Representative Engagements

Every engagement is an opportunity to learn or improve skills, build repeat client relationships or invest in referral sources, and refine our predictions for future forensic challenges. But not all cases are sexy enough to be featured on a website.

Here is some background on some of our most interesting engagements. We hope our experience gives you a sense of our competence.

Respectfully, The Lawgical Team
  1. Assisted in the day-to-day management of multi-state debt collection efforts as against hostile ownership — including supporting efforts related to asset and diverted funds recovery.
  2. Preserved and identified shared drives, mailboxes, websites, hardware and connected accounts to 22 different domains; 1,000+ custodians; totaling over 30TB.
  3. Intrusion response including IP tracing of suspected Mafia-connected digital operatives in furtherance of receiver’s efforts to attain control of business’s digital and financial assets — including accounts receivables, client lists, & financial account details — and efforts to root out employees with external allegiances.
  4. Lesson learned: double-check exchange and google suite rules for backdoors that former employees may leave behind to continue hands-off extraction of data from network infrastructure.
  1. Organized and managed multi-year evidence dump from state attorney’s office — evidence from multiple trials and related investigations including CDRs, subscriber records, video and audio surveillance, mobile device images, desktop images, and enterprise shared storage images — to identify missing custodians and missing forensic device collections.
  1. Lesson learned: the need for early involvement of forensic and eDiscovery specialist in Discovery process to ensure (1) discovery requests cover: appropriate search terms and attendant variations, appropriate file types and custodians, and appropriate date ranges; and (2) discovery responses from opposing parties are complete in light of discovery request.
  2. Developed visual closing argument presentation used at trial, including effective and emotional presentation of millions of dollars in special damages.
  1. Developed strategy to allow local counsel to review closely-held client data on private servers housed internationally without allowing data to flow to a domestic server.
  1. Developed strategy to allow for remote collections of closely-held client data on internationally-located devices without bringing devices into the domestic jurisdiction.
  2. Managed and supported evidence review efforts of multiple legal teams in several jurisdictions as part of joint defense efforts.
  1. Expert testimony used to convince judge to force law enforcement to turn over alleged victim’s mobile device for direct review.
  2. Expert testimony used to support judicial finding of a Brady rule violation regarding digital evidence withheld from defendant.
  3. Expert testimony used to support a judicial finding that certain digital evidence had been materially altered prior to receipt by law enforcement.
  1. Organized and managed evidence dump from state attorney’s office to identify missing custodians and missing forensic device collections.
  1. In first week of engagement, managed forensically-defensible collection of 50+ custodian accounts across multiple enterprise cloud storage solutions, physical devices, and network assets.
  2. Developed automated workflows to respond to continuing reporting and discovery requirements from regulatory agency, eliminating the need for manual oversight from client.
  3. Developed forensically defensible workflow to reduce reviewable data footprint by ~85% prior to ingestion and hosting in eDiscovery review platform.
  4. Developed workflow to distribute access to reviewable data among multiple law firms working on related but distinct regulatory concerns and regarding related but distinct corporate entities.
  1. Expert testimony led to defaming defendant admitting ownership of defamatory digital assets.
  1. Led analysis of breached data and provided expert opinion to multiple stake holders and Cybersecurity Insurer regarding scope of breach.
  2. Led security efforts to modernize breached entities digital infrastructure, and provided expert opinion to multiple stake holders, which was relied upon to resume business operations.
Successes & lessons