, NY Comdex Las Vegas, NV 1st Annual China Banking Security Forum Hong Kong Computer Law Association Sidney, Austrailia Asia Law Society Information Systems Security Association Compliance Tools: The Changing Landscape of American Business Fraud in the Enterprise: Economic Espionage in the Connected World Information Technology Fraud: Emerging Threats and Responses Cyber Attack: Security and Recovery Solutions Discovery of Insurance Industry Computer Systems Computer Forensics and International Cyber Crime Economic Espionage and Protecting Intellectual Property Information Espionage and Global Corporate Risk Computer Forensics and Digital Evidence Preservation Electronic Evidence and Contemporary Banking Fraud Wireless Security Emerging Trends in Cyber Terrorism and Global Information Security Internet Security and Investigations Í»´»½¬·±² ±º λ½»²¬ Ы¾´·½¿¬·±²Publications Title Metropolitian Corporate Counsel August 2011 Metropolitian Corporate Counsel March 2011 Featured Computer Forensic Expert for a 6 part television series on Forensic Sciences produced by A&E /The History Channel 2010 Investigative Computer Forensics Wiley, Due 2012 Government Information Security News May 24, 2010 "Machines Versus Humans In E-Discovery Strengths And Weaknesses" Alt Investigative Computer Forensics National Cyber Corps: Recruiting the Best Product Liability Litigation: Current Law, Strategies and Best Practice, Published 2009 by Practicing Law Institute Press. American Bar Association National Institute on White Collar Crime 2008 Cybex Europe 2007 eSecurity Magazine Certified Forensic Hacking Investigator Editor of Official Courseware Informatics Computer Education Centers Computer Forensic Courseware Government Security News Page 7 of 13 OnlineSecurity.com Association of Trial Lawyers of America Asia Law & Practice Corporate Secretary Magazine Issues: Preparing and Responding to OnlineSecurity White Paper The Life and Death of a Dotcom in China Ю±º»--·±²¿´ ß--±½·¿¬·±²- ¿²¼ ߺº·´·¿¬·±²Consortium of Digital Forensic Specialists RSA / ESAF (Executive Security Action Forum) The Sedona Conference Working Group 1: Electronic Document Retention and Production The Sedona Conference Working Group 6: International Electronic Information Management, Discovery and Disclosure Boy Scouts of America - 2011 LA Leadership Event Blue Ribbon Committee Association of Information Technology Professionals Academy of Court-Appointed Masters High Tech Crime Consortium Association for Enterprise Information Forensic Expert Witness Association Practicing Law Institute Presidential Task Force on CyberCrime State of California Insurance Fraud Task Force FBI / Infragard National FBI / Infragard Los Angeles Chapter Secret Service Electronic Crimes Task Force WestLaw / Thompson Publishing -Committee on Electronic Evidence