Computer Forensics - When a “Deleted” File Wins the Case
- Ari Morse

- 7 days ago
- 6 min read

Every investigator and trial lawyer has lived some version of this story: the facts look promising, the client is convinced the other side is lying, and you are sure the proof is on the computer somewhere.
In the past, that kind of statement could kill a case. Today, properly executed computer forensics can turn it into the moment you win.
Digital evidence from computers and servers has become decisive in civil litigation, from intellectual property theft to employment disputes and contract cases. What investigators and attorneys often underestimate is not the power of that evidence, but how early they need to bring in forensic support and how precisely they need to ask for it.
This post walks through a fictionalized but realistic scenario based on patterns reported in real cases, along with checklists and criteria you can use on your next file. We also explain how Locaters International integrates with digital forensic partners to help you get from suspicion to admissible proof.
The Scenario: “We Never Took Anything”
A mid sized financial services firm hires an outside investigator after a top employee leaves to join a competitor. Within weeks, long time clients are moving their accounts. Marketing language on the competitor’s website looks suspiciously familiar. Internal emails suggest that someone might have exported client lists shortly before resigning.
When counsel sends a preservation letter, the former employee insists that he never took any confidential data. His new employer claims their sales lists were built independently over many years. They provide a few PDF files and spreadsheets but say older versions were deleted as part of standard clean up.
Instead of letting the case stall, the attorney brings in a computer forensics examiner. Working with the investigator, they target:
The employee’s old work laptop
An external hard drive briefly used during the departure
A cloud storage account tied to the employee’s personal email
Real world cases show that when examiners are allowed to image devices and analyze them properly, they frequently uncover deleted files, metadata, or evidence of disk scrubbing that directly contradicts sworn statements.
What Computer Forensics Actually Does
Computer forensics is not just looking through someone’s files. It is a methodology for preserving, examining, and explaining digital artifacts so they hold up in court.
Key capabilities include:
Forensic imaging, creating a bit for bit copy of a drive or device so the original remains untouched and the copy can be analyzed repeatedly without altering evidence
Recovery of deleted and wiped data, examining unallocated space, file system artifacts, and shadow copies to restore files users thought were gone
Timeline reconstruction, aggregating system logs, file timestamps, browser history, and application traces to show who did what and when
Metadata analysis, reading embedded information such as author, creation date, modification history, and device identifiers from documents, images, and emails
Detection of spoliation tools, identifying disk cleaning utilities or unusual deletion patterns that suggest intentional destruction of evidence
For investigators and lawyers, the payoff is not just finding a missing file. It is being able to:
Prove that a document existed at a specific time
Show that it was accessed, copied, or emailed to a competitor
Demonstrate that deletion occurred after a duty to preserve arose, supporting sanctions or adverse inference instructions
Computer forensics converts technical artifacts into narrative: intent, opportunity, and impact.
How the Case Turned
In our scenario, the forensic image of the former employee’s laptop reveals:
Multiple versions of a client list spreadsheet saved under different names
USB activity logs showing that an external drive was attached the night before his resignation
Evidence that disk scrubbing software was installed and run just after the court ordered the laptop preserved, mirroring real world spoliation patterns in intellectual property and civil cases
On the external drive, examiners recover:
A ZIP archive containing the client list and a confidential pricing model
Recently deleted copies of the same files, with metadata tying them back to the original company systems
In many actual disputes, similar findings have led courts to impose serious discovery sanctions when parties lied about deleting or scrubbing data.
Armed with this, the plaintiff’s attorney now has clear evidence the data existed and was removed, a documented pattern of deletion after litigation became foreseeable, and a strong argument for sanctions and a favorable settlement. At mediation, the defense realizes that if the matter reaches trial, the forensic story will be devastating, and they agree to a significant settlement and a consent injunction limiting future use of the competitive data.
Where Investigators Add Value
Too often, lawyers think of digital forensics as something you send the information technology people to do. In reality, investigators are indispensable in shaping the questions and context that make forensic work efficient and targeted.
