By Forensic Discovery | Digital Forensics & eDiscovery Experts Since 2019
A will gets amended six weeks before the testator’s death, cutting out three adult children in favor of a live-in caregiver. The children believe their father was isolated, manipulated, and possibly no longer mentally capable when he signed. That’s a classic undue influence dispute, and it’s precisely where estate litigation digital forensics becomes the difference between speculation and documented fact. The evidence that resolves cases like this rarely sits in a file cabinet. It lives in inboxes, deleted text threads, calendar apps, and the metadata baked into a Word document last edited by someone other than the person who supposedly created it.
When families contest a will, allege undue influence, or challenge testamentary capacity, attorneys need forensic examiners who can reconstruct what was said, when it was said, and what was deleted and why. This article explains how digital forensic analysis supports those claims and what estate counsel should understand before the first deposition.
Most contested estate cases share a common fact pattern: someone gained access to a vulnerable person, changed their behavior, and worked to limit outside contact. The proof of that pattern almost always runs through electronic communications.
Email threads show when contact with family members dropped off. Text message records reveal who was communicating with the testator and when. Social media activity (or the sudden absence of it) reflects changes in daily routine. And deleted messages often turn out to be the most telling evidence of all, because the timing and content of deletions can be as significant as what was kept.
Forensic Discovery’s examiners have worked on estate cases where a testator’s email account showed hundreds of normal family exchanges through a certain date, then an abrupt gap, then a pattern of brief, stilted replies that didn’t match the prior writing style or complexity. That kind of shift doesn’t prove undue influence on its own. But it supports a narrative, and in combination with financial records and medical history, it can be compelling to a fact-finder.
This is why preserving digital evidence early matters so much in estate litigation. Every day that passes after a death is a day that storage space gets reused, accounts get closed, and device contents get overwritten.
The scope of an examination in estate matters depends on the theory of the case, but several categories of evidence come up consistently in civil litigation forensic work.
Email archives and deleted messages. If the estate involved a Microsoft 365 account, Exchange server, or Gmail account, those platforms retain significant data even after deletion. Items moved to the Deleted Items folder go to the Recoverable Items folder, where they remain for a default retention period of 14 to 30 days depending on tenant configuration. Litigation holds and compliance archives can extend that window considerably. Tools like Aid4Mail and the Microsoft 365 Compliance Center allow examiners to extract full message headers, body content, attachment metadata, and deletion timestamps from these archives.
Document metadata. When a will or trust amendment is at issue, the file itself often carries evidence about who created it, when it was drafted, and whether it was modified after initial creation. Microsoft Word embeds the author field, revision history, and edit timestamps in the document properties. In cases involving suspicious document provenance, a forensic examiner can compare that metadata against the testator’s known account credentials and device activity logs to assess whether the document was prepared on the testator’s own systems or on someone else’s device entirely.
Mobile device evidence. Text messages, iMessage threads, WhatsApp conversations, and voicemail records can all survive deletion in recoverable form on the device itself or in cloud backups. A full physical extraction using Cellebrite UFED or AXIOM can often recover deleted message content, including fragments of messages that weren’t fully overwritten. These records can reveal communication frequency, tone, and, in cases involving alleged isolation, who the testator was and wasn’t talking to in the period leading up to execution of disputed estate documents.
Cloud account activity. Cloud storage platforms like Google Drive, iCloud, and OneDrive maintain audit logs showing file access, download, and modification events. In cases where an estate plan was changed to benefit someone with access to the testator’s accounts, those logs can reveal whether documents were accessed or modified from an IP address or device that doesn’t match the testator’s known usage patterns.
Deleted doesn’t mean gone. That’s one of the most important principles in email forensics, and it holds consistently in estate litigation digital forensics work.
In Microsoft 365 environments, the Recoverable Items folder holds messages for a set retention period even after a user deletes them. If a litigation hold has been put in place, items are preserved indefinitely regardless of what the user does. When working with Gmail and Google Workspace, Google Vault provides similar preservation and export capabilities, including complete thread history and attachment records going back years.
Even when server-side recovery isn’t possible, device-level examination can fill the gaps. Email clients like Outlook and Thunderbird cache message data locally. Forensic images of a testator’s computer, captured before devices were wiped or redistributed, frequently contain email artifacts in unallocated disk space that can be recovered through file carving. EnCase and FTK are standard tools for this kind of disk-level analysis, and our team has recovered meaningful email content from devices that had been in storage for years after the original deletion.
The key is moving quickly. The longer the gap between initiating a dispute and securing the relevant devices, the greater the risk that evidence gets overwritten through normal system operation. This isn’t a reason to panic. It’s a reason to engage forensic support early, before devices change hands or accounts are closed by service providers following the estate administration process.
Undue influence is hard to prove because it typically happens in private. The value of digital evidence in these cases isn’t just what specific messages say. It’s what the pattern of communications reveals over time.
In one estate matter, forensic analysis of a testator’s email account showed a sharp decline in outgoing messages to family members beginning approximately four months before death. During that same window, the volume of communication with the primary beneficiary increased substantially. The new messages were shorter, used different vocabulary, and contained no references to ongoing family relationships the testator had previously discussed in detail. When combined with medical records from that period, this communication pattern supported the legal team’s theory that access to the testator was being managed.
