Modern white-collar practices require attorneys who are fluent in computer forensics and electronic investigative techniques. Whether a matter involves complex internal investigations, money laundering, fraud, or computer hacking, knowing how to find and leverage digital evidence to build a case is essential. This often requires understanding how to collect and analyze digital breadcrumbs from Internet service providers (ISPs) and telecoms across the world, as well as pulling forensic artifacts from imaged computer media. Our attorneys have the skills and experience necessary to investigate and litigate a wide range of computer crimes and other matters where digital evidence will be decisive.       

Both as federal prosecutors and in private practice, our attorneys have investigated everything from sophisticated international hackers to brazen thefts by competitors and disgruntled employees. We routinely guide investigations that are based on digital evidence, and we have examined numerous computer forensic experts at trial. We understand how to collect and use evidence when targets use encryption and anonymizing software to hide their online activities.      

Our attorneys have:

  • Investigated criminal computer hacking matters involving Google, AOL, U.S. Department of Defense contractors, and others.
  • Advised on hundreds of search warrants, subpoenas, and 2703(d) Orders for computer media and electronic evidence held by ISPs. When necessary, we can litigate the scope and validity of these tools in court.
  • Presented evidence in jury trials related to the dark web, browsing history, search terms, files recovered from unallocated space after deletion, malware, virtual private networks (VPNs), and many more digital artifacts.
  • Used location information collected from mobile devices to connect individuals to criminal activity.
  • Used data from ISPs and social networking sites to prove state of mind in money laundering, insider trading, and fraud cases.
  • Advised clients on the application of the Computer Fraud and Abuse Act to commercial activities such as using scraping tools on social networking sites.
  • Advised on sophisticated computer investigative techniques, including stingrays, honeypots, beacons, and other defensive and “hack back” measures.

Whatever the context, our attorneys are ahead of the curve in understanding and defending matters where the salient evidence will be primarily digital.     

Contact Us

Matthew J. Gardner
202.719.4108 | mgardner@wiley.law

View all practice area professionals >

By using this site, you agree to our updated Privacy PolicyTerms & Conditions, and Cookies Policy.