Bryan Pringle v. William Adams Jr et al
Filing
164
DECLARATION of Erik Laykin In Support of MOTION for Summary Judgment 159 filed by Defendants David Guetta, Frederick Riesterer, Shapiro Bernstein and Co. (Miller, Donald)
1
2
UNITED STATES DISTRICT COURT
3
CENTRAL DISTRICT OF CALIFORNIA
4
SOUTHERN DIVISION
5
6 BRYAN PRINGLE, an individual,
Plaintiff,
7
vs.
8
9 WILLIAM ADAMS, JR.; STACY
FERGUSON; ALLAN PINEDA; and
10 JAIME GOMEZ, all individually and
collectively as the music group The
11 Black Eyed Peas, et al.,
Case No. SACV 8:10-CV-01656 JST
(RZx)
DECLARATION OF ERIK LAYKIN
Defendants
12
13
14
15
I, ERIK LAYKIN, declare as follows:
16
17
18
I.
EXPERT QUALIFICATIONS
1.
I am a Managing Director of the Global Electronic Discovery and
19 Investigations practice of Duff & Phelps, LLC (“D&P”), an independent consulting
20 firm of approximately 1,100 professionals, which is publicly listed on the New York
21 Stock Exchange (DUF). D&P provides litigation, financial, restructuring and
22 operational consulting services to government agencies, legal counsel and
23 companies in a variety of industries. I have been employed by D&P since July
24 2008, and am based in its Los Angeles, California office.
25
2.
I am accredited by the Electronic Commerce Council as a specialist in
26 the field of Technology Disputes, Computer Forensics and Electronic Discovery,
27 and have testified in state and federal courts on numerous occasions on matters
28
NY987869.1
217131-10001
DECLARATION OF ERIK LAYKIN
1 related to the investigation, analysis and management of electronic data, computer
2 forensic preservation and analysis, and other information technology disputes. I
3 have managed over 200 matters relating to these issues during the past 10 years.
4
5
6
7
8
9
3.
From 2004 through 2008, I was the Director of the Information
Technology Investigations practice group at Navigant Consulting, Inc. (NYSE:NCI)
and served on the Management Committee of its Discovery Services practice group.
In this role, I led teams of professionals that provided electronic discovery,
computer forensic and investigative consulting services for a wide variety of
national and international clients.
10
11
12
13
14
15
4.
From 1997 to 2004, I served as President and Founder of Online
Security (OnlineSecurity.com) which was one of world’s first providers of
commercial computer forensic services to the legal and business community for the
investigation and resolution of disputes.
5.
As part of my work at Online Security, I managed and/or developed the
16 initial Computer Forensic service offerings and established standards on behalf of
17 investigative agencies in the United States and Asia, including The Investigative
18 Group International, Kroll & Associates and Pinkerton Consulting & Investigations.
19
6.
As a result of the above training and experience, I have become very
20 familiar with a variety of software development technologies, computer systems,
21 programming languages, computer forensic and electronic discovery systems, and
22 standards of practice within the Information Technology industry.
23
7.
I have provided expert training on the topics of Computer Forensics,
24
Cyber Crime and Electronic Discovery to numerous organizations including the
25
FBI, the ABA (American Bar Association), the HTCIA (High Tech Crime
26
Investigation Association), AICPA (American Institute of Certified Public
27
28
NY987869.1
217131-10001
2
DECLARATION OF ERIK LAYKIN
1 Accountants), the Government of Malaysia, the Government of the United Arab
2 Emirates, the Government of Taiwan, the Government of Hong Kong and the
3 Government of the People’s Republic of China.
4
5
6
7
8.
I have served as an expert witness and investigator, and have been
appointed as Special Master in complex cases involving information technology and
the disputes which arise from its usage within a business and network environment.
My Curriculum Vitae is attached as Exhibit A.
8
9
10
II.
BACKGROUND AND SCOPE OF ASSIGNMENT
9.
I understand that the Plaintiff, Bryan Pringle, claims that he created a
11 song in 1999 entitled “Take a Dive” (Dance Version), and that Defendants allegedly
12 copied portions of that song when they created the song “I Gotta Feeling,” which
13 was released by The Black Eyed Peas in 2009.
14
10.
In asserting that he created “Take a Dive” (Dance Version) in 1999, I
15 understand that Pringle relies on an “NRG” file that contains the instrumental tracks
16 of “Take a Dive” (Dance Version). An NRG file is a proprietary file format
17 developed by the makers of the popular commercial CD Rom burning software
18 known as Nero. This software ships pre-installed on many desktop and laptop
19 computers, is downloadable from the Internet and has been available for purchase as
20 a stand-alone software title at most computer and office supply stores throughout the
21 United States. The file format itself is proprietary and encodes whatever data a user
22 wishes to copy from the hard drive of their computer onto a CD Rom or a DVD
23 Rom. The process in which a new NRG file is created and saved from the original
24 source file on the hard drive onto a CD or DVD is known as “burning” a file.
25
26
27
28
11.
I understand that Pringle no longer possesses the computer on which he
originally created and saved this NRG file, as he claims that computer was stolen
NY987869.1
217131-10001
3
DECLARATION OF ERIK LAYKIN
1 from a storage locker in 2000. Instead, Pringle relies on a CD to which he allegedly
2 copied (or “burned”) the NRG file in 1999. (I refer herein to a CD containing an
3 NRG file as an “NRG disc.”)
4
5
6
7
8
9
10
11
12
13
14
12.
Pringle first submitted an NRG disc allegedly containing the tracks of
“Take a Dive” (Dance Version) in connection with his application for a temporary
restraining order (“TRO”) in November 2010. That NRG disc was accompanied by
the Declaration of David Gallant, dated November 18, 2010, which purported to
authenticate the NRG file as having been last modified on June 14, 1999 and having
been burned to the NRG disc on May 17, 2001—after Pringle’s computer equipment
was allegedly stolen. Pringle also submitted his own Declaration, dated November
17, 2010, stating that he saved the NRG file that contained “Take a Dive” (Dance
Version) to his personal computer on June 14, 1999, and that he burned that NRG
file from his computer to a blank CD in May 2001. Pringle even identified the serial
number of the NRG disc which allegedly contained “Take a Dive” (Dance Version).
15
16
17
13.
I was asked by counsel for Defendants to review the November 18,
2010 Declaration of David Gallant, and to provide my professional expert opinion
18
regarding Mr. Gallant’s methodology and conclusions. Based on that review, I
19
submitted a Declaration, dated November 23, 2010, in which I explained that the
20 process and procedures employed and described by Mr. Gallant were of
21 questionable reliability, that Mr. Gallant’s findings were incomplete, and that Mr.
22 Gallant’s declaration fell short of the standard of care expected in the practice of
23 professional computer forensics. I therefore concluded that Mr. Gallant’s
24 declaration was an insufficient basis on which to authenticate the NRG disc and its
25 contents.
26
14.
I understand that, following my November 23, 2010 Declaration, on
27 January 3, 2011, Pringle filed a motion for a preliminary injunction, in which he
28
NY987869.1
217131-10001
4
DECLARATION OF ERIK LAYKIN
1 acknowledged that the NRG disc he had submitted in connection with his TRO
2 motion, and upon which his and Mr. Gallant’s declarations were based, was, in fact,
3 the wrong disc. Pringle submitted a new “correct” NRG disc in connection with his
4 preliminary injunction motion.
5
15. In his motion for a preliminary injunction, Pringle’s counsel
6
represented that Mr. Gallant had analyzed the “correct” NRG disc and assured them
7
that the NRG file on that disc had a creation date in 1999, but that Mr. Gallant was
8
unable to complete his analysis because of the 2010 winter holidays.1
9
16. I have been asked by counsel for the Defendants to provide my
10
professional expert opinion as to whether or not the “correct” NRG disc on which
11
Pringle relies can be used to authenticate the date of creation of the NRG file on that
12
disc.
13
17.
14
I also understand that Pringle has testified to having discarded two
15 computer hard drives while this litigation was pending—one in December 2010 or
16 January 2011, and another in the summer of 2011. Pringle further testified that,
17 prior to discarding these hard drives, he backed up what he considered to be relevant
18 files, but that he did not back up program files, Internet-related files or temporary
19 data files.
20
18.
I have been asked by Defendants’ counsel to provide my professional
21 expert opinion as to whether the process employed by Pringle meets professional
22 standards for electronic data preservation for litigation purposes. I have also been
23
1
I understand that, on November 11, 2011, Pringle’s counsel produced a letter from
Mr. Gallant dated August 6, 2011 that purports to date the “correct” NRG disc.
