In-House Counsel Guidebook: How to Handle Internet Defamation and Online Reputation Attacks August 2014 | Page 13

11 rules for issuing subpoenas, and many cases require issuing foreign subpoenas in a jurisdiction outside of the forum state. Thus, it is important in these situations to know the relevant rules in every state in which you plan to issue a subpoena. Moreover, when an attorney issues a subpoena to an ISP when they lack legal grounds for obtaining the anonymous person’s identity, he or she may be on the hook for the defendant’s legal fees for filing a motion to quash. C. One of the best tools we have found for determining the identity of anonymous persons online is a forensic exam of suspected attackers’ computers. In most cases, the victim of an online attack will have a good idea of who is behind the attack. Often, the posts will come shortly after a dispute with an employee, business associate or competitor. There are often circumstantial facts and even evidence that point to a person behind the posting, though no hard proof. In these situations, a forensic exam can be invaluable. When conducting forensic exams, we have found that the persons behind the attacks will often attempt to “wipe” their electronic devices. However, a forensic exam will obtain fragments that will show the individuals behind the online activity. We have also found it to be common for a poster to immediately use wiping software after they receive notice of our forensic exam. Based on our experience, performing a forensic exam is a very strong tool to prove who posted online attack information when there is circumstantial evidence pointing to someone. D. Another option when you have a legitimate suspect but cannot prove who is behind the posting is to ask them to defamationremovalattorneys.com