Client: International Insurance Company
Case Type: Tortious Interference and Defamation
Case Scenario: The client was notified by several of their co-insurers that they were receiving emails slandering the client and making claims that they were not operating legitimately. The information had recently cost the insurance company a very large contract worth over a million dollars.
CIS Investigators were able to obtain the original emails and attachments and through email tracing and forensic techniques were able to identify the sender of the email, which turned out to be someone with whom they were in current litigation. The suspect was trying to get off his civil case by making the client look bad, and by damaging their reputation globally.
Client: National Retailer Of Specialty Clothing
Case Type: Tortious Interference and Defamation
Case Scenario: Case Scenario: The client was being attacked by someone who appeared to be a competitor is their industry. The antagonist had set up a very well established blog bashing many of the online retailers in this space. Because the blog had substantial traffic and content, its material was ranking highly on the Google and other key search engines when people searched for the Client’s brand name. Substantial drops in revenue were underway, and because of the weakened cash flow the client was hoping to not have to litigate to get resolution of this issue.
After doing an initial investigation, CIS Investigators determined two high probability suspects. From there, our team was able to begin a sting operation with the hidden antagonist from which their city, state, and other significant information were obtained. At this stage, we were one subpoena away from identifying the antagonist if this went to litigation.
Fortunately, cases can also be resolved at this stage. CIS investigators then re-contacted the “hidden” individual to let them know that the client was in the process of retaining an attorney to ID them and resolve the issue. However, the client was open to stopping if the person removed the damaging material. Like many of these cases, the person rapidly took the material down and is now leaving this retailer alone.
Client: Key Executive Major Retailer
Case Type: Stalking and Extortion
Case Scenario: Client was a key executive for a major retailer who had been contacted by an unknown person that stated he had nude pictures of her that he said he had obtained from her ex-husband. The suspect then proceeded to provide proof of having possession of those pictures. The suspect then began calling the client and her husband at work and on their cell phones threatening them with exposing the pictures. The suspect then escalated the threats to demanding that the client have sex with the suspect while her husband watched, at a downtown high rise hotel and they had to bring $10,000 dollars.
The clients contacted CIS to determine who the individual was. Within a day and a half CIS Investigators were able to locate the anonymous suspect, capture his location and IP address and set up a sting operation with the local sheriff’s office. The suspect showed up at the hotel and the sheriff’s office arrested the individual for stalking and extortion.
Client:International Auction Website
Case Type: Hacking
Case Scenario:An international auction website came under attack from an unknown source that was stopping their daily auctions from being able to complete transactions costing them thousands of dollars per day. CIS responded and performed intrusion forensics, live memory forensics and network and log analysis and determined that the client was breached by two ex-employees, who had set up a competing business. We were able to preserve the evidence and then utilized our contacts to turn over the case to the FBI.
Client:Child Predator Arrest
Case Scenario:A successful business executive had been in communications with a girl online who had claimed that she was of age. The client, believing that the girl was of age, arranged a time for them to meet at her house. Unknown to the client, he was being investigated by the FBI related to attempting to solicit an underage minor. CIS was able to prove forensically from the client’s computer that the communications with the girl never disclosed at any time that she was underage, in fact quite the opposite. Upon further investigation CIS was able to determine who the FBI informant was and was able to discredit the witness that the FBI was using. We then advised the clients attorney to subpoena the informant’s computer. Upon doing so the FBI dropped the case.
Client:Defense Of Client Accused of Defamation
Case Type: Defense Investigation
Case Scenario:We were asked to investigate a case for a large insurer that had liability coverage for their client who had been accused of defaming a previous employer. We were able to obtain a forensic image of the client’s computer, as well as all of the IP addresses subpoenaed by the plaintiff’s lawyer, as well as the investigation notes of the private detective who investigated the case. Upon review of all of the evidence from a forensic examination of the computer and of the investigator, we were able to determine that the forensic evidence from the client’s computer and the evidence obtained by the investigator did not match, and were able to gain a decision on the clients behalf that there was not any evidence to prove that client had committed the act of defamation against their employer.