Read the legal note first
Accessing a spouse's accounts without permission can violate the federal Stored Communications Act and analogous state laws — even if you live together and even if you are still married. Evidence collected through unauthorized access can be excluded at trial, and you can be sued or charged criminally. This article describes what we look at when retained, how to recognize signs in your own observable behavior, and what to preserve from your own devices and accounts. Talk to a divorce attorney before doing anything else.
Forensic signs that warrant investigation
- Phone behavior changes. Phone always face-down. Notifications turned off in your presence. New password or biometric replacing one you previously knew.
- App layout shifts. Hidden folders, dating apps disguised as utilities (Calculator+, Vault, KeepSafe), or "second space" / "private space" features on Samsung/OnePlus.
- Two-phone behavior. A second phone, work-only phone, or pre-paid burner you have not seen before.
- Browser history that does not match the laptop. Phone history scrubbed regularly while the laptop has months of history.
- Financial pattern shifts. Cash withdrawals you cannot account for, Venmo to unknown handles, hotel charges during business trips, gift card purchases.
- Calendar and travel changes. Increased "work travel" with vague venues, conferences that do not appear in any public registry, lost business expense receipts.
- Social-media disengagement. Suddenly unfollowed, hidden, or muted on their public accounts. Stories suddenly closed to "Close Friends" only.
- Apple Family / Google Family changes. They removed themselves from shared family location, shared photos, or shared payment methods.
What you can preserve from your own observation
Things you legally can document without invading their accounts:
- Photos of charges on shared accounts you have legitimate access to
- Screenshots of public social-media activity
- Your own observations, dated, in a contemporaneous journal
- Photos of physical items found in shared spaces (receipts, gifts, items not belonging to either of you)
- Your own iCloud Family or Google Family location history of the shared family devices, if you've always had access
- Phone bills (if joint) showing call/text patterns
What NOT to do
- Do not install monitoring software. Even on a "shared" device, this violates wiretapping laws in most US states and the federal Wiretap Act if it captures live communications.
- Do not log into their accounts. Even if you know the password.Authorization, not knowledge of the password, is the legal test.
- Do not factory-reset or "clean up" devices. If a divorce filing comes, opposing counsel will run forensic analysis. Anti-forensic activity creates a strongerspoliation case against you than the affair would have created against them.
- Do not confront them with the digital evidence. Once they know what you know, they will wipe it. Talk to your attorney first.
What a forensic engagement actually does
Once you have an attorney engaged, the path forward is usually a combination of:
- Forensic phone extraction of devices you have legal authority over (community-property in many states; varies by jurisdiction)
- Subpoena-driven discovery — your attorney serves preservation letters and subpoenas to platforms (Apple, Google, dating apps, banks). Spoliation between preservation letter and production becomes a sanctions case.
- OSINT and asset tracing — public-record research on the third party, shared Venmo/Zelle data, hotel and airline rewards programs.
- Expert testimony — at trial, a court-qualified forensic examiner authenticates the evidence under FRE 901/902.
Cases we run
Digital forensics for divorce and family law — engaged through your attorney under attorney-work-product privilege. We do not work directly for spouses without counsel; the legal exposure is too high.