American Bar Association - 2011 Planning Committee - Pretrial Practice and Discovery Committee - China Law Committee - Anti Corruption Committee - Committee on CyberSpace Law Open Security Exchange USC School of Information Technology Industry Advisory Board Electronic Commerce Council Rotary International (LA5) Independent Power Producers Forum Pacific Water Council Member Member Member Ethics Committee Member Member Member Fellow Member Member Member Faculty Member Past Director Technology Committee Past Pacific Rim Director Past President Member Writing Faculty Member Member Founding Member Founding Member Past Chairman of the Advisory Board Member Delegate Past Member Page 8 of 13 Association of Internet Professionals Information Security Systems Association Association of Certified Fraud Examiners High Tech Crime Investigators Association Strategic Alliance for Enforcement (SAFE) Culver City Police Department Taiwan Privacy Association Past Corporate Member Member Member Member Asia Pacific Chapter Past Member Founding Member Û¼«½¿¬·±² Í¿²¬¿ Ó±²·½¿ ݱ´´»¹»ô Í¿²¬¿ Ó±²·½¿ô Ýß Ó¿¶±®æ б´·¬·½¿´ ͽ·»²½» Ù»³±´±¹·½¿´ ײ-¬·¬«¬» ±º ß³»®·½¿ô Í¿²¬¿ Ó±²·½¿ Ýß Ü»¹®»»æ ÖÓÙ øÖ»©»´®§ Ó¿²¿¹»³»²¬ Ù®¿¼«¿¬»÷ Ý»®¬·º·½¿¬·±²- ¿²¼ ݱ³³»²¼¿¬·±²Ý±³³»²¼¿¬·±² º®±³ ¬¸» Ù±ª»®²³»²¬ ±º ¬¸» л±°´»- λ°«¾´·½ ±º ݸ·²¿ô Þ¿²µ ±º ݸ·²¿ ÝØÚ×æ Ý»®¬·º·»¼ Ø¿½µ·²¹ Ú±®»²-·½ ײª»-¬·¹¿¬±® ݱ³³»²¼¿¬·±² º®±³ ¬¸» Ù±ª»®²³»²¬ ±º ß¾« ܸ¿¾·ô ˲·¬»¼ ß®¿¾ Û³·®¿¬»Ý±³³»²¼¿¬·±² º®±³ ¬¸» Ù±ª»®²³»²¬ ±º Ó¿´¿§-·¿ô Ö«¼·½·¿´ Ì®¿·²·²¹ ß½¿¼»³§ ß¼ª·-±®§ ¿²¼ Þ±¿®¼- ±º Ü·®»½¬±®Ü¿°·½¬ô ײ½ò øÔ±- ß²¹»´»-÷ ö ÛÝ Ý±«²½·´ô ײ½ò øÒ»© DZ®µ÷ ö Õ±®²»®-¬±²»ô Ô¬¼ò øر²¹ Õ±²¹÷ ö Ô»¿¼»®-¸·° º±® Ô·º» ß½¿¼»³§ ø͸¿²¹¸¿·÷ Ѽ»--¿ и·´¸¿®³±²·½ Ñ®½¸»-¬®¿ øѼ»--¿÷ ß³»®·½¿² Ó«-·½ Û²-»³¾´» ±º Ê·»²²¿ øÊ·»²²¿÷ ËòÒ É±®´¼ л¿½» Þ»´´ Ú±«²¼¿¬·±² øØ·®±-¸·³¿÷ Ô±- ß²¹»´»- Ó¿-¬»® ݸ±®¿´» ñ Ô±- ß²¹»´»- Ó«-·½ Ý»²¬»® øÔ±- ß²¹»´»-÷ ö Ý«®®»²¬ Ю·±® ɱ®µ Û¨°»®·»²½» îððì îððè Ü·®»½¬±® Ò¿ª·¹¿²¬ ݱ²-«´¬·²¹ô ײ½ò øÒÇÍÛæ ÒÝ×÷ Ô±- ß²¹»´»- ¿²¼ Ò»© DZ®µ Ü·®»½¬±® ±º ¬¸» º·®³- ײº±®³¿¬·±² Ì»½¸²±´±¹§ ײª»-¬·¹¿¬·±²- Ю¿½¬·½» ¿²¼ ³»³¾»® ±º ¬¸» Ü·-½±ª»®§ Í»®ª·½»- ³¿²¿¹»³»²¬ ½±³³·¬¬»»ò Ю±ª·¼»¼ »´»½¬®±²·½ ¼·-½±ª»®§ô ½±³°«¬»® º±®»²-·½¿²¼ ·²ª»-¬·¹¿¬·ª» ½±²-«´¬·²¹ º±® ³«´¬·²¿¬·±²¿´ ½±®°±®¿¬·±²- ·²ª±´ª»¼ ·² ¼·-°«¬»-ô ·²¬»®²¿´ ·²ª»-¬·¹¿¬·±²- ±® ¹±ª ˲·±² Ü¿¬¿ Ю·ª¿½§ Ó±²·¬±®·²¹ô Ü»ª»´±°·²¹ ¿²¼ Ó¿²¿¹·²¹ ݱ³°«¬»® Ú±®»²-·½ Ô¿¾±®¿¬±®·»¬¸®±«¹¸±«¬ ¬¸» ˲·¬»¼ ͬ¿¬»- ¿²¼ ·² º±®»·¹² ¶«®·-¼·½¬·±²-ò Ü·®»½¬»¼ ½±³°´»¨ »´»½¬®±²·½ ¼·-½±ª»®§ ³¿¬¬»®- ·² ¬¸» ¼±³»-¬·½ ³¿®µ»¬ ¿- ©»´´ ¿- ¬¸®±«¹¸±«¬ ß-·¿ ¿²¼ Û«®±°»ò Ó¿²¿¹»¼ -·¹²·º·½¿²¬ ³¿¬¬»®- ®»´¿¬»¼ ¬± ·--«»- -«½¸ ¿-æ ͬ±½µ Ñ°¬·±²- Þ¿½µ¼¿¬·²¹ô ̸»º¬ ±º Ì®¿¼» Í»½®»¬-ô ͱº¬©¿®» Ú¿·´«®»-ô ݧ¾»®Ý®·³»ô ײ-«®¿²½» ײ¼«-¬®§ Þ·¼ η¹¹·²¹ô ÍÛÝ ¿²¼ ÜÑÖ ×²ª»-¬·¹¿¬·±²-ô ײ¬»®²¿¬·±²¿´ Ü«» Ü·´·¹»²½» ¿²¼ ²«³»®±«- »¨°»®¬ ©·¬²»-- »²¹¿¹»³»²¬-ò Page 9 of 13 ïççé ó îððì Ю»-·¼»²¬ Ѳ´·²» Ô¿¾-ô ײ½ò Ô±- ß²¹»´»Í±º¬©¿®» ·²¬»¹®¿¬·±²ô Û³¿·´ ¸±-¬·²¹ô É»¾ ¿°°´·½¿¬·±² ¼»ª»´±°³»²¬ ¿²¼ ¸±-¬·²¹ô ±²´·²» ³¿®µ»¬·²¹ ¿²¼ ¼»ª»´±°»® ±º ½«-¬±³ ¼¿¬¿¾¿-» ¼®·ª»² ¬»½¸²±´±¹§ -±´«¬·±²- º±® ±²´·²» ¿²¼ ¬®¿¼·¬·±²¿´ ¿°°´·½¿¬·±²- ¿²¼ ¾«-·²»--»-ò Ü»ª»´±°»¼ô ³¿²¿¹»¼ ¿²¼ ¸±-¬»¼ ´¿®¹» -½¿´» -»½«®» ©»¾ »²¿¾´»¼ °®±¶»½¬- º±® ½´·»²¬- ·²½´«¼·²¹å ̸» ͬ¿¬» ±º Ý¿´·º±®²·¿ô ̸» Ù±ª»®²³»²¬ ±º ر²¹ Õ±²¹ô É¿®²»® Þ®±¬¸»®-ô Ü·-²»§ ͬ«¼·±-ô ̱§±¬¿ô б®-½¸»ô Ê»¬»®·²¿®·¿² Ý»²¬»®- ±º ß³»®·½¿ô Ô¿¬¸¿³ ¿²¼ É¿¬µ·²-ô Õ®±´´ ¿²¼ ß--±½·¿¬»-ô Ý¿´·º±®²·¿ Ó¿²«º¿½¬«®·²¹ Ì»½¸²±´±¹§ Ý»²¬»®ô ̸» Ù±ª»®²³»²¬ ±º ß´-¿½» Ú®¿²½»ô ×ÝÒ Ð¸¿®³¿½»«¬·½¿´- ¿²¼ ̸» η½¸»³±²¬ Ù®±«°ò ïççè ó îððì Ю»-·¼»²¬ ¿²¼ Ú±«²¼»® Ѳ´·²» Í»½«®·¬§ô ײ½ò Ô±- ß²¹»´»×²º±®³¿¬·±² Ì»½¸²±´±¹§ ײª»-¬·¹¿¬·±²- ¿²¼ ݱ³°«¬»® Í»½«®·¬§ º·®³ -°»½·¿´·¦·²¹ ·² ¬¸» °®±¬»½¬·±² ±º ¼·¹·¬¿´ ¿--»¬-ô ½±³°«¬»® º±®»²-·½- ¿²¼ ¬¸» ¿²¿´§-·- ±º ±²´·²» º®¿«¼ò з±²»»®»¼ ²«³»®±«¹®±«²¼¾®»¿µ·²¹ ·²ª»-¬·¹¿¬·ª» ¬»½¸²·¯«»- ©¸·½¸ ®»-«´¬»¼ ·² ¬¸» -«½½»--º«´ ½±²½´«-·±² ±º ·²ª»-¬·¹¿¬·±²- ¿²¼ ´·¬·¹¿¬·±² ª¿´«»¼ ·² ¬¸» ¸«²¼®»¼- ±º ³·´´·±²- ±º ¼±´´¿®-ò ïççë ó ïççé Ы¾´·-¸»® ¿²¼ Û¼·¬±® ·² ݸ·»º 豬±Î»²¬- Ó¿¹¿¦·²» Ô±- ß²¹»´»Ð¸±¬±Î»²¬- ¿¬ ß³»®·½¿ Ѳ´·²» Ò¿¬«®¿´ Ô·ª·²¹ ¿¬ ß³»®·½¿ Ѳ´·²» ïççî ó ïççì Ü·®»½¬±® ±º Í¿´»- ¿²¼ Ó¿®µ»¬·²¹ ß³»®·½¿² Ю±¼«½¬ Ü»ª»´±°³»²¬ô ÔÌÜ ó л±°´»- λ°«¾´·½ ±º ݸ·²¿ ïççïó ïççî Ü·®»½¬±® ±º Í¿´»- ¿²¼ Ó¿®µ»¬·²¹ Ñ´»¹ Ý¿--·²· Ю±¼«½¬-ô ÔÌÜ Ö¿°¿² ïççð ïççï Ü·®»½¬±® ±º Í¿´»- ¿²¼ Ó¿®µ»¬·²¹ Ô»- Ï«¿¼ Ю±¼«½¬-ô ײ½ò Ú®¿²½» ïçèê ïççð Ê·½» Ю»-·¼»²¬ Ô¿§µ·² »¬ Ý·» ¿¬ ×òÓ¿¹²·² ú ݱò Þ»ª»®´§ Ø·´´- ïçèì ó ïçèê Ü·®»½¬±® ±º Ó¿®µ»¬·²¹ ¿²¼ ß¼ª»®¬·-·²¹ Ô¿§µ·² »¬ Ý·» ¿¬ ×òÓ¿¹²·² ú ݱò Þ»ª»®´§ Ø·´´ïçèî ó ïçèì Í¿´»- л®-±² Ô¿§µ·² »¬ Ý·» ¿¬ ×ò Ó¿¹²·² ú ݱò Þ»ª»®´§ Ø·´´- Page 10 of 13 Û¨°»®¬ É·¬²»-- ¿²¼ Í°»½·¿´ Ó¿-¬»® Ý¿-» Ô·-¬ CASE NUMBER CASE NAME United States District Court, Northern District of California Case No. CV-09-5749-BZ Cataphora, Inc. vs. Jerrold Seth Parker, Dawn M. Barrios, Victor Manuel Diaz, Ben Gordon, Daniel E. Becnel, Jr., Ervin Amanda Gonzalez, Hugh P. Lambert, Arnold Levin, Christopher Seeger, Scott Weinstein, Gerald E. Meunier, James Robert Reeves, Bruce William Steckler, Russ M. Herman, Leonard Davis, and Does 1 - 50, inclusive. Bryan Pringle v. William Adams, Jr.; Stacy Ferguson; Allan Pineda; and Jaime Gomez, all individually and collectively as the music group The Black Eyed Peas, et al. *Straitshot Communications, Inc. v. Telekenex, Inc., Mark Prudell and Joy Prudell, Mark Radford and Nikki Radford, Joshua Summers and Julia Summers, AnthonyZabit and Jane Zabit, Brandon Chaney and Jane Doe Chaney, Mammoth Networks, LLC, and Brian Worthen and Jane Doe Worthen Tracy A Yarbough-Moore v. Addus Healthcare, Inc. United States District Court, Central District of California, Southern Division Case No. SACV10-1656 JST (RZx) United States District Court, Western District of Washington, Seattle Case No. C10-268 TSZ Superior Court of the State of California, County of San