25 Because of substantial prior professional commitments, I have not had sufficient
26 time to analyze Mr. Gallant’s letter and the technical analysis discussed therein. I
reserve the right to do so should Pringle rely on Mr. Gallant’s letter in response to
27 this Declaration.
28 NY987869.1
DECLARATION OF ERIK LAYKIN
5
24
217131-10001
1 asked to provide my professional expert opinion as to whether examination of
2 Pringle’s 2009/2010 hard drives might reveal evidence indicating (i) whether
3 Pringle back-dated the NRG disc, and (ii) whether, where and when Pringle
4 downloaded “I Gotta Feeling” music files.
5
19. In conducting my analysis, I have reviewed the following materials:
6
a. Declaration of Bryan Pringle, dated November 17, 2010, in Support
7
of Plaintiff’s Motion for TRO;
8
b. Declaration of David Gallant, dated November 18, 2010, in Support
9
of Plaintiff’s Motion for TRO;
10
c. Memorandum of Points and Authorities in Support of Plaintiff’s
Motion for Preliminary Injunction, dated January 3, 2011;
11
12
d. Declaration of Bryan Pringle, dated January 3, 2011, in Support of
Plaintiff’s Motion for Preliminary Injunction;
13
14
e. Copies of two CDs produced at the offices of David Gallant on
August 8, 2011; and
15
f. Transcript of the Deposition of Bryan Pringle, dated August 24,
2011.
16
17
20.
18
19
I am being compensated at the rate of $525/hour for the analysis and
testimony which may be provided in this matter.
20 III.
ANALYSIS
21
A. The Date of the NRG File Can Not be Authenticated Without Analysis
of the Computer(s) Used to Create the File and to Burn it to the NRG
Disc
22
23
24
21.
For the reasons discussed below, it is my professional expert opinion
25 that, regardless of the date on which the CD itself was manufactured, it is not
26 possible to authenticate the date on which the NRG file was saved to the NRG disc
27
28
NY987869.1
217131-10001
6
DECLARATION OF ERIK LAYKIN
1 without access to the computer on which the NRG file was saved, and the computer
2 from which the NRG file was burned to the NRG disc.
3
4
5
6
7
8
9
10
11
12
22.
Time and date stamps on files are easily modified and cannot be relied
upon without corroborating evidence of their authenticity. A user may modify time
and date stamps in a variety of ways, the most common of which is to change the
system clock on the computer on which the files will be created or saved to. This
simple approach will allow the user to create files that are backdated to appear as
though they were created on any date and time they choose. A user could back-date
a file to 1776 as easily as they could 1976. Subsequently, the files that are created
with these backdated file attributes can then be saved to new locations such as other
computers, floppy drives, the Internet or even CD Rom or DVD Rom discs, and
they will still contain the same falsified time and date stamps.
13
14
15
16
17
18
23.
The dates on which a CD or DVD has been burned can also be
modified or backdated using the same technique in which the computer clock is
rolled back to some prior point in time. This action would impact the time and date
stamps of the actual burning of the CD or DVD.
24.
Validating the authenticity of backdated or falsified time and date
19 stamps requires the presence of some secondary data source to which the backdated
20 files can be compared, such as the original computer used to save the file or burn it
21 to a disc. In fraud cases where a computer is used to backdate a particular file, it is
22 not unusual that the original computer would disappear or be disposed of, so as to
23 prevent discovery of the fraud. By examining the original computer used to create
24 and save a file to CD, a computer forensic examiner would likely be able to discover
25 whether the file and CD had been backdated. That is because it would be very
26 challenging, if not impossible, for even the most adroit computer user to falsify the
27 entire record contained on a computer, where there are tens of thousands of
28
NY987869.1
217131-10001
7
DECLARATION OF ERIK LAYKIN
1 references to dates, many of which are maintained “behind the scenes” without the
2 knowledge or influence of the user.
3
4
5
6
7
8
9
25.
There is a significant body of knowledge, freely accessible on the
Internet to the casual user on the topic of “Anti-Forensics” which is the process of
obfuscating the evidentiary trail that a computer forensic examiner would follow.
While there are a number of applications, software utilities and “tricks of the trade”
that can be deployed to cover up a falsified file date with even limited technical
knowledge; by far the most common method used is to simply discard the original
computer(s) altogether.
10
11
12
13
14
26.
For a thorough analysis, it would be vital to review the original
computer which managed the burning of the CD in the first instance, or a forensic
backup of that computer.
27.
Further complicating matters, persons engaged in the backdating of
15 computer files have also been known to use older computer equipment from the
16 back-dated time period, in order to hide the digital fingerprints often left by software
17 or hardware that was not in existence at that time. Such decommissioned computers
18 can be purchased at second-hand stores, garage sales, flea markets, EBay.com and
19 other sources for as little as $50.00. Similarly, older digital storage media such as
20 CDs, which are also readily available for purchase, have been known to be used to
21 make it more difficult to determine the true date of back-dated files. This is
22 particularly true where, as here, the computer(s) on which the files were created and
23 burned to CD are not available for forensic examination.
24
28.
In my experience, it is not uncommon for individuals who use CD Rom
25 discs on a regular basis, such as those in the electronic music industry, to retain a
26 number of unused CDs, and to burn data to those old CDs years later. CD Rom
27
28
NY987869.1
217131-10001
8
DECLARATION OF ERIK LAYKIN
1 discs are often purchased in bulk, for instance in packages of 25, 50, 100 or even
2 250 discs. Indeed, Mr. Pringle testified to having repeatedly sent out demo CDs in
3 batches as large as 200 at a time, over a period of many years. Pringle thus likely
4 had access to old CDs from the late 1990s which he could have used to burn the
5 NRG discs in 2009 or 2010.
6
7
8
9
10
11
12
13
14
29.
In my experience as a computer forensic investigator, I find it highly
circumspect that an individual such as Pringle, who claims to rely upon computer
technology for his craft of creating digital music, has failed to maintain any of his
computers which would have a digital relationship of some sort to the files in
question. Not only are backups and archives unavailable, which alone is highly
unusual, but even his more recent computers used in 2009 and 2010 are unavailable
for examination. Through Pringle’s reluctance or inability to provide any of these
original computers, he has prevented the files residing on the NRG discs from ever
being authenticated or disproved as genuine.
15
16
B. Pringle’s 2009/2010 Hard Drives Would Likely Contain Evidence of
Any Backdating of the NRG File
17
18
19
20
21
22
23
24
25
26
27
28
30.
Pringle has not produced the computer hard drives that he used in 2009
and 2010 because he disposed of them while the lawsuit was pending. Examination
of those drives could yield evidence that Pringle backdated the creation and last
accessed dates of the NRG files. This would be found by examining a combination
of resources on the hard drive including but not limited to the system registry which
logs the connection of all devices to the computer, the file system which maintains
last accessed dates and creation dates for every file on the computer, and finally the
unallocated space which maintains a variety of data points which are inaccessible by
the user and often include best evidence of the creation or deletion of files, and clues
to modifications which have taken place on the system.
NY987869.1
217131-10001
9
DECLARATION OF ERIK LAYKIN
1
31.
In this instance, the computer forensic examiner would most certainly
2 review the unallocated space of Pringle’s hard drives for fragments of files which
3 indicate the actual time and date on which the computer was operating at the time
4 the NRG files were burned. In addition, the computer forensic examiner would
5 review artifacts in the operating system contained on the hard drive for markers that
6 would indicate that the operating system had been impacted by the ‘rolling back’ of
7 the date on the machine. These and other techniques, including analysis of whether
8 or not software was rolled back to earlier versions, could prove or disprove the
9 authenticity of the dates of the NRG file in question. Without employing these and
10 other related techniques, I am not aware of a reasonably reliable way to authenticate
11 the date of files saved to Pringle’s NRG disc.
12
13
14
15
16
17
18
32.
Pringle’s disposal of his 2009 and 2010 hard drives also prevented us
from examining his recent user activity, which could not only include a review of
unallocated space, but also of temporary Internet files and other artifacts, which
would provide insight into his activities at that time. This activity could show that
the music files in question were actually downloaded from the Internet in 2009 or
2010, after the release of “I Gotta Feeling,” and subsequently backdated and/or
modified to appear as though they had been created in 1999.
19
20
33.
At present I cannot see any rationale for the failure to preserve the
21 electronic evidence which is central to Pringle’s claims, whether the hard drives or
22 computers were operational or not. In fact, even if the drives were not functioning
23 properly in Pringle’s personal computer, computer forensic techniques could still
24 reliably retrieve the data contained on them for analysis and reporting to this Court.
