What spoliation actually requires
Spoliation is the destruction or material alteration of evidence (or the failure to preserve it) when there is a duty to preserve. In family law, that duty kicks in whenlitigation is reasonably anticipated — not when the petition is filed. Most jurisdictions require the moving party to show three elements:
- The other party had control of the evidence
- The evidence was relevant to the claim
- The party had a duty to preserve at the time of destruction
Sanctions range from adverse-inference jury instructions, to monetary sanctions, tostriking pleadings, to default judgment. The strength of your forensic showing usually determines which end of that range you get.
Forensic indicators of phone wiping
- Recent factory reset. iOS records the most recent erase event in system logs. Android leaves indicators in the recovery partition and Google account activity. A reset that occurred shortly after the preservation letter is a strong inference.
- iOS "Erase All Content and Settings" timestamp — pulled from device system logs and iCloud account activity logs.
- Application reinstall pattern. When an app appears in App Store or Play Store install history but its data is empty, that is uninstall-then-reinstall — a common evidence-destruction tactic.
- Anti-forensic tool installation. "Secure Eraser," "iShredder," "File Shredder" apps. Forensically detectable from iCloud backups even after removal.
- Selective deletion. SMS database missing message rows in a specific date range while preserving rows immediately before and after — the SQLite gap is forensically identifiable.
iCloud / Google account activity that is hard to wipe
Even when the device itself has been wiped, server-side artifacts often remain:
- Apple Privacy Report at privacy.apple.com — a discoverable export listing logins, device additions, recovery method changes, and password resets
- Google "My Activity" — comprehensive log of search, Maps, YouTube, and app activity, retained until the user changes auto-delete (which itself logs)
- iCloud backup history — even if the user deleted the most recent backup, older backups can be subpoenaed from Apple
- Find My / Find My Device location history — discoverable, often uncontested by the user
Building the spoliation motion
The strongest motions we have supported include:
- Timeline exhibit. Preservation letter date → device-reset date → first interaction with replacement device. When these three dates are within the same week, intent becomes hard to dispute.
- Comparison forensic image. If you forensically imaged the device before the preservation period (rare but powerful), comparing pre/post images shows exactly what is gone.
- Cross-source corroboration. Carrier records show texts that no longer exist on the device. Cloud backups show photos that were on the device but are now missing. Each absent artifact reinforces the inference.
- Expert affidavit. A qualified forensic examiner declares, under oath, that the observed pattern is consistent with intentional destruction and not with ordinary device behavior or routine maintenance.
What the other side will argue, and how to counter
- "Phone was lost / damaged." Counter with carrier records showing the same device IMEI active during the period, or with a forensic image that shows it functioned normally.
- "The reset was for a separate reason — selling the phone, gifting to a child." Counter with the timing argument and with proof that no transfer actually occurred.
- "I didn't know I had a duty to preserve." Counter with the preservation letter, prior counsel correspondence, or any communication that put them on notice.
What we provide for these motions
Forensic-led litigation support —device imaging, anti-forensic activity analysis, written expert opinions, and expert-witness testimony at hearing or trial. We work directly with counsel and produce findings under attorney-work-product privilege.