Bernardino, Central District Case. No. CIVSS-814598 Superior Court of the State of California, County of San Diego Case. No. 37-2009-00086022-CU-PO-CTL Superior Court of the State of California, County of Los Angeles, Central District Case No. BC385368 United States District Court, Southern District of California Case No. United States District Court, Central District of Florida, Orlando Division Case No. 6:08-cv-1872-ORL-31GJK United States District Court for the Southern District of Texas, Houston Division Case No. 4:2008cv00338 United States District Court, District of Connecticut Case No. 3:07CV171 United States Securities and Exchange Commission Jeff Fratilla v. So Relax California, Inc., et al. The Estate of Joseph Omar Cosina et al v. Crash Mansion LA. **Ann Capozza, Anthony Capozza, Capstone Investments, Capstone Group LLC, and Capstone Partners v. Steven Martinez, Kenneth Goerzt, Goertz & Martinez, CPA, EFTPS-2007, Inc., EFTPS-2008, Inc., Goertz & Martinez, CTA, Inc., and DOES 1-10 Federal Trade Commission vs. CyberSpy LLC and Tracer Spence. *Control Components, Inc. vs. Juan Ricardo Simeoni, David Minoofar, Vinay Nagpal, Sanjay Sherikar, Koso America Inc., Nihon Koso (Japan) Ltd. and Baro Control Valve, Inc. *Sedona Corporation vs. Open Solutions Inc. SEC vs. (Confidential) Page 11 of 13 CASE NUMBER CASE NAME Superior Court of the State of California, County of Los Angeles Case No. VC 047347 Superior Court of the State of California, County of San Diego Case No. GIC 853833 Chi Ming Fan vs. Horizon Grocers LLC, A California Limited Liability Corporation and Carmanita Corporation, A California Corporation *Baja Bound Insurance Services Inc., a California Corporation vs. Richard Allen Crews Individually dba Mexbound.com, Brian Archambo Individually and dba Mexbound aka Mexbound.com; Baja-Mex Insurance Services Inc., a Corporation *NAU Holding Company LLC, a Minnesota Limited Liability Company vs. Crop 1 Insurance Direct Inc., a Wyoming Corporation, Farm Bureau Mutual Insurance Company, an Iowa Corporation and Ecliptic Technologies Inc., a North Dakota Corporation Burnie Allen, an individual, as an individual and as CoTrustee and Beneficiary of the Burnie Allen Trust v. Gary Allen, an individual and as Co-Trustee and Beneficiary of the Gary and Robin Allen Family Trust; Robin Allen, as Co-Trustee and Beneficiary of the Gary and Robin Allen Family Trust; Ampac Insurance Marketing, Inc., and Does 1 5 inclusive Gloria L. Castro, Deputy Atty General of the State of CA, CA Dept of Justice Attorney for Complainant v. Lawrence Koplin, M.D. United States District Court, District of Minnesota Case No. 06-2446 JRT/FLN Superior Court of the State of California, County of Los Angeles Case No. BC 336916 CA Dept of Justice before the Division of Medical Quality Medical Board of CA, Dept