Transcript: 0:03 Social Media Discovery can be complex, time-consuming, and a major burden even to the most competent legal professionals. 0:10 Although traditional eDiscovery companies can offer assistance with some of these issues, their processes often leave much of the burden on the law firms. Bosco Legal’s main focus is taking the Social Media Discovery … Continue reading
Category: Social Media Investigations Videos
In our social media investigations, we use special software to gather data and information useful for litigation and insurance cases.
Video transcript: Joseph Jones: My name is Joseph Jones. I’m the Vice President of Bosco Legal Services. I’m a certified social media intelligence expert and a certified expert in cyber investigations. As a social media investigator, I’ve received numerous expert certifications in social media and you know online intelligence. I’ve received over a thousand hours … Continue reading
Video transcript: Joseph Jones: One of my primary responsibilities within the company is I oversee our investigations department. Everything we do investigations comes through me. At this point, you know, over the last two years, we’ve had like 700 percent growth in the number of cases that we have going on. And a large reason … Continue reading
Find and Authenticate Social Media Evidence Video transcript:How to find and authenticate social media evidence. Step 1: Locate the evidence. Basic search: Locate accounts on major and lesser-known social media networks that are tied to the subject’s given name. Advanced search: Locate the subject’s additional profiles by looking into aliases, nicknames and screen names. Associates … Continue reading
Can I Use Social Media Evidence in Court? A social media investigation can get you court admissible evidence to support your case. Our investigation experts locate key evidence using the latest technology and advanced investigation techniques. Pulling info from social media sites like Facebook, Twitter, Tumblr, YouTube, Instagram and more. We pull metadata, MD5 and … Continue reading