25 Indeed, a simple search on the Internet for terms such as “Failed Hard Drive”,
26 “Crashed Computer”, Broken Hard Disc” or “Data Restoration”, will yield dozens
27 upon dozens of companies that will gladly receive your hard drive and restore the
28
NY987869.1
217131-10001
10
DECLARATION OF ERIK LAYKIN
1 data. Instead, it appears that Pringle disposed of his hard drives such that the
2 information on them could never be recovered.
3
5
C. Pringle’s 2009/2010 Hard Drives Would Likely Contain Evidence As
to When and Where Pringle Downloaded “I Gotta Feeling” Music
Files
6
34.
4
While Pringle claims to have saved certain computer files from the hard
7 drives that he used in 2009 and 2010 and discarded during this lawsuit, he has
8 acknowledged that he did not conduct a forensic backup of those hard drives, and, in
9 particular, did not preserve the temporary Internet files, program data or system data
10 from those hard drives. Had these sources been preserved and provided, they would
11 have the capacity to show whether or not, and when, Pringle obtained The Black
12 Eyed Peas’ music from the Internet.
13
35.
Had Pringle downloaded these music files from the Internet, the hard
14 drive would likely have a record of this activity stored within the temporary Internet
15 history files, the cookie history files and the download repository. Even if Pringle
16 had downloaded the music files, copied or burned them to another location, and then
17 deleted the files and the Internet history and cookie repositories, there is a strong
18 likelihood that a forensic examination would have found evidence of this activity in
19 the unallocated space of the computer hard drive. It is here that we could have
20 found entire files, fragments of files and logs of computer usage which would have
21 been nearly impossible for the user to manually erase.
22
23
24
25
26
27
28
36.
It is therefore my opinion that Pringle’s act of discarding his computer
hard drives due to their claimed mechanical failures, falls far below the accepted
standard of preservation of electronic evidence in litigation, not to mention the
common-sense pursuit of his claims in this action. Indeed, it appears that Pringle
has used the simplest “anti-forensics” technique available to him to prevent the
NY987869.1
217131-10001
11
DECLARATION OF ERIK LAYKIN
1 Defendants and this Court from learning the true nature of the activity that took
2 place on Pringle’s computers, and thus whether or not his claims have any merit.
3
4
5
37.
I reserve the right to supplement this report and to revise my opinion to
account for any new information that may be made available by Plaintiff,
Defendants, their counsel or any other source.
6
7
I declare under penalty of perjury that the foregoing is true and correct.
8
9
10
November 14th, 2011
11
_________________________________
Erik Laykin
12
_______________________
Date
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
NY987869.1
217131-10001
12
DECLARATION OF ERIK LAYKIN
Exhibit A to
Declaration of Erik Laykin
Û®·µ Ô¿§µ·²
Ý«®®»²¬ б-·¬·±²
Û®·µ Ô¿§µ·²ô ÝØÚ×
Ó¿²¿¹·²¹ Ü·®»½¬±®
Û®·µ Ô¿§µ·² ·- ¬¸» Ó¿²¿¹·²¹ Ü·®»½¬±® ¿²¼ Ю¿½¬·½» ݱó
ݸ¿·® ±º ¬¸» Ü«ºº ¿²¼ и»´°-ô ײ½ò øÒÇÍÛæ ÜËÚ÷ Ù´±¾¿´
Û´»½¬®±²·½ Ü·-½±ª»®§ ¿²¼ ײª»-¬·¹¿¬·±²- Ю¿½¬·½»ò Ó®ò
Ô¿§µ·² ³¿²¿¹»- ½±³°´»¨ ·²ª»-¬·¹¿¬·±²- ¿²¼ ¼·-°«¬»- ·² ¿
©·¼» ª¿®·»¬§ ±º ·²¼«-¬®·»- ¿²¼ ¹»±¹®¿°¸·»- ±² ¾»¸¿´º ±º
´·¬·¹¿²¬-ô ½±®°±®¿¬·±²- ¿²¼ ¹±ª»®²³»²¬ ¿¹»²½·»-ò
Ü«ºº ¿²¼ и»´°-ô ײ½ò
Ì©± Ý¿´·º±®²·¿ д¿¦¿
íëð ͱ«¬¸ Ù®¿²¼ ߪ»²«»
íï-¬ Ú´±±®
Ô±- ß²¹»´»-ô Ýß çððéï
Ю»ª·±«-´§ Ó®ò Ô¿§µ·² ©¿- ¬¸» Ü·®»½¬±® ±º ײº±®³¿¬·±²
Ì»½¸²±´±¹§ ײª»-¬·¹¿¬·±²- ¿¬ Ò¿ª·¹¿²¬ ݱ²-«´¬·²¹ô ײ½ò
Ì»´æ îïíòîéðòîíéð
Ú¿¨æ îïíòçèëòîëðð
Ý»´´æ íïðòîìëòîçðî
Ю»-·¼»²¬ ±º Ѳ´·²» Í»½«®·¬§ô ײ½òô ¿ °·±²»»® ·² ¬¸»
»³»®¹·²¹ ¼·-½·°´·²» ±º ¸·¹¸ ¬»½¸²±´±¹§ ·²ª»-¬·¹¿¬·±²-ô
½±³°«¬»® º±®»²-·½- ¿²¼ »´»½¬®±²·½ ¼·-½±ª»®§ò
»®·µò´¿§µ·²à¼«ºº¿²¼°¸»´°-ò½±³
̱¼¿§ Ó®ò Ô¿§µ·² ·- ¿² ¿½½®»¼·¬»¼ -°»½·¿´·-¬ ·² ¬¸» ®»¿½¬·ª»
·²ª»-¬·¹¿¬·±² ¿²¼ ¿²¿´§-·- ±º ¼±³»-¬·½ ¿²¼ ·²¬»®²¿¬·±²¿´
¼·¹·¬¿´ ¬¸»º¬ô ½§¾»®ó¬»®®±®·-³ô ¬®¿¼»³¿®µ ·²º®·²¹»³»²¬ô
±²´·²» °·®¿½§ô ½§¾»® -¯«¿¬¬·²¹ô ·²º±®³¿¬·±² ¬»½¸²±´±¹§
¼·-°«¬»-ô »´»½¬®±²·½ ¼·-½±ª»®§ °®±¬±½±´- ¿²¼ ½±®°±®¿¬»
»-°·±²¿¹»ò Ø» ¸¿- º®»¯«»²¬´§ ¿°°»¿®»¼ ±² ÝÒÒô ÚÑÈô
ßÞÝô ÒÞÝô ¿²¼ ÝÞÍ ¿²¼ ¸¿- °¿®¬·½·°¿¬»¼ ±² -»ª»®¿´
Í«¾½±³³·¬¬»»
±²
Ü·¹·¬¿´
Ûª·¼»²½»ô
̸»
Û´»½¬®±²·½
-«®¿²½»
Ú®¿«¼ Ì¿-µ Ú±®½» ¿²¼ ¸» ·- ¬¸» °¿-¬ п½·º·½ η³ Ü·®»½¬±® ±º
Ó®ò Ô¿§µ·² ¸¿- ¿´-± -»®ª»¼ ¿- ¿² »¨°»®¬ ©·¬²»--ô
ײª»-¬·¹¿¬±® ¿²¼ Í°»½·¿´ Ó¿-¬»® ¬± ¬¸» ½±«®¬ ·² ½±³°´»¨
½¿-»- ·²ª±´ª·²¹ ·²º±®³¿¬·±² ¬»½¸²±´±¹§ ¿²¼ ¬¸» ¼·-°«¬»©¸·½¸ ¿®·-» º®±³ ·¬- «-¿¹» ©·¬¸·² ¿ ¾«-·²»-- ¿²¼ ²»¬©±®µ
»²ª·®±²³»²¬ò ̸®±«¹¸ ¸·- ¿¾·´·¬§ ¬± ¼·-¬·´´ ¿²¼ -·³°´·º§ ¿
¾®±¿¼ ®¿²¹» ±º ¬»½¸²±´±¹§ ½±²½»°¬- ¿²¼ ·--«»-ô ³¿²§ ±º
¸·- ½´·»²¬- ¸¿ª» -«½½»--º«´´§ ®»-±´ª»¼ ¬¸»·® ¼·-°«¬»-ò
Duff & Phelps, LLC
350 South Grand Avenue
Suite 3100
Los Angeles, CA 90071
T
F
+1 213 270 2300
+1 213 270 2301
erik.laykin@duffandphelps.com
www.duffandphelps.com
Page 2 of 13
Í»´»½¬·±² ±º Ò±¬»©±®¬¸§ Ý¿-»Ô¿®¹»-¬ Þ¿²µ®«°¬½§ ·² ËÍ Ø·-¬±®§
Ѳ ¾»¸¿´º ±º ß²¬±² Îò Ê¿´«µ¿-ô ݸ¿·®³¿² ±º Ö»²²»® ú Þ´±½µ
Ѳ ¾»¸¿´º ±º ¬¸» ½±«®¬ ¿°°±·²¬»¼ »¨¿³·²»®ô Ó®ò Ô¿§µ·² ´»¼ ¬¸» ¬»¿³ ®»-°±²-·¾´» º±® ³¿²¿¹·²¹ ¬¸»
¼¿¬¿ ®»¯«»-¬ô ½±´´»½¬·±² ¿²¼ ¿²¿´§-·- »ºº±®¬ º±® ¬¸» º·²¿²½·¿´ ·²ª»-¬·¹¿¬·±² ±º ¬¸» ´¿®¹»-¬
¾¿²µ®«°¬½§ ·² ËÍ ¸·-¬±®§ò ײ °®±ª·¼·²¹ -«°°±®¬ ¬± ¬¸» º·²¿²½·¿´ ¿²¿´§-·- ¬»¿³-ô Ó®ò Ô¿§µ·²
¼·®»½¬»¼ ¬¸» ½±´´»½¬·±²ô ¿²¿´§-·- ¿²¼ ¼·-¬®·¾«¬·±² ±º ±ª»® ìð ³·´´·±² °¿¹»- ±º ¼±½«³»²¬- ½«´´»¼
º®±³ é °»¬¿¾§¬»- ±º ¼¿¬¿ ·² ±ª»® îôêðð ¹´±¾¿´ -§-¬»³-ò ̸» »ºº±®¬ ®»-«´¬»¼ ·² ¿ ½±³°®»¸»²-·ª»
îôîðð °¿¹» ®»°±®¬ ±² ¬¸» ½¿«-»- ±º ¬¸» Í»°¬»³¾»® îððè º¿·´«®» ±º Ô»¸³¿² Þ®±¬¸»®- ©¸·½¸ ©¿¼»´·ª»®»¼ ¬± -»ª»®¿´ ¾®¿²½¸»- ±º ¬¸» ËÍ ¹±ª»®²³»²¬ò
Ù´±¾¿´ ײ¬»´´»½¬«¿´ Ю±°»®¬§ ¿²¼ כּ²¬ Ü·-°«¬»
Ѳ ¾»¸¿´º ±º Õ»´´»§ Ü®§» ¿²¼ É¿®®»²
ß°°±·²¬»¼ »¨°»®¬ ©·¬²»-- ±² ¾»¸¿´º ±º ¼»º»²¼¿²¬ô ¿ Û«®±°»¿² ¾¿-»¼ ¹´±¾¿´ Ú±®¬«²» ëð ݱ³°¿²§
»²¹¿¹»¼ ·² ¿² ·²¬»´´»½¬«¿´ °®±°»®¬§ ¼·-°«¬» ©·¬¸ ¿² ß³»®·½¿² Ú±®¬«²» ïðð ½±³°¿²§ò ̸» ¿½¬·±²ô
©¸·½¸ ©¿- º·´»¼ ·² îððí ®»-¬»¼
»¨°»®¬ ·² ¬¸» ³¿¬¬»® Ó®ò Ô¿§µ·² ¼·®»½¬»¼ ¬¸» ³¿²¿¹»³»²¬ ¿²¼ ®»¬®·»ª¿´ ±º ¿®½¸·ª¿´ ¼¿¬¿ º®±³
¿½½»-- ¬± ¼¿¬¿¾¿-»- ±°»®¿¬»¼ ¾§ ¬¸» ¼»º»²¼¿²¬ò
Ù´±¾¿´ ݧ¾»® Ý®·³» ݱ²-°·®¿½§
Ѳ ¾»¸¿´º ±º Þ¿µ»® ر-¬»¬´»®
ß- »¨°»®¬ ©·¬²»-- ¿²¼ Í°»½·¿´ Ó¿-¬»® ¬± ¬¸» Ú»¼»®¿´ ݱ«®¬ô Ó®ò Ô¿§µ·² ³¿²¿¹»¼ ¬¸» -¬®¿¬»¹·½
°®»-»®ª¿¬·±²ô ¿²¿´§-·- ¿²¼ ¼·-½±ª»®§
±² -»ª»®¿´ ½±²¬·²»²¬-ô Ó®ò Ô¿§µ·² -«½½»--º«´´§ ¿½¯«·®»¼ ¼·¹·¬¿´ »ª·¼»²½» ©¸·½¸ ¬¸©¿®¬»¼ ¿ ³¿¶±®
¹´±¾¿´ ½§¾»® ½®·³» ½±²-°·®¿½§ ©¸·½¸ ·²½´«¼»¼ ¾±¬¸ ·²¬»´´»½¬«¿´ °®±°»®¬§ ¬¸»º¬ ¿²¼ ¬®¿¼» -»½®»¬
³·-¿°°®±°®·¿¬·±² ·² ©¸·½¸ ¬¸» °´¿·²¬·ºº ¸¿¼ ¿´®»¿¼§ -«ºº»®»¼ ½±²-·¼»®¿¾´» ´±--ò ß- ¿ ®»-«´¬ ±º Ó®ò
Ù´±¾¿´ Ì®¿¼»³¿®µ ײº®·²¹»³»²¬ ¿²¼ Ì®¿¼» Í»½®»¬ ̸»º¬ Ó¿¬¬»®
Ѳ ¾»¸¿´º ±º Õ»´´§ Ü®§» ¿²¼ É¿®®»²
©¿- ¿°°±·²¬»¼ »¨°»®¬ ©·¬²»-- ·² ¿ ¬®¿¼»³¿®µ ·²º®·²¹»³»²¬ ³¿¬¬»®ô ª¿´«»¼ ¿¬ ±ª»® êð ³·´´·±²
¼±´´¿®-ô ©¸·½¸ ¸¿¼ ´·²¹»®»¼ º±® -»ª»®¿´ §»¿®-ò ̸®±«¹¸ »¨¬»²-·ª» ¼·-½±ª»®§ ¿²¼ °®»¬®·¿´
·²ª»-¬·¹¿¬·±²-ô Ó®ò Ô¿§µ·² ¿²¼ ¬¸» »´»½¬®±²·½ »ª·¼»²½» ¬»¿³ ©¿- ¿¾´» ¬± »-¬¿¾´·-¸ -«¾-¬¿²¬·¿´
»ª·¼»²½» º¿ª±®¿¾´» ¬± ¬¸» °±-·¬·±² ±º ¬¸» ¼»º»²¼¿²¬ô ¬¸»®»¾§ ¸»´°·²¹ ¬± ·²¼«½» °±-·¬·ª» »¿®´§
-»¬¬´»³»²¬ò
Page 3 of 13
Ý¿´·º±®²·¿ ײ-«®¿²½» Ú®¿«¼ Ó¿¬¬»®
Ѳ ¾»¸¿´º ±º Ú±®¼ô É¿´µ»®ô Ø¿¹¹»®¬§ ¿²¼ Þ»¸¿®
Ѳ ¾»¸¿´º ±º -»ª»®¿´ ½±ó¼»º»²¼¿²¬ ·²-«®¿²½» ½¿®®·»®-ô Ó®ò Ô¿§µ·² ©¿- ¿°°±·²¬»¼ »¨°»®¬ º±® ¬¸»
°«®°±-» ±º ¬»-¬·º§·²¹ ¿- ¬± ¬¸» ³¿®µ»¬ ª¿´«» ±º ¿² ±²´·²» ¾«-·²»-- ©¸·½¸ ¸¿¼ -«ºº»®»¼ ¿
½¿¬¿-¬®±°¸·½ º·®» -»ª»®¿´ §»¿®- »¿®´·»® ¿²¼ ¸¿¼ º·´»¼ ¿ ½´¿·³ º±® »¨±®¾·¬¿²¬ ´±--»- ¾¿-»¼ ±² ·²º´¿¬»¼
½¿®®·»®- º±® ¿² ¿³±«²¬ »¯«¿´ ¬± ¿ -³¿´´ º®¿½¬·±² ±º ¬¸»·® ±®·¹·²¿´ ½´¿·³ò
Ò¿¬·±²¿´ ײ¬»´´»½¬«¿´ Ю±°»®¬§ ̸»º¬ ¿²¼ ˲º¿·® ݱ³°»¬·¬·±² Ü·-°«¬»
Ѳ ¾»¸¿´º ±º Ù±±¼©·² Ю±½¬»®
¾¿-»¼ ±² ¬¸» «²º¿·® «-¿¹» ±º ½±³°«¬»® ½±¼»ò Ó®ò Ô¿§µ·² ¿²¼ ¸·- ¬»¿³ »¨¿³·²»¼ ¬¸±«-¿²¼- ±º
°¿¹»- ±º ¼¿¬¿¾¿-» ¿²¼ °®±¹®¿³³·²¹ ½±¼» º®±³ ¾±¬¸ °´¿·²¬·ºº ¿²¼ ¼»º»²¼¿²¬ ¿²¼ °®±ª·¼»¼ ¿ ¾¿-·º±® ¬¸» ¿®¹«³»²¬ ¬¸¿¬ ¬¸» ¼»º»²¼¿²¬ ¸¿¼ ¾±¬¸ ·²º®·²¹»¼ ±² °´¿·²¬·ºº- ·²¬»´´»½¬«¿´ °®±°»®¬§ ¿²¼
¬
-»¬¬´»¼ ±² ¬»®³- º¿ª±®¿¾´» ¬± ¬¸» °´¿·²¬·ººò
Í»´»½¬·±² ±º λ½»²¬ ¿²¼ Ë°½±³·²¹ Ю»-»²¬¿¬·±²Conference
2nd Annual World Congress of
Forensics Chongqing, China Oct
2011
International Association of Privacy
Professionals Privacy Academy 2011
Dallas, TX September 2011
IQPC 11th eDiscovery Summit San
Francisco, CA April 2011
RSA 2011 / 8th Annual Executive
Security Action Forum San Francisco,
CA February 2011
1st Annual World Congress of
Forensics Conference Dalian, China
October 2010
Hacker Halted USA Conference
Miami, FL October 2010
Asia Anti Fraud Conference Jakarta,
Indonesia August 2010
Association of Information Technology
Professionals Panel Discussion Los
Angeles, CA July 2010
Annual National IASA Conference:
Insurance Accounting and Systems
Association Dallas, TX June 2010
Greenberg Traurig Litigation Skills
Academy Chicago, IL May 2010
Topic
Speaker
Speaker
Speaker "How an eDiscovery Special Master can
Reduce your Risks and Costs in the Courtroom"
eDiscovery Strategies in a World with Clouds, Social
Media and User-owned Devices
Chair Cyber Crimes, Computer Forensics and IP
toward Business Law
Speaker
The National Cyber Corps: A Call to Action
Faculty International Seminar on Information
Technology, Cyber Crimes and Computer Forensic
series
Panelist / Moderator Protecting Client Data in the
Investigative Computer Forensics: A hands on primer for
leveraging computer forensics to preserve evidence
and prevent fraud.
