Modern white-collar practices require attorneys who are fluent in computer forensics and electronic investigative techniques. Whether a matter involves complex internal investigations, money laundering, fraud, or computer hacking, knowing how to find and leverage digital evidence to build a case is essential. This often requires understanding how to collect and analyze digital breadcrumbs from Internet service providers (ISPs) and telecoms across the world, as well as pulling forensic artifacts from imaged computer media. Our attorneys have the skills and experience necessary to investigate and litigate a wide range of computer crimes and other matters where digital evidence will be decisive.
Both as federal prosecutors and in private practice, our attorneys have investigated everything from sophisticated international hackers to brazen thefts by competitors and disgruntled employees. We routinely guide investigations that are based on digital evidence, and we have examined numerous computer forensic experts at trial. We understand how to collect and use evidence when targets use encryption and anonymizing software to hide their online activities.
Our attorneys have:
- Investigated criminal computer hacking matters involving Google, AOL, U.S. Department of Defense contractors, and others.
- Advised on hundreds of search warrants, subpoenas, and 2703(d) Orders for computer media and electronic evidence held by ISPs. When necessary, we can litigate the scope and validity of these tools in court.
- Presented evidence in jury trials related to the dark web, browsing history, search terms, files recovered from unallocated space after deletion, malware, virtual private networks (VPNs), and many more digital artifacts.
- Used location information collected from mobile devices to connect individuals to criminal activity.
- Used data from ISPs and social networking sites to prove state of mind in money laundering, insider trading, and fraud cases.
- Advised clients on the application of the Computer Fraud and Abuse Act to commercial activities such as using scraping tools on social networking sites.
- Advised on sophisticated computer investigative techniques, including stingrays, honeypots, beacons, and other defensive and “hack back” measures.
Whatever the context, our attorneys are ahead of the curve in understanding and defending matters where the salient evidence will be primarily digital.
- Artificial Intelligence (AI)
- Blockchain and Digital Assets
- Connected & Autonomous Vehicles
- Cyber Insurance
- Digital Health
- GDPR and Global Privacy
- Privacy Investigations and Enforcement
- The California Consumer Privacy Act (CCPA) and the California Consumer Privacy Rights and Enforcement Act (CPRA)
- Transactional Support and Due Diligence on Privacy and Cybersecurity
Related News & Insights
- Blog PostCyber Proposals Should Reject Impractical Obligations and Victim ShamingWiley ConnectJune 22, 2021Megan L. Brown, Matthew J. Gardner
- NewsletterSupreme Court Limits Application of Computer Fraud and Abuse Act, Impacting Use of Online InformationPrivacy In FocusJune 2021Matthew J. Gardner, David E. Weslow, Megan L. Brown
- EventRansomware: Risk Transfer, Compliance, and Stakeholder Management ChallengesPrivacy + Security Forum 2021 Spring AcademyMay 25, 2021Edward R. Brown
- AlertBiden’s Cyber EO Aims to Improve Federal Security and Move Private SectorMay 13, 2021Megan L. Brown, Matthew J. Gardner, Duane C. Pozza, Jon W. Burd, Tracye Winfrey Howard, Kara M. Sacilotto, Hon. Nazak Nikakhtar, Kathleen E. Scott, Michael L. Diakiwski, Gary S. Ward, Tawanna D. Lee