of Consumer Affairs State of CA Case No 11-04-162836 CA Dept of Justice before the Division of Medical Quality Medical Board of CA, Dept of Consumer Affairs State of CA Case No 05-2001-124743 US District Court for the Southern District of California Case No. 04 CV 1479 H (BLM) Supreme Court of the State of New York County of New York US District Court for the Northern District of Illinois, Eastern Division Civil Action No. 03 CV 07882 US Western District of Oklahoma Case No. CIV-04-1013-W Bill Lockyer, Atty General of the State of CA, John DeCure, Deputy Attorney General, CA Dept of Justice Attorneys for Complainant v Gary J. Ordog, M.D., Newhall CA TrekEight, LLC, a California Company limited liability company v. Symantec Corporation, a Delaware Corporation *Genserve, Inc. v. Unity International Inc., Joseph Belmonte Sr., Joseph Belmonte Jr., James Guida, & William Randel Evelyn Clark, on behalf of herself and all other others similarly situated v Experian Information Services d/b/a Consumerinfo.com, Inc. Robert H.Braver, an individual v Ameriquest Mortgage Company, a Delaware corporation; Innovative Marketing, Inc., d/b/a Lead Extreme, a Washington corporation; The Loan Page, Inc. a Delaware corporation; Go Aplly, Inc., d/b/a Eleadz, a Nevada corporation, John Does 1 -50 Page 12 of 13 CASE NUMBER CASE NAME Circuit Court of the First Judicial District of Hinds County, Mississippi Civil Action No. 251-04-642CIV *Eaton Corporation; Aeroquip-Vickers, Inc.; Eaton Hydraulics, Inc. f/k/a Vickers, Inc.; & Eaton Aerospace, LLC v Jeffery D. Frisby, Individually; Kevin E. Clark, Individually; James N. Ward, Individually; Douglas E. Murphy, Individually; Rodney L. Case, Individually; Billy D. Grayson, Individually; Frisby Aerospace LLC, Frisby Aerospace Inc n/k/a Four Seventeen Aerospace, Inc; Triumph Group, Inc.; The Triumph Group Single Business Enterprise; and certain Doe Defendants numbers 1 150 *Solar Tours Inc, v Luis Macias d/b/a Tournet Systems v Rafeal A. Chieca & Rudy Tan a/k/a Rudy Fnu US District Court Southern District of New York Case No. 05 CV 5597 (GEL) (DFE) US District Court Eastern District of Michigan, Southern Division Case No. 05-72031 US District Court Southern District of New York Case No. 04-CV-00604 (CSH) (DFE) American Arbitration Association Case No. 7311700207 03 ARC US District Court of Eastern Michigan Case No. 02-70906 Orange County Superior Court Case No. 02CC00003 Los Angeles Superior Court Case No. BC 280222 US District Court of Maryland Northern Division Civil No. AMD 03 CV 3108 Orange County Superior Court OCDA Case No. 01F11792 US District Court for the Eastern District of California Case No. CR-F-03-5142 OWW US District Court of California Case No. CA-1193-A (Lee) *Easton Sports, Inc., a California corporation v Warrior Lacrosse, Inc., a Michigan