Live Social Media Evidence Capture from Today’s Vegas Strip Shooting

Unfortunately, a tragic event transpired this morning in Las Vegas leaving three people dead and at least three others injured after a shooting and fiery six-vehicle crash along the Strip. According to reports, at about 4:20 a.m. someone in an SUV opened fire into a Maserati that had stopped at a light. The Maserati moved into the intersection at Flamingo Road and collided with a taxi, starting a chain of crashes that involved four other vehicles. Our thoughts and prayers are with the victims and their families.

Given the criminal investigation and civil liability implications of this event, we wanted to demonstrate the new important capabilities of X1 Social Discovery to immediately identify, preserve and display geolocated Tweets (and often Instagram posts) at or near the scene immediately before, during and after the incident. X1 Social Discovery is now able to map a given location, such as a city block or even a full metropolitan area, and search the entire public Twitter feed to identify any geolocated tweets that have been made in the past three days (sometimes longer) within that designated area, as well as to capture any new tweets within that area going forward. As illustrated below, this capability is extremely useful for law enforcement, corporate security and civil litigators.

When we learned of the Vegas incident, we mapped the general area of the strip  and within seconds, all the recent Tweets from the past several hours were populated within the grid and collected within X1 Social Discovery.

Accident 4

From there, we were able to sort those tweets within the interface and identify some key Tweets made immediately after the incident, such as this post:

Accident 5

Accident 2

We are able to sort and identity the exact time (in GMT) of the posts in question as well as associated metadata.

Accident 3

Here is another post below. Both this example and the one above contain notable intel in the comments, suggesting the possible identity of one of the victims, as well as a reference to another posted picture on Instagram. This reflects the utility of X1 Social Discovery’s ability to collect not just the social media post, but the comments thereto in real-time.

Accident 1

This feature can also be employed proactively, to map an area around a school, an embassy, an oil drilling facility overseas, or other critical infrastructure assets to collect and store any geolocated tweets in real time. But of course in order to take full advantage of this ability to gather key evidence such as the evidence, posted above, you need to own the software at the time of the incident.

2 Comments

Filed under Social Media Investigations

Social Media Discovery Hotter Than Predictive Coding?

fire isolated over black backgroundIt was a great show last week at LegalTech New York. Definitely an increase in the number and quality of attendees and it was nice to see many friends and colleagues both old and new.

Also very noticeable were the many, many vendors sporting predictive coding (aka technology assisted review) messaging in their respective booths and various forms of marketing material. In fact, one industry colleague pointed me to a recent bold prediction offered by Recommind lawyer Howard Sklar, essentially proclaiming that predictive coding will have really hit the big time when a state bar organization issues an ethics opinion stating “that failure to use predictive coding is ethically questionable, if not unethical.” Sklar goes on to predict that such an opinion will come within the next 18 months.

I don’t disagree that such a development would be a big deal. But my question is, why stop at an advisory ethics opinion? What about an actual published court opinion where a sitting appellate judge decrees, without mincing words, that legal ethics obligations require lawyers to employ predictive coding? Now that would be huge. Something, in fact, like Griffin v. State, 192 Md. App. 518, 535 (2010), which addresses another hot topic in eDiscovery:

“[I]t should now be a matter of professional competence for attorneys to take the time to investigate social networking sites.”

Now to be fair, I must point out that Griffin v. State was reversed and remanded on other grounds (419 Md. 343 (2011)), but I would argue the overall impact from an ethics and best practices standpoint is still there.

Sklar also points out three appellate level cases with written opinions that discuss the concept of predictive coding, without any definitive rulings compelling its use, but nonetheless discussing the concept. Two of the three are even retrievable on Westlaw. I think such appellate-level published decisions are important, which is why we highlight the several thousands of published court decisions in the past three years (see here and here) that have compelled the production of, admitted into evidence, or otherwise recognized the importance of social media evidence to the case at hand. New cases are being published every day, to the point where we candidly have stopped counting due to the deluge. So by the standard set by of my esteemed fellow eDiscovery lawyer Mr. Sklar, social media discovery is a very hot field indeed.

Leave a comment

Filed under Case Law, eDiscovery & Compliance, Social Media Investigations

“Act Reasonably” — Two Court-Issued Checklists Outlining Defensible, Targeted ESI Collection

Recently two separate and prominent courts — the federal court for the Northern District of California and the Delaware Court of Chancery (which is the primary court of equity for Delaware registered corporations) issued eDiscovery preservation guidelines. This is not unprecedented as other courts have issued similar written guidance in the form of general guidance or even more enforceable local rules of court specifically addressing eDiscovery protocols. What I found particularly interesting, however, is both courts provided fairly specific guidance on the scope of collection and preservation. In the case of the California court, which notes that its “guidelines are designed to establish best practices for evidence preservation in the digital age,” the Court offers a checklist for Rule 26(f) “meet and confer” conferences with good detail on suggested ESI preservation protocols. The Delaware Court of Chancery also issued a detailed checklist or “sample collection outline.” ESI preservation checklists are useful practice guides, and these are sanctioned by two separate influential courts.

This is important as the largest expense directly associated with eDiscovery is the cost of overly inclusive preservation and collection, which leads to increased volume charges and attorney review costs. To the surprise of many, properly targeted preservation initiatives are permitted by the courts and can be enabled by adroit software that is able to quickly and effectively access and search these data sources throughout the enterprise.

The value of targeted preservation is recognized in the Committee Notes to the FRCP amendments, which urge the parties to reach agreement on the preservation of data and the keywords used to identify responsive materials. (Citing the Manual for Complex Litigation (MCL) (4th) §40.25 (2)).  And In re Genetically Modified Rice Litigation, 2007 WL 1655757 (June 5, 2007 E.D.Mo.), the court noted that “[p]reservation efforts can become unduly burdensome and unreasonably costly unless those efforts are targeted to those documents reasonably likely to be relevant or lead to the discovery of relevant evidence.”

The checklist from the California Northern District and the guidelines issued by the Delaware court are consistent with these principles as they call for the specification of date ranges, custodian names and search terms for any ESI to be preserved. The Northern District checklist, for instance, provides for the identification of specific custodians and job titles of custodians whose ESI is to  be preserved, and also specific search phrases search terms “that will be used to identify discoverable ESI and filter out ESI that is not subject to discovery.”

However, many lawyers shy away from a targeted collection strategy over misplaced defensibility concerns, optioning instead for full disk imaging and other broad collection efforts that exponentially escalate litigation costs. The fear by some is that there always may be that one document that could be missed. However, in my experience of following eDiscovery case law over the past decade, the situations where litigants face exposure on the preservation front typically involve an absence of a defensible process. When courts sanction parties, it is usually because there is not a reasonable legal hold procedure in place, where the process is ad hoc and made up on the fly and/or not effectively executed. I am personally unaware of a published decision involving a fact pattern where a company featured a reasonable collection and preservation process involving targeted collection executed pursuant to standard operating procedures, yet was sanctioned because one or two relevant documents slipped through the cracks.

This is because the duty to preserve requires reasonable efforts, not infallible means, to collect potentially relevant information. As succinctly stated by the Delaware court: “Parties are not required to preserve every shred of information. Act reasonably.”

Another barrier standing in the way of defensible and targeted collection is that searching and performing early case assessment at the point of collection is not feasible in the decentralized global enterprise with traditional eDiscovery and information management tools. What is needed to address these challenges for the de-centralized enterprise is a field-deployable search and eDiscovery solution that operates in distributed and virtualized environments on-demand within these distributed global locations where the data resides. In order to meet such a challenge, the eDiscovery and search solution must immediately and rapidly install, execute and efficiently operate locally, including in a virtual environment, where the site data is located, without rigid hardware requirements or on-site physical access.

This ground breaking capability is what X1 Rapid Discovery provides. Its ability to uniquely deploy and operate in the IaaS cloud also means that the solution can install anywhere within the wide-area network, remotely and on-demand. Importantly, the search index is created virtually in the location proximity of the data subject to collection. This enables even globally decentralized enterprises to perform targeted search and collection efforts in an efficient, defensible and highly cost effective manner. Or, in the words of the Delaware court — the ability to act reasonably.

Leave a comment

Filed under Case Law, Cloud Data, Enterprise eDiscovery, IaaS