Tacoronte v. Lesinski

Tacoronte v. Lesinski, a computer forensics case Please note that DisputeSoft responds only to inquiries from litigation attorneys with regard to the field of computer forensics.

DisputeSoft served as a digital forensic expert in the matter of Tacoronte v. Lesinski, a civil case in which the plaintiff alleged her father, the defendant, had sexually abused her for years. DisputeSoft’s Hunter Jones testified at trial as both an expert witness and rebuttal witness on behalf of the plaintiff.

As a part of a prior criminal proceeding, the plaintiff provided a written statement of events and attended court-mandated therapy sessions. Though the criminal case was dropped, this written summary was introduced as evidence in the civil proceeding. The defendant argued that the plaintiff and her mother fabricated this summary by researching online how a victim of sexual abuse would act in therapy and that the plaintiff’s mother had in fact written the statement of events. The defendant’s forensic expert examined the computer owned by the plaintiff’s mother, proffering evidence that it had been used to research TV shows and articles related to dealing with in-family abuse and concluded that the mother had written the summary herself.

DisputeSoft computer forensics expert G. Hunter Jones, an EnCase Certified Examiner (EnCE), conducted an independent examination of the computer in question and found that the defendant’s computer forensics expert had identified only a small fraction of the computer’s total Internet history. A full report of the Internet history filled 1,604 pages and revealed that other members of the plaintiff’s family regularly used the computer for a variety of day-to-day tasks. At trial, Mr. Jones testified that, in light of these findings, there was no verifiable basis for concluding that the plaintiff’s mother must have written the summary in question.

The case was decided in favor of the plaintiff, and the jury awarded her $6.85 million in damages.

For a description of the services we provide as computer forensics experts, please click here.

Read related article.