Faculty Computer Forensics
Page 4 of 13
Topic
Conference
Annual Symposium on Risk
Management Hong Kong March
2010
Information Systems Security
Association (ISSA) New York, NY
February 2010
Legal Technology CEO Summit New
York, NY January 2010
HTCIA Asia Pacific Annual
Conference Hong Kong December
2009
Greenberg Traurig Shareholders Mock
Trial Houston TX October 2009
AICPA National Conference
FL September 2009
Orlando,
Hacker Halted USA Conference
Miami, FL September 2009
Greenberg Traurig Litigation Skills
Academy Tampa, FL May 2009
US Trustees Annual Conference Los
Angeles, CA May 2009
US Department of Defense
CyberCrime Summit January 2009
Practicing Law Institute National CLE
December 2008
Annual Risk Symposium Hong Kong
2008
Hacker Halted USA Myrtle Beach, SC
2008
IASA Seattle, WA 2008
Microsoft Asian Partners Symposium
Taiwan 2008
Integrated Security Conference Hong
Kong 2008
Greenberg Traurig Litigation Skills
Academy Washington, DC 2007
Malaysian Prime M
on Cyber Terrorism and Cyber Crime
Kuala Lumpur 2007
Taiwan Privacy Association Taipei
2007
ABA Employment Section National
Conference New Orleans, LA 2007
Hacker Halted 2007 Dubai
IAPP Privacy Summit 2007
Washington, DC
Hacker Halted Peoples Republic of
China 2006
Symposium on Risk Management 2006
Hong Kong
Keynote Speaker
Computer Forensics
Panelist "Shifts in the CISO's Domain Authenticity,
Admissibility and the Future of Forensics."
Speaker Intersection of Law, Technology and
Capital
Investigating Accounting and Financial Fraud in Asia
Faculty
Computer Forensics
Computer Forensics in Accounting Investigations
The Intersection of Technology and Crime
Faculty & Keynote
Computer Forensics
Complex Data Management in Bankruptcy Matters
The Chinese Cyber War Machine
Electronic Discovery in the Financial Sector
Forensic Data Collection in Foreign Jurisdictions
The Chinese Cyber War Machine
Forensics for the Insurance Industry
The Global Cyber Security Footprint
Keynote Speech Hackers and CyberCrime Comes of
Age
Faculty and Keynote Computer Forensics and
Electronic Discovery
Guest Faculty and Conference Chairman
Keynote Speech on Digital Privacy for Launch of
Association
Investigating Mass Personal Identity Theft
Keynote: Penetration Testing Methodologies
Investigations and Litigation in the European Union
Keynote
CyberCrime: A Global Outlook
Digital Disaster: How Digital Data can Destroy your
Business
Page 5 of 13
Topic
Conference
3rd Annual Integrated Security
Conference and Storage World 2006
International Technology Law
Association 35thAnnual Congress San
Francisco 2006
Middle East Security Conference Abu
Dhabi
Hacker Halted 2005 Dubai
Hacker Halted 2005 Singapore
Direct Selling Association 2005
Baltimore, MD
HTCIA (High Tech Crime Investigators
Association) Los Angeles
IASA 2005 Anaheim, CA
Lex Mundi European Annual
Conference Prague
Hacker Halted 2005 Mexico City
Symposium on Risk Management 2005
Hong Kong
American Conference Institute New
York, NY
Techno-Security 2005 Myrtle Beach,
SC
InfoSecurity 2004 New York, NY
Hacker Halted / Asian Computer
Forensic Conference Kuala, Lumpur
CA World 2004 Las Vegas, NV
Software Council of Southern California
Los Angeles, CA
IDG Integrated Security Asian Expo
2004 - Singapore
Informatics Symposium on Computer
Forensics and Cyber Crime Hong
Kong
Security Industry Roundtable 2004
Miami, FL
th
Annual Industry Conference
Washington, DC
USC Marshall School of Business
Roundtable 2003 Los Angeles, CA
CA World 2003
Las Vegas, NV
Los Angeles Venture Association Los
Angeles, CA
California CPA Educational Foundation
Conference 2003 San Francisco, CA
Association of Internet Professionals
Los Angeles, CA
Asian Development Bank : 36th Annual
World Shanghai, China
Privacy Risks in the Enterprise
Navigating the new threat landscape: Exploring methods
and protecting critical business infrastructures
Global Internet Money Laundering
Global Internet Money Laundering
The State of Personal Data Privacy
Best Practices in Security and Disaster Recovery
Ethical Considerations in Electronic Discovery
Insurance Industry Investigations
Challenges in Electronic Evidence Collection
Cyber Crime
Technology Risk Management Best Practices
Responding to Insurance Industry Investigations
Hardware Based Computer Forensic Acquisitions with
the Logicube
Electronic Evidence Fundamentals
Keynote Information Espionage
Risks of OutSourcing
Risks of OutSourcing
Keynote
Cyber Terrorism
Keynote
Information Espionage
Computers and Terrorists
Computer Forensics: Incident Response and Best
Practices
Pan-Pacific Strategies to Secure the M-Commerce
Marketplace
Convergence of Physical and I.T. Security: A New
Dynamic
Economic Espionage, Fraud and Embezzlement
Digital Evidence and Monitoring for Electronic Fraud
Security in the Connected World
Global Security Risks in the Energy Industry
Page 6 of 13
Topic
Conference
Information Systems Audit and Control
Association : 30th Annual
United Kingdom National Crime Squad
Conference London, UK
Association of Certified Fraud
Examiners Irvine, CA
ComTech Santa Barbara, CA
Association of Trial Lawyers of
America Atlanta, GA
Federal Bureau of Investigations Los
Angeles, CA
International Security Conference and
Exposition
LinuxWorld New York, NY
Comdex Las Vegas, NV
1st Annual China Banking Security
Forum Hong Kong
Computer Law Association Sidney,
Austrailia
Asia Law Society
Information Systems Security
Association
Compliance Tools: The Changing Landscape of
American Business
Fraud in the Enterprise: Economic Espionage in the
Connected World
Information Technology Fraud: Emerging Threats and
Responses
Cyber Attack: Security and Recovery Solutions
Discovery of Insurance Industry Computer Systems
Computer Forensics and International Cyber Crime
Economic Espionage and Protecting Intellectual
Property
Information Espionage and Global Corporate Risk
Computer Forensics and Digital Evidence Preservation
Electronic Evidence and Contemporary Banking Fraud
Wireless Security
Emerging Trends in Cyber Terrorism and Global
Information Security
Internet Security and Investigations
Í»´»½¬·±² ±º λ½»²¬ Ы¾´·½¿¬·±²Publications
Title
Metropolitian Corporate Counsel
August 2011
Metropolitian Corporate Counsel
March 2011
Featured Computer Forensic Expert for a 6 part
television series on Forensic Sciences produced by
A&E /The History Channel 2010
Investigative Computer Forensics Wiley, Due
2012
Government Information Security News May 24,
2010
"Machines Versus Humans In E-Discovery
Strengths And Weaknesses"
Alt
Investigative Computer Forensics
National Cyber Corps: Recruiting the
Best
Product Liability Litigation: Current Law, Strategies
and Best Practice, Published 2009 by Practicing Law
Institute Press.
