Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Computer Forensics Docket Sheet

By Michele C.S. Lange and Charity Delich
January 28, 2005

Expert Sheds Light On Computer-Generated Will

In a case involving a will contest, the sons of the deceased filed an application to probate a 2001 computer-generated will. The deceased's widow filed a conflicting application to probate a 1998 holographic will. At trial, the jury determined the deceased never executed the computer-generated will and the deceased did not execute the holographic will with testamentary intent. On cross-appeal, the sons argued the computer-generated will ' found on the deceased's computer after his death ' was properly executed as a matter of law and the jury's decision went against the great weight of the evidence. At trial, the widow's expert had suggested someone could have easily manipulated the create date of the computer-generated will, making it unreliable. The appellate court noted, however, that the widow's expert was not a computer expert and had not actually examined the deceased's computer. Moreover, the testimony from the widow's expert conflicted with testimony given by the sons' expert ' who had actually examined the computer. The sons' computer expert testified that any manipulation of the create date would have been easily detectable. The sons' expert further testified he found no evidence of manipulation. Based on this and other testimony, the court reversed and remanded, stating the jury's decision was “clearly wrong and unjust” and contradicted the great weight of the evidence. In re Estate of Steed, 2004 WL 2912929 (Tex. Ct. App. Dec. 17, 2004).


Defendant Caught Wiping Laptop;
Ordered To Preserve Information

Alleging breach of various employment and confidentiality agreements and conspiracy to misappropriate trade secrets, the plaintiff filed a motion to preserve and protect evidence. The plaintiff claimed the defendant installed Incinerate, a software wiping utility, on his company laptop, deleted 94 megabytes of information, and returned the laptop without mentioning the deleted files. The plaintiff informed the court that it had made a backup copy of all of the documents on the laptop prior to the defendant's actions, and a comparison of the backup copy with the returned laptop revealed that the defendant had deleted documents relating to his involvement in the activities at issue. Based on the plaintiff's allegations, the court ordered all parties to preserve and “not erase, alter, modify, or destroy” any evidence, including e-mail and electronic documents. Hypro, LLC v. Reser, 2004 WL 2905321 (D. Minn. Dec. 10, 2004).


Court Upholds Repayment Of Fees Incurred
In Computer Forensic Investigation

After discovering missing stock shares, an employer suspected embezzlement and requested the defendant's laptop computer for examination. The employer specifically told the defendant not to delete anything from the hard drive. A computer forensic analysis revealed the defendant attempted to overwrite files on the computer by running an “evidence eliminator” software-wiping program at least five times the night before he turned over the computer. The defendant was convicted of embezzlement and ordered to pay restitution, including reimbursing the employer for $1,038,477 of the total $1,268,022 costs spent on the forensic analysis. On appeal, the defendant argued the trial court should not have awarded the employer investigation costs, including the costs of the forensic examination. The appellate court rejected this argument and affirmed the district court's award, noting the defendant “purposefully covered his tracks as he concealed his numerous acts of wrongdoing from Cisco over a period of years. As the victim, Cisco cannot be faulted for making a concerted effort to pick up his trail and identify all the assets he took amid everything he worked on.” United States v. Gordon, 2004 WL 3015422 (9th Cir. Dec. 30, 2004).



Michele C.S. Lange Charity Delich www.krollontrack.com e-Discovery Law & Strategy [email protected]

Expert Sheds Light On Computer-Generated Will

In a case involving a will contest, the sons of the deceased filed an application to probate a 2001 computer-generated will. The deceased's widow filed a conflicting application to probate a 1998 holographic will. At trial, the jury determined the deceased never executed the computer-generated will and the deceased did not execute the holographic will with testamentary intent. On cross-appeal, the sons argued the computer-generated will ' found on the deceased's computer after his death ' was properly executed as a matter of law and the jury's decision went against the great weight of the evidence. At trial, the widow's expert had suggested someone could have easily manipulated the create date of the computer-generated will, making it unreliable. The appellate court noted, however, that the widow's expert was not a computer expert and had not actually examined the deceased's computer. Moreover, the testimony from the widow's expert conflicted with testimony given by the sons' expert ' who had actually examined the computer. The sons' computer expert testified that any manipulation of the create date would have been easily detectable. The sons' expert further testified he found no evidence of manipulation. Based on this and other testimony, the court reversed and remanded, stating the jury's decision was “clearly wrong and unjust” and contradicted the great weight of the evidence. In re Estate of Steed, 2004 WL 2912929 (Tex. Ct. App. Dec. 17, 2004).


Defendant Caught Wiping Laptop;
Ordered To Preserve Information

Alleging breach of various employment and confidentiality agreements and conspiracy to misappropriate trade secrets, the plaintiff filed a motion to preserve and protect evidence. The plaintiff claimed the defendant installed Incinerate, a software wiping utility, on his company laptop, deleted 94 megabytes of information, and returned the laptop without mentioning the deleted files. The plaintiff informed the court that it had made a backup copy of all of the documents on the laptop prior to the defendant's actions, and a comparison of the backup copy with the returned laptop revealed that the defendant had deleted documents relating to his involvement in the activities at issue. Based on the plaintiff's allegations, the court ordered all parties to preserve and “not erase, alter, modify, or destroy” any evidence, including e-mail and electronic documents. Hypro, LLC v. Reser, 2004 WL 2905321 (D. Minn. Dec. 10, 2004).


Court Upholds Repayment Of Fees Incurred
In Computer Forensic Investigation

After discovering missing stock shares, an employer suspected embezzlement and requested the defendant's laptop computer for examination. The employer specifically told the defendant not to delete anything from the hard drive. A computer forensic analysis revealed the defendant attempted to overwrite files on the computer by running an “evidence eliminator” software-wiping program at least five times the night before he turned over the computer. The defendant was convicted of embezzlement and ordered to pay restitution, including reimbursing the employer for $1,038,477 of the total $1,268,022 costs spent on the forensic analysis. On appeal, the defendant argued the trial court should not have awarded the employer investigation costs, including the costs of the forensic examination. The appellate court rejected this argument and affirmed the district court's award, noting the defendant “purposefully covered his tracks as he concealed his numerous acts of wrongdoing from Cisco over a period of years. As the victim, Cisco cannot be faulted for making a concerted effort to pick up his trail and identify all the assets he took amid everything he worked on.” United States v. Gordon, 2004 WL 3015422 (9th Cir. Dec. 30, 2004).



Michele C.S. Lange Charity Delich www.krollontrack.com e-Discovery Law & Strategy [email protected]
Read These Next
Why So Many Great Lawyers Stink at Business Development and What Law Firms Are Doing About It Image

Why is it that those who are best skilled at advocating for others are ill-equipped at advocating for their own skills and what to do about it?

Bankruptcy Sales: Finding a Diamond In the Rough Image

There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.

The DOJ's Corporate Enforcement Policy: One Year Later Image

The DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.

A Lawyer's System for Active Reading Image

Active reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.

Blockchain Domains: New Developments for Brand Owners Image

Blockchain domain names offer decentralized alternatives to traditional DNS-based domain names, promising enhanced security, privacy and censorship resistance. However, these benefits come with significant challenges, particularly for brand owners seeking to protect their trademarks in these new digital spaces.