Experiences
Computer forensics
Validation of digital evidence and technical counter-expertise

This matter involved a conflict in which it was key to determine, with forensic rigor, what had actually happened with a corporate device and whether there was sufficient technical evidence of access to sensitive information, possible data leakage, and/or deletion of information. The assignment required not only an analysis of the device but also a critical evaluation of the technical documentation already provided by the other party.
The complexity of the case stemmed from the fact that the debate was based on prior conclusions from third parties and interpretations of “unusual activity” (e.g., opening certain files, using synchronization services, and connecting external devices). Our job was to separate verifiable facts from inferences and to turn a confusing technical narrative into a solid, understandable, and defensible explanation in court.
From the beginning, martinsdelima structured the analysis with a dual objective:
(i) validate the digital evidence and its integrity and
(ii) perform a technical counter-expertise on the opposing reports, expressly highlighting the lack of digital evidence where it existed.
As a methodology, we applied a traceable and reproducible computer forensics approach: review of the copy/image of the disk (relevant emails and files) and verification that the evidence had not been altered since its collection and custody. In addition, the report includes the use of recognized forensic tools and cloning procedures aimed at preserving data integrity (tools such as EnCase, Autopsy, WinHex, and cloning workflows with forensic devices).
From there, the “extraordinary” work was in the counter-expertise: we identified methodological weaknesses and logical leaps in the reviewed reports (for example, not analyzing the security policy, not demonstrating the unauthorized use of confidential information, not demonstrating the deletion of corporate documentation, and, in general, not providing conclusive evidence of leakage). We also clarified technical aspects that are often confused in litigation: secure deletion vs. anti-forensic tools, explaining that the objective and the trail they leave are different (and that this is crucial to correctly assess what can—or cannot—be inferred).
The result was an expert piece focusing on the essentials: verifiable facts, understandable technical explanations, and prudent but firm conclusions, which allowed us to technically refute insufficiently substantiated claims and provide a clear evidentiary basis for the procedure. In other words, martinsdelima transformed a scenario of suspicions and crossed technical documents into a solid, defensible forensic account aligned with expert standards.