Personal tools
Interhack What We Do Forensic Computing

Interhack Forensic Computing and Litigation Support

Interhack Forensic Computing serves the legal system by finding facts through collection and analysis of electronic information.

Established in 2000, our Forensic Computing practice helps in-house counsel, incident response teams, law enforcement agencies, and law firms establish facts that can be used in litigation or criminal prosecution. We maintain a case portfolio balancing between bringing actions against other parties and defending against actions brought by others. Our clients consider this a critical advantage, since we can advise them what opposing counsel is most likely hearing from its technical experts.

Our work has been at the cutting edge of the intersection of law and technology, being cited in the leading case law on how Federal wiretap statutes apply to Web technology (U.S. Court of Appeals for the First Circuit, In re Pharmatrak Privacy Litigation), as well as legal academic circles including The Stanford Law Review and university law courses throughout the United States.

Some applications of our work have included:

  • Disassembling and discussing complex Web applications to establish not only what they were designed to do but what they could technically do, and what would happen under various circumstances.
  • Determining the author of harassing and threatening messages written with a computer, whether delivered by email or printed and physically delivered.
  • Uncovering internal fraud, where employees redirected company funds to themselves.
  • Recovering encrypted data relevant to legal proceedings.
  • Examining equipment used by suspects to find electronic evidence linking them to physical crimes.
  • Studying electronic evidence to show defense counsel how the data can undermine prosecutors' assertions.
  • Helping in-house counsel to comply with discovery requests without enabling plaintiffs attorneys to go on fishing expeditions in the corporate records.
  • Assessing a possible intrusion for risk of exposure or corruption of confidential information, extent of compromise, and corrective course of action.

Whether you've got a legal proceeding underway or are looking for the most prudent course to pursue where there is risk of litigation cropping up in the future, we'll be happy to discuss how our practice can support your objectives. You can examine some of our service descriptions for yourself or contact us to arrange to discuss the needs of your case and how we can help you to address them.

Document Actions