Computer Forensics at BWM&S

|
Alert

Spoliation (spo-le-a-shen) is the destruction, alteration, or failure to preserve evidence.  If a court determines that a party in litigation has failed to produce evidence due to spoliation, juries are instructed that they may infer that the evidence would be adverse so long as the evidence was:  (a) under the control of the party that destroyed or altered it; (b) not equally available to the other party with the evidence; and (c) would have been produced by the party who destroyed the evidence if it was favorable.  Illinois Pattern Jury Instructions, Civil, No. 5.01.

"A spoliation instruction is a powerful litigation tool that can be as damaging to your opponent as the evidence that was destroyed," said Gerry Ring, chair of the firm's litigation group.  Proving spoliation before computer forensics was difficult, and often required whistleblower testimony.  Today, with the help of experts like Protek International, Inc.’s Keith Chval, spoliation can be easier to detect and prove at trial.

Keith is an attorney and former prosecutor who attended the July 2012 BWM&S litigation group meeting to present: “Deleted” Doesn't Mean “Gone.” Keith explained the benefits, and limits, of digital investigation, including computer forensics. “Television shows like CSI create many myths about the ability to recover information that someone has intentionally tried to delete,” said Keith, adding, “each investigation is unique and depends on the methods used to attempt to purge damaging evidence.”

Protek’s investigations can lead to conduct other than evidence destruction, including evidence manipulation. Protek conducted a digital investigation for BWM&S that disclosed the production of a "bogus" laptop computer in discovery.  Upon its review of the computer that was produced, Protek learned that the emails it contained were created with Word 7 software. The problem for the party producing the computer, however, was that Word 7 software was never installed on it, so it could not have been the computer used to create the emails.  Further investigation disclosed that the Word 7 emails on the bogus laptop had been transferred onto it from another computer via a USB port after the inspection was made - meaning the emails contained on the bogus laptop were cherry-picked for the inspection, leaving the balance of the emails on the original computer that created them.  

Unfortunately, software designed to destroy computer evidence continues to improve, making the destruction more common, and more challenging to detect. Keith advised BWM&S that the best way to recover valuable evidence, or detect its destruction, is to act fast to preserve the evidence, and to protect the chain of custody to avoid inadvertent contamination to that it can be used at trial. For more information regarding digital investigations, including computer forensics, contact Keith Chval at 630-986-8206, kchval@protekintl.com or Gerry Ring at 312-840-7014, gring@burkelaw.com.

Related Professional

Sign-Up

Subscribe to receive firm announcements, news, alerts and event invitations.

Subscribe

Jump to Page

Burke, Warren, MacKay & Serritella, P.C. Cookie Preference Center

Your Privacy

When you visit our website, we use cookies on your browser to collect information. The information collected might relate to you, your preferences, or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. For more information about how we use Cookies, please see our Privacy Policy.

Strictly Necessary Cookies

Always Active

Necessary cookies enable core functionality such as security, network management, and accessibility. These cookies may only be disabled by changing your browser settings, but this may affect how the website functions.

Functional Cookies

Always Active

Some functions of the site require remembering user choices, for example your cookie preference, or keyword search highlighting. These do not store any personal information.

Form Submissions

Always Active

When submitting your data, for example on a contact form or event registration, a cookie might be used to monitor the state of your submission across pages.

Analytical Cookies

Analytical cookies help us improve our website by collecting and reporting information on its usage. We access and process information from these cookies at an aggregate level.

Powered by Firmseek