Judges are getting more sophisticated in handling attempts to destroy electronic evidence If you want to tick off a judge, destroy evidence. Lawyers say this tactic comes up more often than ever because so much evidence is now electronic, and people think they can delete it or plead ignorance over how technology works as a defense once the evidence is destroyed.Be warned: Judges aren’t buying it. In a ruling on Easton v. Warrior Lacrosse, Judge Donald A. Scheer wrote, “Destruction of evidence is prejudicial to an opposing party, and undermines the litigation process.” In other words, Not in my house. A few other recent cases:Anderson v. Crossroads Capital Partners, LLC In this sexual harassment case, after a “protracted discovery battle” the plaintiff was compelled to give the defendant her computer without deleting anything. Specifically the defense was looking for an October 2001 document. But forensics discovered 1) data-wiping software called CyberScrub had been installed (see The Rise of Anti-Forensics for more about these types of tools) and 2) the hard drive had been manufactured in August 2002—indicating that the original drive with relevant documents on it had been swapped out. The plaintiff claimed she didn’t destroy evidence with the wiping software, she used the software only to protect files. As for the new hard drive, she told the judge that in her view it was the same computer throughout the litigation despite the swap. The plaintiff’s “exceedingly tedious and disingenuous claim of naïveté regarding her failure to produce the requested discovery…defies the bounds of reason,” the judge noted. An adverse inference instruction was given to the jury, because the plaintiff “destroyed evidence and attempted to suppress the truth.”Kucala Enterprises Ltd. v. Auto Wax Co. In this complex patent infringement case, the plaintiff, Kucala, was found to have installed a program called Evidence Eliminator on two of his computers and run it on one of them the night before discovery was scheduled to take place. The forensics investigator discovered that 12,212 files had been deleted and overwritten that night and an additional 2,968 had been eliminated three days earlier. Kucala’s attorney argued that there was no proof he deleted anything but personal files. The court wrote: “Any reasonable person can deduce, if not from the name of the product itself, then by reading the website, that Evidence Eliminator is a product used to circumvent discovery.” The judge ruled the “specious” deletion of files “gross negligence.” In summary: “Kucala has engaged in egregious conduct by his flagrant disregard of a court order requiring him to allow inspection of his computer and his utter lack of respect for the litigation process.” The judge recommended dismissal and payment of court costs. However, the district judge allowed the case to continue but upheld the payment of court costs related to discovery, which were $93,125.74. –S.B. Related content news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO CSO and CISO CSO and CISO news Royal family’s website suffers Russia-linked cyberattack Pro-Russian hacker group KillNet took responsibility for the attack days after King Charles condemned the invasion of Ukraine. By Michael Hill Oct 02, 2023 2 mins DDoS Cyberattacks feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Security news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe