Problem viewing email? Click here to view it online.

Trial Consulting
Corporate Consulting

Greetings Friends and Colleagues,

KT Designs is excited to announce our first official e-Newsletter. Going forward, we will be using this forum to notify you of newly released white papers, tips and relevant information regarding KT Designs. Feel free to share this newsletter with your colleagues and friends and, if you have comments or suggestions, we would very much like to hear from you.

Your support and patronage is our motivation. Thank you for your continued confidence in us!

Remember: It’s never too early to discuss strategy, no matter where you are in the litigation process. Call us today to schedule your free initial consultation on your upcoming litigation.

Kristin Thomas
Owner, KT Designs

In this edition:

Announcement of the Pre-release of KT Designs’ New White Paper

Our newest and much anticipated white paper, New Frontiers in Science, Part II: Your Brain – The Prosecutors’ Star Witness?, is now available for download on our website. This whitepaper, which focuses on the application of new technologies and advancements in data analytics, predictive coding and neuroscience in the legal industry, is the second half of a two part series. The first white paper, New Frontiers in Science, Part I: Body Language, Technology and their Application in the Legal Industry, is also available for download.

The link to the white paper section of our website is as follows:

It is unnecessary to subscribe to a list or submit information to access any of our academic papers. Feedback and thoughtful debate is always encouraged.

Tips and Tricks…

Protecting Compromised Information

In the wake of the most recent disclosures of large-scale successful computer breaches of US government systems, we thought it prudent to include some information on what do to if you discover your identity or digital footprint has been compromised. Know exactly what needs to be protected and have a plan in place before something happens. This extends to information as well as physical assets.

General steps to take in the wake of a systems breach:

  • Detect, Isolate and Remediate
    Isolate the affected system immediately to mitigate potential damage. Once contained, act to remediate the compromised systems.
  • Assessment
    Assess other systems to ensure that containment was successful and no other areas were compromised by the breach.
  • Mitigation
    Mitigate the consequences of said breach as quickly as possible. For an individual, this would include contacting your financial institutions and credit lending agencies. For companies, this could include enacting business continuity and disaster recovery protocols and procedures.

If you have ever applied for a security clearance from (or required a background check by) the US government, the following is some basic guidance for assisting you in mitigating your risks:

  • Put a block on your credit reports to prevent anyone from opening new accounts unless you are contacted first:
  • DO NOT respond to e-mails or phone calls from anyone saying that they are from DHS, OPM, or DoD and are offering to help. Expect fraudulent phone calls.
  • Change all of your security questions on ALL of your bank and credit account information, make sure the security questions and answers are not provided by you in your security clearance information.
  • Close all accounts you are not using.
  • Request from your banks and credit card companies that they send you new cards with chip and pin.
  • Use the Freedom of information Act (FOIA) to request the information obtained by US DoD for the purpose of granting your clearance.
  • Await the OPM letter that will send you a pin number so you can log in and register for free credit monitoring and up to $1 million in coverage in case your identity is compromised and potentially affects your credit.

Remember, this information provided is only basic, though considerable time and effort on your part is required for one or more of these steps should you wish to pursue these risk mitigation efforts in protecting your compromised information.

If you are concerned that you have been compromised and wish to take further steps by getting in touch with a security professional, KT Designs can put you in contact with one of our experts. Please contact us at 202.554.0272 or

Research: The Social Media Advantage

Online research is a powerful tool. As found in case law, it is also discoverable in a court of law and the expectation of privacy afforded in the constitution does not extend to the Internet. A recent Pew Research Center survey released in September of 2014 indicated that 81% of all American adults accessing the internet have at least one social media account, which is down from 89% in 2013. While Facebook is still the preeminent social media community being utilized, it is worth noting that 52% of US adults online have more than one social media account.


You are receiving this e-Newsletter because you have used our services in the past or have demonstrated an interest in one of KT Designs LLC services. If you no longer wish to receive these emails, please reply to this message and type the word "Unsubscribe" in the subject line.