A field savvy investigator can:
Map the timeline of employment, resignation, and competing activity
Identify which devices, cloud accounts, and collaboration tools are actually in play
Interview witnesses about behavior around the time of departure, including late night downloading, use of external drives, or unusual printing
Help counsel draft preservation letters that specify devices, accounts, and categories of data
Without this groundwork, examiners may be left to explore thousands of gigabytes blindly, and critical artifacts may never be preserved.
Locaters International is often engaged at this stage, to run the factual human side investigation, coordinate with counsel, and then work alongside forensic partners so that the technical work lines up with litigation strategy.
Checklist: When to Bring in Computer Forensics
If you are an investigator or attorney, consider digital forensics early when you see any of the following:
A key employee departs for a direct competitor
Allegations of intellectual property theft, trade secret misuse, or client list migration
Claims that relevant files were deleted long ago or lost in routine clean up
Sudden gaps in email history, messaging logs, or shared drives
Suspicion that someone has altered documents or backdated files
Evidence that cleanup or optimization tools were run after a preservation notice
Existence of backup tapes, archives, or legacy systems that may contain older snapshots of crucial data
If you can check even one or two of these boxes, digital forensics is likely to be helpful, and the sooner you preserve devices and accounts, the more you can recover.
Criteria for Scoping the Forensic Work
Different disputes require different levels of forensic effort.
Consider:
Case value and risk, high value cases often justify full forensic imaging and detailed reporting, while lower value disputes may call for targeted collections and keyword searches
Number and type of devices, for example one laptop and a cloud account versus many servers and endpoints, which require prioritization
Legal posture, whether you are pre suit, in early discovery, or approaching trial, which affects proportionality and protective orders
Need for expert testimony, if trial is likely you will need a testifying expert who can clearly explain methods and findings
Privacy and privilege concerns, especially on corporate devices that hold other employees’ data or regulated information
Locaters International helps attorneys and corporate clients think through these variables before a single drive is imaged, saving money and avoiding unnecessary discovery fights.
Practical Steps You Can Take Now
If you are looking at a matter and wondering whether to escalate from basic information technology review to full computer forensics, use this framework:
Lock down what you can
Advise the client to stop reassigning or reformatting devices used by key players
Suspend auto deletion policies on email and collaboration platforms where possible
Document the environment
List devices, operating systems, cloud services, and messaging apps used in the relevant period
Note who had access and what retention policies were in place
Capture the narrative
Interview your client and key witnesses about what they believe happened and when
Record dates connected to resignations, complaints, or legal threats
Consult with a forensic aware investigator
Engage a firm such as Locaters International that understands both investigations and litigation
Decide which devices and accounts should be preserved first and what questions you need answered
Bring in a qualified forensic examiner
Ensure they use industry standard tools and maintain a clear chain of custody
Ask for a written scope describing what they will search for and how
Translate findings into litigation value
Work with counsel to connect artifacts such as deleted files and timelines to legal elements like breach, causation, damages, and intent
Use early forensic findings to shape discovery requests, deposition outlines, and mediation strategy
Handled this way, computer forensics becomes a force multiplier for your existing investigative work, not a black box that you simply hand drives to and hope for the best.
How Locaters International Can Help
Locaters International is not just a lab that takes images. We are investigators who work alongside attorneys and digital forensic specialists to:
Identify which devices and accounts matter most in the fact pattern
Coordinate lawful preservation and collection across jurisdictions
Correlate digital findings with witness interviews, financial records, and public data
Help attorneys translate forensic facts into pleadings, affidavits, and testimony that withstand scrutiny
Whether your case involves a departing employee, a contract dispute, or an internal investigation, we focus on gathering usable, defensible evidence, not just raw data.
If you are an investigator, attorney, or in house counsel facing a matter that you believe has to be on the computer somewhere, contact Locaters International to discuss your case, learn what can realistically be recovered, and plan the first steps before critical data is lost forever.




Comments