American Bar Association National Institute on
White Collar Crime 2008
Cybex Europe
2007
eSecurity Magazine
Certified Forensic Hacking Investigator
Editor of Official Courseware
Informatics Computer Education Centers
Computer Forensic Courseware
Government Security News
Page 7 of 13
OnlineSecurity.com
Association of Trial Lawyers of America
Asia Law & Practice
Corporate Secretary Magazine
Issues: Preparing and Responding to
OnlineSecurity White Paper
The Life and Death of a Dotcom in China
Ю±º»--·±²¿´ ß--±½·¿¬·±²- ¿²¼ ߺº·´·¿¬·±²Consortium of Digital Forensic Specialists
RSA / ESAF (Executive Security Action Forum)
The Sedona Conference Working Group 1:
Electronic Document Retention and Production
The Sedona Conference Working Group 6:
International Electronic Information
Management, Discovery and Disclosure
Boy Scouts of America
- 2011 LA Leadership Event Blue Ribbon
Committee
Association of Information Technology
Professionals
Academy of Court-Appointed Masters
High Tech Crime Consortium
Association for Enterprise Information
Forensic Expert Witness Association
Practicing Law Institute
Presidential Task Force on CyberCrime
State of California Insurance Fraud Task Force
FBI / Infragard National
FBI / Infragard Los Angeles Chapter
Secret Service Electronic Crimes Task Force
WestLaw / Thompson Publishing
-Committee on
Electronic Evidence
American Bar Association
- 2011 Planning Committee
- Pretrial Practice and Discovery Committee
- China Law Committee
- Anti Corruption Committee
- Committee on CyberSpace Law
Open Security Exchange
USC School of Information Technology Industry
Advisory Board
Electronic Commerce Council
Rotary International (LA5)
Independent Power Producers Forum
Pacific Water Council
Member
Member
Member
Ethics Committee
Member
Member
Member
Fellow
Member
Member
Member
Faculty
Member
Past Director Technology Committee
Past Pacific Rim Director
Past President
Member
Writing Faculty
Member
Member
Founding Member
Founding Member
Past Chairman of the Advisory Board
Member
Delegate
Past Member
Page 8 of 13
Association of Internet Professionals
Information Security Systems Association
Association of Certified Fraud Examiners
High Tech Crime Investigators Association
Strategic Alliance for Enforcement (SAFE)
Culver City Police Department
Taiwan Privacy Association
Past Corporate Member
Member
Member
Member Asia Pacific Chapter
Past Member
Founding Member
Û¼«½¿¬·±²
Í¿²¬¿ Ó±²·½¿ ݱ´´»¹»ô Í¿²¬¿ Ó±²·½¿ô Ýß
Ó¿¶±®æ б´·¬·½¿´ ͽ·»²½»
Ù»³±´±¹·½¿´ ײ-¬·¬«¬» ±º ß³»®·½¿ô Í¿²¬¿ Ó±²·½¿ Ýß
Ü»¹®»»æ ÖÓÙ øÖ»©»´®§ Ó¿²¿¹»³»²¬ Ù®¿¼«¿¬»÷
Ý»®¬·º·½¿¬·±²- ¿²¼ ݱ³³»²¼¿¬·±²Ý±³³»²¼¿¬·±² º®±³ ¬¸» Ù±ª»®²³»²¬ ±º ¬¸» л±°´»- λ°«¾´·½ ±º ݸ·²¿ô Þ¿²µ ±º ݸ·²¿
ÝØÚ×æ Ý»®¬·º·»¼ Ø¿½µ·²¹ Ú±®»²-·½ ײª»-¬·¹¿¬±®
ݱ³³»²¼¿¬·±² º®±³ ¬¸» Ù±ª»®²³»²¬ ±º ß¾« ܸ¿¾·ô ˲·¬»¼ ß®¿¾ Û³·®¿¬»Ý±³³»²¼¿¬·±² º®±³ ¬¸» Ù±ª»®²³»²¬ ±º Ó¿´¿§-·¿ô Ö«¼·½·¿´ Ì®¿·²·²¹ ß½¿¼»³§
ß¼ª·-±®§ ¿²¼ Þ±¿®¼- ±º Ü·®»½¬±®Ü¿°·½¬ô ײ½ò øÔ±- ß²¹»´»-÷ ö
ÛÝ Ý±«²½·´ô ײ½ò øÒ»© DZ®µ÷ ö
Õ±®²»®-¬±²»ô Ô¬¼ò øر²¹ Õ±²¹÷ ö
Ô»¿¼»®-¸·° º±® Ô·º» ß½¿¼»³§ ø͸¿²¹¸¿·÷
Ѽ»--¿ и·´¸¿®³±²·½ Ñ®½¸»-¬®¿ øѼ»--¿÷
ß³»®·½¿² Ó«-·½ Û²-»³¾´» ±º Ê·»²²¿ øÊ·»²²¿÷
ËòÒ É±®´¼ л¿½» Þ»´´ Ú±«²¼¿¬·±² øØ·®±-¸·³¿÷
Ô±- ß²¹»´»- Ó¿-¬»® ݸ±®¿´» ñ Ô±- ß²¹»´»- Ó«-·½ Ý»²¬»® øÔ±- ß²¹»´»-÷
ö Ý«®®»²¬
Ю·±® ɱ®µ Û¨°»®·»²½»
îððì îððè
Ü·®»½¬±®
Ò¿ª·¹¿²¬ ݱ²-«´¬·²¹ô ײ½ò øÒÇÍÛæ ÒÝ×÷ Ô±- ß²¹»´»- ¿²¼ Ò»© DZ®µ
Ü·®»½¬±® ±º ¬¸» º·®³- ײº±®³¿¬·±² Ì»½¸²±´±¹§ ײª»-¬·¹¿¬·±²- Ю¿½¬·½» ¿²¼ ³»³¾»® ±º ¬¸»
Ü·-½±ª»®§ Í»®ª·½»- ³¿²¿¹»³»²¬ ½±³³·¬¬»»ò Ю±ª·¼»¼ »´»½¬®±²·½ ¼·-½±ª»®§ô ½±³°«¬»® º±®»²-·½¿²¼ ·²ª»-¬·¹¿¬·ª» ½±²-«´¬·²¹ º±® ³«´¬·²¿¬·±²¿´ ½±®°±®¿¬·±²- ·²ª±´ª»¼ ·² ¼·-°«¬»-ô ·²¬»®²¿´
·²ª»-¬·¹¿¬·±²- ±® ¹±ª
˲·±² Ü¿¬¿ Ю·ª¿½§ Ó±²·¬±®·²¹ô Ü»ª»´±°·²¹ ¿²¼ Ó¿²¿¹·²¹ ݱ³°«¬»® Ú±®»²-·½ Ô¿¾±®¿¬±®·»¬¸®±«¹¸±«¬ ¬¸» ˲·¬»¼ ͬ¿¬»- ¿²¼ ·² º±®»·¹² ¶«®·-¼·½¬·±²-ò Ü·®»½¬»¼ ½±³°´»¨ »´»½¬®±²·½ ¼·-½±ª»®§
³¿¬¬»®- ·² ¬¸» ¼±³»-¬·½ ³¿®µ»¬ ¿- ©»´´ ¿- ¬¸®±«¹¸±«¬ ß-·¿ ¿²¼ Û«®±°»ò Ó¿²¿¹»¼ -·¹²·º·½¿²¬
³¿¬¬»®- ®»´¿¬»¼ ¬± ·--«»- -«½¸ ¿-æ ͬ±½µ Ñ°¬·±²- Þ¿½µ¼¿¬·²¹ô ̸»º¬ ±º Ì®¿¼» Í»½®»¬-ô ͱº¬©¿®»
Ú¿·´«®»-ô ݧ¾»®Ý®·³»ô ײ-«®¿²½» ײ¼«-¬®§ Þ·¼ η¹¹·²¹ô ÍÛÝ ¿²¼ ÜÑÖ ×²ª»-¬·¹¿¬·±²-ô ײ¬»®²¿¬·±²¿´
Ü«» Ü·´·¹»²½» ¿²¼ ²«³»®±«- »¨°»®¬ ©·¬²»-- »²¹¿¹»³»²¬-ò
Page 9 of 13
ïççé ó îððì
Ю»-·¼»²¬
Ѳ´·²» Ô¿¾-ô ײ½ò Ô±- ß²¹»´»Í±º¬©¿®» ·²¬»¹®¿¬·±²ô Û³¿·´ ¸±-¬·²¹ô É»¾ ¿°°´·½¿¬·±² ¼»ª»´±°³»²¬ ¿²¼ ¸±-¬·²¹ô ±²´·²» ³¿®µ»¬·²¹
¿²¼ ¼»ª»´±°»® ±º ½«-¬±³ ¼¿¬¿¾¿-» ¼®·ª»² ¬»½¸²±´±¹§ -±´«¬·±²- º±® ±²´·²» ¿²¼ ¬®¿¼·¬·±²¿´
¿°°´·½¿¬·±²- ¿²¼ ¾«-·²»--»-ò Ü»ª»´±°»¼ô ³¿²¿¹»¼ ¿²¼ ¸±-¬»¼ ´¿®¹» -½¿´» -»½«®» ©»¾ »²¿¾´»¼
°®±¶»½¬- º±® ½´·»²¬- ·²½´«¼·²¹å ̸» ͬ¿¬» ±º Ý¿´·º±®²·¿ô ̸» Ù±ª»®²³»²¬ ±º ر²¹ Õ±²¹ô É¿®²»®
Þ®±¬¸»®-ô Ü·-²»§ ͬ«¼·±-ô ̱§±¬¿ô б®-½¸»ô Ê»¬»®·²¿®·¿² Ý»²¬»®- ±º ß³»®·½¿ô Ô¿¬¸¿³ ¿²¼
É¿¬µ·²-ô Õ®±´´ ¿²¼ ß--±½·¿¬»-ô Ý¿´·º±®²·¿ Ó¿²«º¿½¬«®·²¹ Ì»½¸²±´±¹§ Ý»²¬»®ô ̸» Ù±ª»®²³»²¬ ±º
ß´-¿½» Ú®¿²½»ô ×ÝÒ Ð¸¿®³¿½»«¬·½¿´- ¿²¼ ̸» η½¸»³±²¬ Ù®±«°ò
ïççè ó îððì
Ю»-·¼»²¬ ¿²¼ Ú±«²¼»®
Ѳ´·²» Í»½«®·¬§ô ײ½ò Ô±- ß²¹»´»×²º±®³¿¬·±² Ì»½¸²±´±¹§ ײª»-¬·¹¿¬·±²- ¿²¼ ݱ³°«¬»® Í»½«®·¬§ º·®³ -°»½·¿´·¦·²¹ ·² ¬¸» °®±¬»½¬·±²
±º ¼·¹·¬¿´ ¿--»¬-ô ½±³°«¬»® º±®»²-·½- ¿²¼ ¬¸» ¿²¿´§-·- ±º ±²´·²» º®¿«¼ò з±²»»®»¼ ²«³»®±«¹®±«²¼¾®»¿µ·²¹ ·²ª»-¬·¹¿¬·ª» ¬»½¸²·¯«»- ©¸·½¸ ®»-«´¬»¼ ·² ¬¸» -«½½»--º«´ ½±²½´«-·±² ±º
·²ª»-¬·¹¿¬·±²- ¿²¼ ´·¬·¹¿¬·±² ª¿´«»¼ ·² ¬¸» ¸«²¼®»¼- ±º ³·´´·±²- ±º ¼±´´¿®-ò
ïççë ó ïççé
Ы¾´·-¸»® ¿²¼ Û¼·¬±® ·² ݸ·»º
豬±Î»²¬- Ó¿¹¿¦·²» Ô±- ß²¹»´»Ð¸±¬±Î»²¬- ¿¬ ß³»®·½¿ Ѳ´·²»
Ò¿¬«®¿´ Ô·ª·²¹ ¿¬ ß³»®·½¿ Ѳ´·²»
ïççî ó ïççì
Ü·®»½¬±® ±º Í¿´»- ¿²¼ Ó¿®µ»¬·²¹
ß³»®·½¿² Ю±¼«½¬ Ü»ª»´±°³»²¬ô ÔÌÜ ó л±°´»- λ°«¾´·½ ±º ݸ·²¿
ïççïó ïççî
Ü·®»½¬±® ±º Í¿´»- ¿²¼ Ó¿®µ»¬·²¹
Ñ´»¹ Ý¿--·²· Ю±¼«½¬-ô ÔÌÜ Ö¿°¿²
ïççð ïççï
Ü·®»½¬±® ±º Í¿´»- ¿²¼ Ó¿®µ»¬·²¹
Ô»- Ï«¿¼ Ю±¼«½¬-ô ײ½ò Ú®¿²½»
ïçèê ïççð
Ê·½» Ю»-·¼»²¬
Ô¿§µ·² »¬ Ý·» ¿¬ ×òÓ¿¹²·² ú ݱò
Þ»ª»®´§ Ø·´´-
ïçèì ó ïçèê
Ü·®»½¬±® ±º Ó¿®µ»¬·²¹ ¿²¼ ß¼ª»®¬·-·²¹
Ô¿§µ·² »¬ Ý·» ¿¬ ×òÓ¿¹²·² ú ݱò Þ»ª»®´§ Ø·´´ïçèî ó ïçèì
Í¿´»- л®-±²
Ô¿§µ·² »¬ Ý·» ¿¬ ×ò Ó¿¹²·² ú ݱò
Þ»ª»®´§ Ø·´´-
Page 10 of 13
Û¨°»®¬ É·¬²»-- ¿²¼ Í°»½·¿´ Ó¿-¬»® Ý¿-» Ô·-¬
CASE NUMBER
CASE NAME
United States District Court, Northern
District of California
Case No. CV-09-5749-BZ
Cataphora, Inc. vs. Jerrold Seth Parker, Dawn M. Barrios,
Victor Manuel Diaz, Ben Gordon, Daniel E. Becnel, Jr.,
Ervin Amanda Gonzalez, Hugh P. Lambert, Arnold
Levin, Christopher Seeger, Scott Weinstein, Gerald E.
Meunier, James Robert Reeves, Bruce William Steckler,
Russ M. Herman, Leonard Davis, and Does 1 - 50,
inclusive.
Bryan Pringle v. William Adams, Jr.; Stacy Ferguson;
Allan Pineda; and Jaime Gomez, all individually and
collectively as the music group The Black Eyed Peas, et
al.
*Straitshot Communications, Inc. v. Telekenex, Inc.,
Mark Prudell and Joy Prudell, Mark Radford and Nikki
Radford, Joshua Summers and Julia Summers,
AnthonyZabit and Jane Zabit, Brandon Chaney and Jane
Doe Chaney, Mammoth Networks, LLC, and Brian
Worthen and Jane Doe Worthen
Tracy A Yarbough-Moore v. Addus Healthcare, Inc.
United States District Court, Central
District of California, Southern Division
Case No. SACV10-1656 JST (RZx)
United States District Court, Western
District of Washington, Seattle
Case No. C10-268 TSZ
Superior Court of the State of California,
County of San Bernardino, Central District
Case. No. CIVSS-814598
Superior Court of the State of California,
County of San Diego
Case. No. 37-2009-00086022-CU-PO-CTL
Superior Court of the State of California,
County of Los Angeles, Central District
Case No. BC385368
United States District Court, Southern
District of California
Case No.
United States District Court, Central
District of Florida, Orlando Division
Case No. 6:08-cv-1872-ORL-31GJK
United States District Court for the
Southern District of Texas, Houston
Division
Case No. 4:2008cv00338
United States District Court, District of
Connecticut
Case No. 3:07CV171
United States Securities and Exchange
Commission
Jeff Fratilla v. So Relax California, Inc., et al.
The Estate of Joseph Omar Cosina et al v. Crash Mansion
LA.