This kind of timeline analysis (plotting communication frequency, contact diversity, and content complexity over time) is a core component of estate litigation digital forensics. Our forensic analysts use tools like Plaso and log2timeline to build detailed activity timelines from multiple data sources, then layer in communication metadata to create a picture of how the testator’s digital life changed in the lead-up to disputed estate documents.
For attorneys representing parties who are challenging a will, this type of analysis can be particularly valuable at the early case assessment stage. A forensic examiner can conduct an initial review of available data to determine whether the evidence pattern supports the legal theory before full discovery, which helps counsel make informed decisions about where to invest in the case.
When the authenticity of an estate planning document is in dispute, metadata examination can be determinative. Word processing files contain embedded data that includes the author’s name as registered in the software, the create date, the last-modified date, the last-edited-by user, and a revision count showing how many times the document was saved.
In a will contest where the testator allegedly drafted a codicil independently, a forensic examiner can check whether the document metadata is consistent with that claim. If the author field reflects a different user account, if the document was last edited from a device that can’t be attributed to the testator, or if the creation date doesn’t align with when the document was supposed to have been drafted, those discrepancies become evidence for the trier of fact to weigh.
PDF documents present different considerations. The PDF format preserves metadata from the original creation tool, but additional metadata is embedded at the PDF level as well. Tools like pdfid.py and ExifTool allow examiners to extract both sets of metadata and identify inconsistencies that suggest a document wasn’t created when or by whom it purports to be.
Attorneys handling document authenticity issues in estate proceedings should be aware that metadata examination isn’t infallible. Metadata can be intentionally altered, and some software configurations automatically update timestamps on open. A thorough forensic analysis accounts for these limitations and clearly distinguishes between what the metadata demonstrates and what it merely suggests.
Estate disputes don’t only involve family members. Corporate trustees, financial institutions acting as executors, and family offices find themselves in contested proceedings where estate litigation digital forensics plays a direct role. In-house counsel and compliance officers at these institutions should understand that digital evidence in estate matters extends well beyond the decedent’s personal devices.
Banking platform audit logs, wire transfer records, investment account change histories, and power of attorney usage logs all constitute digital evidence that can be subpoenaed or voluntarily produced in contested proceedings. When a corporate trustee faces allegations of mismanagement or self-dealing, its own system logs become evidence. The same forensic methodology that applies to personal communications applies to institutional records, and early legal holds on relevant systems can be the difference between a defensible record and an unexplained gap.
Our forensic consulting team has worked alongside estate litigation counsel on cases involving institutional fiduciaries, and the guiding principle is consistent: preserve early, collect forensically, and document chain of custody before any analysis begins.
Often, yes. Mobile forensic tools like Cellebrite UFED can extract data from a device’s unallocated storage space, where deleted messages may remain until overwritten. Cloud backups (iCloud, Google One) may also retain message history beyond what’s visible on the device. Recovery depends on how long ago the messages were deleted, whether storage space has been reused, and whether backups existed. A forensic examiner can assess what’s realistically recoverable from a specific device before any invasive work begins.
Communication pattern data tends to be the most persuasive. This includes email thread history showing changes in contact frequency and recipient diversity, text message logs showing who had access to the testator, and calendar records showing who accompanied the testator to appointments. Document metadata is also important when the origin or timing of estate planning documents is in dispute. The strongest cases combine multiple data sources to build a coherent timeline rather than relying on any single piece of evidence.
Digital evidence from the relevant period can support or challenge claims about a testator’s mental state at the time of document execution. Email and text message content may reveal the complexity of the testator’s thinking, their awareness of assets and family relationships, and whether communications were consistent with someone who understood what they were signing. This evidence doesn’t replace medical opinion, but it can corroborate or complicate the clinical picture in ways that matter to a fact-finder.
As early as possible. Digital evidence is vulnerable to overwriting, device disposal, and account closure by service providers settling the estate. If you’re anticipating a dispute or have already filed, the devices and accounts associated with the decedent and key witnesses should be secured for forensic imaging promptly. Engaging a forensic examiner early also helps counsel understand what evidence may realistically be available before committing to a litigation strategy that depends on it.
Digital evidence recovered through forensic examination is generally admissible when properly authenticated under FRE 901 or applicable state evidence rules, and when the examiner can testify to the collection methodology and chain of custody. Probate courts apply evidence rules with some variation by jurisdiction, but courts in contested estate proceedings regularly admit forensically recovered digital evidence when it’s accompanied by a proper expert report documenting the methodology. Working with a qualified examiner who can serve as an expert witness, not just a technician, matters for this reason.
This article is for informational purposes only and does not constitute legal advice.
Case details have been anonymized. Forensic Discovery was not involved in these matters.
About Forensic Discovery
Forensic Discovery is a digital forensics and e-discovery consulting firm serving law firms and corporations nationwide. Our team holds CFCE and CCE certifications. Contact us for a confidential consultation.
To schedule a free computer forensics consultation for your law firm or business, contact Forensic Discovery online or call us at (866) 458-4993. Our certified computer forensics experts have helped thousands of clients throughout the country retrieve and preserve digital evidence from our offices in Arizona, California, Colorado, and Texas.
"*" indicates required fields