Forensic Analysis

Our litigation attorneys work with forensic advisors to identify both direct and circumstantial forensic evidence to support claims against individuals conducting online attacks.  Our team understands the available options and the questions to ask in order to seize the best data on behalf of our clients.

Our team has a wealth of experience examining nearly all types of digital devices in preparation for or in the midst of legal action, including computers, external hard drives, thumb drives, memory cards, smart phones and tablets.  Those who are engaging in online attacks often take considerable steps to delete digital evidence once they learn they have or may be identified.  We have worked with professionals to identify deleted documents housed within a device’s slack space. Even when defendants have wiped clean entire devices, we have successfully used the timeline and data involved in the deletion to receive court orders in our favor.

Vast amounts of additional data housed within digital devices have successfully helped a number of our clients take action against their defamers.  Such information includes metadata (the data about data that can often show when files were created, modified and accessed); external devices (forensic examiners can sometimes determine what external devices were connected to a machine); and .lnk files (these files are typically able to show when a file was present or accessed, even if it has been deleted).

It is imperative that your defamation attorney not only knows forensic experts in the field and can provide sufficient direction, but also understands what legal steps can be taken with the evidence recovered.  We do this on a regular basis.  In addition, given the short statute of limitations for online defamation cases, it is important to consider taking action quickly.