**Ann Capozza, Anthony Capozza, Capstone
Investments, Capstone Group LLC, and Capstone
Partners v. Steven Martinez, Kenneth Goerzt, Goertz &
Martinez, CPA, EFTPS-2007, Inc., EFTPS-2008, Inc.,
Goertz & Martinez, CTA, Inc., and DOES 1-10
Federal Trade Commission vs. CyberSpy LLC and Tracer
Spence.
*Control Components, Inc. vs. Juan Ricardo Simeoni,
David Minoofar, Vinay Nagpal, Sanjay Sherikar, Koso
America Inc., Nihon Koso (Japan) Ltd. and Baro Control
Valve, Inc.
*Sedona Corporation vs. Open Solutions Inc.
SEC vs. (Confidential)
Page 11 of 13
CASE NUMBER
CASE NAME
Superior Court of the State of California,
County of Los Angeles
Case No. VC 047347
Superior Court of the State of California,
County of San Diego
Case No. GIC 853833
Chi Ming Fan vs. Horizon Grocers LLC, A California
Limited Liability Corporation and Carmanita Corporation,
A California Corporation
*Baja Bound Insurance Services Inc., a California
Corporation vs. Richard Allen Crews Individually dba
Mexbound.com, Brian Archambo Individually and dba
Mexbound aka Mexbound.com; Baja-Mex Insurance
Services Inc., a Corporation
*NAU Holding Company LLC, a Minnesota Limited
Liability Company vs. Crop 1 Insurance Direct Inc., a
Wyoming Corporation, Farm Bureau Mutual Insurance
Company, an Iowa Corporation and Ecliptic Technologies
Inc., a North Dakota Corporation
Burnie Allen, an individual, as an individual and as CoTrustee and Beneficiary of the Burnie Allen Trust v. Gary
Allen, an individual and as Co-Trustee and Beneficiary of
the Gary and Robin Allen Family Trust; Robin Allen, as
Co-Trustee and Beneficiary of the Gary and Robin Allen
Family Trust; Ampac Insurance Marketing, Inc., and
Does 1 5 inclusive
Gloria L. Castro, Deputy Atty General of the State of CA,
CA Dept of Justice Attorney for Complainant v.
Lawrence Koplin, M.D.
United States District Court, District of
Minnesota
Case No. 06-2446 JRT/FLN
Superior Court of the State of California,
County of Los Angeles
Case No. BC 336916
CA Dept of Justice before the Division of
Medical Quality Medical Board of CA,
Dept of Consumer Affairs State of CA
Case No 11-04-162836
CA Dept of Justice before the Division of
Medical Quality Medical Board of CA,
Dept of Consumer Affairs State of CA
Case No 05-2001-124743
US District Court for the Southern District
of California
Case No. 04 CV 1479 H (BLM)
Supreme Court of the State of New York
County of New York
US District Court for the Northern District
of Illinois, Eastern Division
Civil Action No. 03 CV 07882
US Western District of Oklahoma
Case No. CIV-04-1013-W
Bill Lockyer, Atty General of the State of CA, John
DeCure, Deputy Attorney General, CA Dept of Justice
Attorneys for Complainant v Gary J. Ordog, M.D.,
Newhall CA
TrekEight, LLC, a California Company limited liability
company v. Symantec Corporation, a Delaware
Corporation
*Genserve, Inc. v. Unity International Inc., Joseph
Belmonte Sr., Joseph Belmonte Jr., James Guida, &
William Randel
Evelyn Clark, on behalf of herself and all other others
similarly situated v Experian Information Services d/b/a
Consumerinfo.com, Inc.
Robert H.Braver, an individual v Ameriquest Mortgage
Company, a Delaware corporation; Innovative Marketing,
Inc., d/b/a Lead Extreme, a Washington corporation; The
Loan Page, Inc. a Delaware corporation; Go Aplly, Inc.,
d/b/a Eleadz, a Nevada corporation, John Does 1 -50
Page 12 of 13
CASE NUMBER
CASE NAME
Circuit Court of the First Judicial District
of Hinds County, Mississippi
Civil Action No. 251-04-642CIV
*Eaton Corporation; Aeroquip-Vickers, Inc.; Eaton
Hydraulics, Inc. f/k/a Vickers, Inc.; & Eaton Aerospace,
LLC v Jeffery D. Frisby, Individually; Kevin E. Clark,
Individually; James N. Ward, Individually; Douglas E.
Murphy, Individually; Rodney L. Case, Individually;
Billy D. Grayson, Individually; Frisby Aerospace LLC,
Frisby Aerospace Inc n/k/a Four Seventeen Aerospace,
Inc; Triumph Group, Inc.; The Triumph Group Single
Business Enterprise; and certain Doe Defendants numbers
1 150
*Solar Tours Inc, v Luis Macias d/b/a Tournet Systems v
Rafeal A. Chieca & Rudy Tan a/k/a Rudy Fnu
US District Court Southern District of New
York
Case No. 05 CV 5597 (GEL) (DFE)
US District Court Eastern District of
Michigan, Southern Division
Case No. 05-72031
US District Court Southern District of New
York
Case No. 04-CV-00604 (CSH) (DFE)
American Arbitration Association
Case No. 7311700207 03 ARC
US District Court of Eastern Michigan
Case No. 02-70906
Orange County Superior Court
Case No. 02CC00003
Los Angeles Superior Court
Case No. BC 280222
US District Court of Maryland Northern
Division
Civil No. AMD 03 CV 3108
Orange County Superior Court OCDA
Case No. 01F11792
US District Court for the Eastern District
of California
Case No. CR-F-03-5142 OWW
US District Court of California
Case No. CA-1193-A (Lee)
*Easton Sports, Inc., a California corporation v Warrior
Lacrosse, Inc., a Michigan corporation and New Balance
Athletic Shoe, Inc., a Massachusetts corporation
Logicom Inclusive Inc.d/b/a Logicom Inc.; Stephen
Boriotti and Richard Rosen v W.P. Stewart & Co.,
William P. Stewart; John C. Russell; Edward Butler; &
Rocco Macri
Laguna Coast Publishing, Inc. dba Performance Racing
Industry v. Gomembers, Inc.
*Compuware Corporation, a Michigan corporation vs
International Business Machines Corporation, a Delaware
corporation
Peggie Jo Brown, Rick Hornbeck, and Laurel Nevans v.
Erie Insurance Exchange Company, The Chubb Group,
Federal Insurance Company, Salor & Hill Company
*McFarlin Graphic Systems, Inc. dba McFarlin Group vs.
Shell Oil Company, et al
Federal Trade Commission v. D Squared Solutions, LLC,
a California limited liability company; Anish Dhingra,
individually and as an officer of D Squared Solutions,
LLC; Jeffrey Davis, individually and as an officer of D
Squared Solutions, LLC
People of the State of California vs. Timothy Chavez
United States of America vs. Terry L. Walton and Everett
Rabbon, Jr.
*Physicians Interactive (a division of Allscripts, LLC v.
Lathian Systems, Inc. Stephan Martinez and John Does 110
Page 13 of 13
CASE NUMBER
CASE NAME
U.S. District Court Eastern District of
New York
Case No. 02-CIV-04195 (DGT) (RLM)
Elizabeth De Chanval Pellier against British Airways,
Plc., Irving Rudowitz, Rosemary Rogers, Dan Driscoll,
and Doug Hutchenson, individually, and as employers,
agents, and as abiders and abettors
*India World Communications Private Limited, v. ASAP
Solutions, Inc., Hassan Jacob and Victor George
U.S. District Court Southern District of
California
Case No. 00CV1199 BTM (JFS)
U.S. District Court Central District of
California Western Division
Case No. 02-04299 DT (Cox)
U.S. District Court Central District of
California
Case No. 03-1504 FMC (Ex)
Superior Court of the State of California
For the County of Orange
Case No. 01CC08414
*/**Software Center, Ltd., trading as Gambling.com v.
Unified Productions, Inc., a California corporation; Jason
Yard, an individual; James Taylor, an individual; Internet
Traffic Solutions Management Pty Limited, trading s ITS
Management, an Australian corporation; Ryan McFadden,
an individual; and John Does 1-100, inclusive
*Honeywell International Inc. and Honeywell Intellectual
Properties, Inc. v. ABB Inc., ABB Inc. BU
Turbocharger and ABB Turbocharger Company
B.J.M.V., Inc., dab Southern Pacific Coatings; Arbor
Media, Inc., and Pueblo Computers, Inc. vs. Paul J.
Tolbert; Joyce K. Tolbert; Tolbert Living Trust Dated
March 27, 1990; Propone Satitpunwaycha; 3-Star TShirts; Mario Guerra; Scalon, Guerra and Jacobson, and
Does 1 through 20, et al.
* Cases involving the theft of Trade Secrets and / or Intellectual Property theft
** Special Master in Case
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?