Home-Brewed Data Destruction

by | Dec 14, 2015 | Uncategorized

Law around the subject of electronically stored information (ESI) is ever-evolving. In a lawsuit, it’s treated just like paper documents. If you shred or burn the paper evidence, you’re in trouble – and if you’re caught deleting or wiping electronic evidence, you’re in the same boat.

But in some cases, it can be easier to get busted for destroying ESI, both because electrons have a way of proliferating as digital copies of files and pictures and documents, and because the process of destroying data usually leaves detectable digital traces.

Just yesterday, a fellow (I decline to call him a gentleman) called me up to ask if he could consult with me on an hourly basis about how to destroy data (evidence) on his computer for an upcoming potential divorce. I actually found myself offended and explained to him (trying to keep the disdain from my voice) that destroying evidence is the exact opposite of the service I offer.

We don’t wreck evidence – we find it.

I further suggested that he might want to look into the Federal Rules of Civil Procedure, Sections 26 & 34 and how they apply in his state. I told him that I am not an attorney (and so can’t advise him on law), but that if he went about destroying evidence, the judge in his case could sanction him in a way that could be devastating to his side of the lawsuit.

But I could be wrong. While there is generally a requirement under common law to preserve evidence, and while some judges will take unkindly to the destruction of any potentially relevant evidence, others have held to a deadline of 20 days after a complaint is filed, or not until the party is served with court papers. This guy hadn’t yet been served, although his interest in the destruction of data would lead a reasonable person to infer that there was something on that computer that would lead his wife to start the process!

In more than twenty years in the computer forensic business, we’ve found that people rarely manage to erase all traces of a file, or of their acts of destruction of files. When a file is deleted, it just remains sitting there for someone with the proper tools and skill set to uncover it. It’s not gone until it has been overwritten by something else. There are utilities designed to overwrite files in order to completely get rid of them, but often references to the file remain in an old directory, the Master File Table, or in shadow volume automated backups. The file-destroying software usually leaves tracks of itself having been used, and may even provide the forensic investigator a log of its activities.

Even if the file is completely overwritten and its attendant directory entries, etc “sanitized,” many files, such as MS-Word, make Autorecovery backup copies while the user is typing away. These are deleted when the user closes his document, but as we have seen, what’s deleted is not gone. Such remnants can be valuable evidence.

So these kinds of activities are detectable and the intended target of data destruction may survive the efforts. Then of course, there is the question of ethics. Even if, in some jurisdictions, the destruction of data before certain other documents are filed is not prosecuted, the idea of destroying evidence and/or lying about it is reprehensible and is certainly unethical.

To misquote a famous sportsware company, just don’t do it.

Subscribe to our free and informative weekly forensics newsletter!

 

Related Posts

Email spoofing, scamming, and hacking

Email spoofing, scamming, and hacking, Copyright 2024 by Steve Burgess Email domain spoofing scams With fortunes, privacy, and identity fraud at stake, we have had a number of cases involving phishing and spoofing in the past few years and into the present where...

AT&T Data Breach and Hack: What Does it Mean to Me?

AT&T Data Breach and Hack: What Does it Mean to Me? copyright 2024, Steven Burgess It was ginormous. It included almost all wireless customers from 2022. Did you have an AT&T phone or other account in 2022? You’re one of 110 million (gasp). You be hacked, my...

Somebody deleted stuff off my phone (I swear it wasn’t me!). Can I get it back?

- Copyright Steve Burgess 2024 Your phone is suddenly losing text, videos, photos. What’s happening? Are they gone forever? Have I been hacked? How do I avoid this in the future? What’s happening? Of course, it’s hard to tell without some history of the phone’s use,...

CSI Cases from Burgess Forensics #69 A Case of Hiphop Beef

The Stories are true; the names and places have been changed to protect the potentially guilty. It was almost closing time on Friday and my thoughts were turning to Barbequeing some of that mouth-watering Santa Maria tri-tip while my nose was turned to the scent of...

Email as a signed contract vs. fraudulent emails

Email as a signed contract vs. fraudulent emails We all send and receive email, but did you know that what you say in an email can be interpreted as a legal contract? And that sometimes, emails are fraudulent? Both are true. The Statute of Frauds Although email didn’t...

El Salvador Adopts BitCoin

El Salvador Adopts BitCoin copyright Steve Burgess, 2021 El Salvador just passed a law to make BitCoin (BTC) legal tender and is the first country to do so. It did something similar back in 2001, when it made the US Dollar the official currency, replacing the...

Keeping Your Bitcoin Safe

BitCoin. Everybody wants some. But what’s the best way to keep it safe once you’ve got it? And how to get it? First things first – you get BitCoin (and Etherium, and DogeCoin) from a cryptocurrency exchange, like you would from a “regular” currency exchange to turn...

Cyberbullying and Covid-19: 2021 Update

California defines a cyberbully as anyone who sends any online communication to deliberately frighten, embarrass, harass, or otherwise target another. The Cyberbullying Research Center defines it as “willful and repeated harm inflicted through the use of computers,...

Cybersecurity & Covid-19: Vulnerability and What to Do About It

Cybersecurity & Covid-19: Vulnerability and What to Do About It Steve Burgess, 2020 As if we didn’t have enough to worry about. With so many of us working from home (close to 90% of American corporations are encouraging or requiring employees to do so) and having...

Indian Summer Lovin’ – Tech Tips For a Warm Autumn

by Natalie Miller, 2019 With Indian Summer temperatures rising, here are some tips to help you make sure your devices are ready to conquer these warm days of Fall like you are. Check Those Pockets! Taking a dip in the pool, going for a paddle in a kayak, and jumping...

Pin It on Pinterest

Share This