corporation and New Balance Athletic Shoe, Inc., a Massachusetts corporation Logicom Inclusive Inc.d/b/a Logicom Inc.; Stephen Boriotti and Richard Rosen v W.P. Stewart & Co., William P. Stewart; John C. Russell; Edward Butler; & Rocco Macri Laguna Coast Publishing, Inc. dba Performance Racing Industry v. Gomembers, Inc. *Compuware Corporation, a Michigan corporation vs International Business Machines Corporation, a Delaware corporation Peggie Jo Brown, Rick Hornbeck, and Laurel Nevans v. Erie Insurance Exchange Company, The Chubb Group, Federal Insurance Company, Salor & Hill Company *McFarlin Graphic Systems, Inc. dba McFarlin Group vs. Shell Oil Company, et al Federal Trade Commission v. D Squared Solutions, LLC, a California limited liability company; Anish Dhingra, individually and as an officer of D Squared Solutions, LLC; Jeffrey Davis, individually and as an officer of D Squared Solutions, LLC People of the State of California vs. Timothy Chavez United States of America vs. Terry L. Walton and Everett Rabbon, Jr. *Physicians Interactive (a division of Allscripts, LLC v. Lathian Systems, Inc. Stephan Martinez and John Does 110 Page 13 of 13 CASE NUMBER CASE NAME U.S. District Court Eastern District of New York Case No. 02-CIV-04195 (DGT) (RLM) Elizabeth De Chanval Pellier against British Airways, Plc., Irving Rudowitz, Rosemary Rogers, Dan Driscoll, and Doug Hutchenson, individually, and as employers, agents, and as abiders and abettors *India World Communications Private Limited, v. ASAP Solutions, Inc., Hassan Jacob and Victor George U.S. District Court Southern District of California Case No. 00CV1199 BTM (JFS) U.S. District Court Central District of California Western Division Case No. 02-04299 DT (Cox) U.S. District Court Central District of California Case No. 03-1504 FMC (Ex) Superior Court of the State of California For the County of Orange Case No. 01CC08414 */**Software Center, Ltd., trading as Gambling.com v. Unified Productions, Inc., a California corporation; Jason Yard, an individual; James Taylor, an individual; Internet Traffic Solutions Management Pty Limited, trading s ITS Management, an Australian corporation; Ryan McFadden, an individual; and John Does 1-100, inclusive *Honeywell International Inc. and Honeywell Intellectual Properties, Inc. v. ABB Inc., ABB Inc. BU Turbocharger and ABB Turbocharger Company B.J.M.V., Inc., dab Southern Pacific Coatings; Arbor Media, Inc., and Pueblo Computers, Inc. vs. Paul J. Tolbert; Joyce K. Tolbert; Tolbert Living Trust Dated March 27, 1990; Propone Satitpunwaycha; 3-Star TShirts; Mario Guerra; Scalon, Guerra and Jacobson, and Does 1 through 20, et al. * Cases involving the theft of Trade Secrets and / or Intellectual Property theft ** Special Master in Case

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?