Protecting Your Digital Privacy
During High-Stakes Divorce
In modern divorce, your digital footprint is the new battleground. Cloud backups, GPS data, cryptocurrency wallets, Ring doorbells, social media—all discoverable. I am one of the few divorce attorneys in Chicago with professional cybersecurity credentials.
The Digital Evidence Problem in Chicago Divorce Cases
Your Digital Life is an Open Book
Most attorneys don't understand the scope of digital evidence available in divorce proceedings. Under Illinois law (750 ILCS 5/), electronic communications, location data, and digital assets are all subject to discovery.
What your spouse's attorney can subpoena:
- iCloud/Google backup contents
- Location history from phone and car
- Ring/Nest doorbell footage
- Amazon Alexa voice recordings
- Financial app transaction history
- Social media posts (even deleted ones)
Illinois BIPA Warning
Illinois Biometric Information Privacy Act (740 ILCS 14/) provides some of the strongest privacy protections in the nation. Evidence obtained through unauthorized access to biometric data may be inadmissible—and could expose your spouse to liability.
Types of Digital Evidence Used Against You
Device Forensics
Deleted texts, photos, and app data can often be recovered. Even "factory reset" devices may contain recoverable data that opposing counsel can use in custody disputes.
Cryptocurrency & Hidden Assets
Bitcoin, Ethereum, and DeFi wallets are increasingly used to hide marital assets. Blockchain analysis can trace transactions that traditional accountants miss entirely.
Social Media Intelligence
Posts, check-ins, photos, and friend lists can contradict custody claims or reveal hidden income. Even private accounts can be subpoenaed through proper legal channels.
Location & GPS Data
Google Timeline, Apple Significant Locations, car GPS, and fitness trackers create detailed location histories that can prove or disprove claims about whereabouts during key events.
Smart Home Devices
Ring doorbells, Nest cameras, smart locks, and voice assistants create logs and recordings. Alexa voice recordings have been subpoenaed in multiple Illinois custody cases.
Email & Cloud Storage
Gmail, Outlook, Dropbox, and iCloud contain years of communications and documents. Shared family accounts often give one spouse access to the other's data.
Real-World Digital Scenarios
Scenario 1: The Hidden Crypto Wallet
"My husband says he lost all his crypto in the crash, but his lifestyle hasn't changed."
The Discovery: Traditional forensic accountants often stop at bank statements. By analyzing transfers to "unknown" beneficiaries and correlating them with public blockchain ledgers, we can often identify "cold wallets" (hardware devices) where assets are stash. In one case, a $500 monthly "consulting fee" led to a wallet holding over $250,000 in diversified coins.
Scenario 2: The Spyware Spouse
"He always knows where I am, even when I turn off my phone's location."
The Defense: Stalkerware is increasingly common. We conduct forensic scans of devices to identify non-standard background processes. In many cases, we find "parental control" apps installed without consent, or Apple AirTags hidden in vehicles. Documenting this not only secures your privacy but serves as powerful evidence of coercive control in court.
The Steele Digital Defense Strategy
What I Do Differently
I'm not just a family law attorney who "knows about technology." I hold professional cybersecurity certifications including CompTIA Security+, ISC2 Certified in Cybersecurity (CC), and the Google Cybersecurity Professional Certificate.
This means I understand:
- How forensic imaging works—and how opposing counsel tries to skip proper chain of custody
- Cryptocurrency tracing—blockchain analysis to find hidden wallets and transactions
- Device security audits—checking for spyware, compromised accounts, and data leaks
- Evidence preservation—proper procedures to ensure admissibility in court
Credentials
Common Questions
Can my spouse read my deleted text messages?
Often, yes. If messages were backed up to iCloud or iTunes before deletion, they are recoverable. Carriers also retain metadata (logs of who you texted and when) for 1-2 years, even if the content is gone.
Is it illegal for my spouse to install a GPS tracker?
Generally, yes. Under Illinois law, placing a tracking device on a vehicle you do not own or exclusively drive without consent can be a criminal offense (720 ILCS 5/21-2.5). However, exceptions exist for joint owners in some contexts, making this a complex legal area.
How do I secure my devices before filing for divorce?
Start by changing all passwords (not just social media—think bank, email, and iCloud/AppleID). Enable 2-factor authentication (2FA) using an app like Google Authenticator, not SMS texts (which can be intercepted on a family plan).
Protect Your Digital Privacy Today
15-minute call to identify exposure points in your case. No retainer required for initial assessment.