Skip to content
Firme-H2E
  • Our Services
    • Cyber Investigation and Computer Forensics
    • It expertise & legal support
    • IT Data Visualization
    • IT Disputes and Projects
    • E-Reputation
    • Prevention, Awareness & Training
  • About Us
    • Our Story
    • FAQ’s
  • Case Studies
    • 4.1 case studies
    • 4.2 case studies
    • 4.3 case studies
    • 4.4 case studies
    • 4.5 case studies
    • 4.6 case studies
  • Our Audience
    • Lawyer
    • Detectives
    • Damage Evaluators
  • Blogs
  • Contact
Get IT Forensic Support Now
Firme-H2E
  • Our Services
    • Cyber Investigation and Computer Forensics
    • It expertise & legal support
    • IT Data Visualization
    • IT Disputes and Projects
    • E-Reputation
    • Prevention, Awareness & Training
  • About Us
    • Our Story
    • FAQ’s
  • Case Studies
    • 4.1 case studies
    • 4.2 case studies
    • 4.3 case studies
    • 4.4 case studies
    • 4.5 case studies
    • 4.6 case studies
  • Our Audience
    • Lawyer
    • Detectives
    • Damage Evaluators
  • Blogs
  • Contact

Case Studies

Real Interventions, Concrete Results

Digital evidence has become a decisive factor in legal proceedings, private investigations, and insurance claims. At H2E Firm, we intervene daily in complex cases that require rigor, discretion, and technological expertise.

Each case study illustrates how our intervention helped clarify a situation, strengthen a case, or influence a judicial decision. Confidential information has been modified or anonymized to protect client identities.

Scroll to Explore

  • Criminal Law
  • Civil / Contract Law
  • Private Investigation / Defamation
  • Insurance Claims

Criminal Law

Deleted Messages on iPhone in a Threat Case

Summary:
At the request of the defense, we extracted deleted messages from a seized iOS phone. Our analysis revealed exchanges not mentioned in the original evidence, altering the timeline interpretation.

Tools

Cellebrite UFED, ELA, automated timeline

Result

Testified as expert witness; submitted a report that led to partial dismissal of charges

Video Authenticity Verification in an Assault Accusation

Summary:
Analyzed a video file submitted by the complainant. Detected subtle editing (non-linear audio cut and metadata inconsistencies).

Result

Video excluded as admissible evidence

Civil / Contract Law

Audit of a Disputed Software Development (IT vs Client)

Summary:
Dispute between an IT provider and their client over delivery of an incomplete application. Analyzed source code, commit logs, and project specifications.

Result

Our report showed a significant gap between deliverables and contractual requirements

Partner

IT damage evaluator, commercial lawyer

Forged Email in
an Insurance Claim

Summary:
A disputed email in a case between an insured party and an insurer. Technical analysis of the EML

File

Timestamp, SMTP headers, DKIM signature.

Result

Evidence of forgery (altered date and simulated server). Claim denied, lawsuit avoided

Private Investigation / Defamation

Reconstruction of Digital Activity Timeline

Summary:
At a detective’s request, analyzed the history of a personal computer (browser, USB use, recent documents).

Objective

Validate or invalidate allegations of access to sensitive documents

Result

Report used in a civil defamation lawsuit

Analysis of Anonymous Emails

Summary:
Attempted intimidation via anonymous emails. Based on metadata and writing style analysis, we identified a probable user.

Partner

Private investigator, human rights lawyer

Insurance Claims

Server Failure in a Manufacturing Company

Summary:
Technical investigation into the cause of central server failure. Assessed hardware/software origin, temperature logs, and updates.

Result

Report to the insurer showed foreseeable maintenance failure, allowing revised compensation

Data Theft Claim Verification

Summary:
Client claimed a cyberattack. Analysis of firewall logs, system events, network activity, and security settings.

Result

Full report concluded internal negligence, no evidence of external breach

Do you have a case?

Submit it securely using our platform.

No emails. No delays. Use our dedicated submission system to get expert help fast.

Submit Your Case

Your information is kept confidential and reviewed by certified experts.

Legal IT Expertise Firm | Greater Montreal Area


  • Facebook
  • LinkedIn
Quick Links
  • Home
  • Our Services
  • Our Audience
  • About Us
  • Case Studies
  • Our Story
  • Blogs
  • FAQ’s
  • Contact
Contact Us
  • Location
    970 Demers Street, Carignan, J3L 1E9
  • Business email
    expertise@firmeh2e.com
  • Toll-free
    1-888-796-8706
  • Local
    1-450-700-4233
Stay Informed. Stay Secure.

Subscribe to stay informed about industry updates and connect with our experts.

Note: We serve all over Quebec and Canada

© 2025 Firme H2E. All right reserved.

  • Privacy Policy
  • Terms & Condition