Illegal Document Sharing - Firme-H2E
Skip to content
Firme-H2E
  • Our Services
    • Cyber Investigation and Computer Forensics
    • IT Expertise & Legal Support
    • IT Data Visualization
    • IT Disputes and Projects
    • E-Reputation
    • Prevention & Training
    • ──────────────────
    • ──────────────────
    • ──────────────────
    • Legal Aid
    • Anton Piller Orders
  • About Us
    • Our Story
    • FAQ
  • Case Studies
    • Case: Deleted iPhone Messages
    • Case: Software Contract Dispute
    • Case: Screenshot Falsification
    • Case: Server Damage Insurance
    • Case: Cryptocurrency Fraud
    • Case: Police Report Counter-Expertise
  • Our Audience
    • Lawyers
    • Investigators
    • Insurance Adjusters
  • Blog
  • Estimate
  • Contact
  • FR
Get IT Forensic Support Now
Firme-H2E
  • Our Services
    • Cyber Investigation and Computer Forensics
    • IT Expertise & Legal Support
    • IT Data Visualization
    • IT Disputes and Projects
    • E-Reputation
    • Prevention & Training
    • ──────────────────
    • ──────────────────
    • ──────────────────
    • Legal Aid
    • Anton Piller Orders
  • About Us
    • Our Story
    • FAQ
  • Case Studies
    • Case: Deleted iPhone Messages
    • Case: Software Contract Dispute
    • Case: Screenshot Falsification
    • Case: Server Damage Insurance
    • Case: Cryptocurrency Fraud
    • Case: Police Report Counter-Expertise
  • Our Audience
    • Lawyers
    • Investigators
    • Insurance Adjusters
  • Blog
  • Estimate
  • Contact
  • FR

Theft and Distribution of Intimate Photos and Professional Emails

Scroll to explore

Case type: Criminal and civil

Client: Law firm specializing in family and criminal law


Parties involved: Victim v. Ex-spouse


Mandate given to Firme H2E:

Document data theft and trace the distribution of private documents


Duration: 20 business days

Context

During an acrimonious divorce, a businesswoman from the Laval area discovered that her ex-spouse had accessed her personal computer and cloud storage account without authorization.

He had downloaded intimate photos, confidential professional emails, and personal financial documents. Some photos had been anonymously shared with colleagues and family members.

Confidential emails regarding a business transaction had also been transmitted to a competitor, causing considerable emotional distress and professional repercussions.

The victim’s lawyer retained Firme H2E to document the extent of the data theft, authenticate the origin of the leaks, and produce a report usable in both criminal and civil proceedings.

Firme H2E Intervention

Step 1

Unauthorized Access Analysis

  • Extracted login logs from cloud storage account (Google Drive)
  • Identified login sessions from devices not recognized by the victim
  • Correlated IP addresses with the ex-spouse (Internet provider, geolocation)
  • Analyzed personal computer: traces of unauthorized physical access, spyware detected
Step 2

Distribution Tracing

  • Forensic analysis of anonymous emails received by colleagues (SMTP headers, origin)
  • Examined EXIF metadata of distributed photos: match with original files
  • Identified temporary accounts used for sending (disposable addresses)
  • Reconstructed distribution chain: download → local storage → anonymous sending
Step 3

Comprehensive Expert Report

  • Detailed documentation of each unauthorized access with timestamp
  • Proof of correspondence between stolen files and distributed files (SHA-256 hashes)
  • Visual event timeline
  • Report drafted for dual use: criminal proceedings (ss. 162.1 and 342.1 C.C.) and civil proceedings
Result

Firme H2E’s report enabled the filing of a criminal complaint for voyeurism and non-consensual distribution of intimate images, as well as unauthorized access to a computer system.

The ex-spouse was charged, and the case is awaiting trial. In parallel, the report was used in divorce proceedings to demonstrate abusive behavior.

An injunction was issued prohibiting any further distribution of stolen material.

Key Takeaways
  • Non-consensual sharing of intimate images has been a crime in Canada since 2015 (s. 162.1 C.C.)
  • Metadata and digital fingerprints can link distributed files to their original source
  • A rigorous forensic report can simultaneously serve criminal and civil proceedings
Tools Used
  • Magnet AXIOM (computer and cloud account analysis)
  • SMTP header analysis (email tracing)
  • ExifTool (photo metadata)
  • SHA-256 for file matching
  • Google Workspace log analysis
  • Integrated timeline (Firme H2E)

Have a case?

Submit it securely through our platform.

No emails. No delays. Use our dedicated submission system to get expert help fast.

Submit Your Case

Your information stays confidential and is reviewed by certified experts.

Firme H2E

Legal IT Expertise Firm | Greater Montreal Area


  • Facebook
  • LinkedIn
Quick Links
  • Home
  • Our Services
  • Our Audience
  • About Us
  • Case Studies
  • Our Story
  • Blogs
  • Legal Aid
  • Anton Piller
  • FAQ’s
  • Contact
Contact Us
  • Location
    970 Demers Street, Carignan, J3L 1E9
  • Business email
    expertise@firmeh2e.com
  • Toll-free
    1-888-796-8706
  • Local
    1-450-700-4233
Stay Informed. Stay Secure.

Subscribe to stay informed about industry updates and connect with our experts.

Note: We serve all over Quebec and Canada

© 2025 Firme H2E. All rights reserved.

  • Privacy Policy
  • Terms & Conditions
Manage consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}