Cell Phone & Computer Forensics


Digital Device Analysis is the retrieval, storage, and documentation of Electronically Stored Information (ESI) to produce evidence and expert conclusions in a manner that will be admissible and defensible in court. We have the expertise to analyze data and determine when it was created, deleted, manipulated, and catalog any pertinent information important to your case.​


Digital Forensic practitioners have come to favor this term over Computer Forensics because of the occasional incorrect assumption that Computer Forensics only applies to personal computers. Digital Forensics and Computer Forensics involve any electronic device that stores information. Such devices include computer systems, servers, smartphones, smart home speakers, GPS systems, tablets, gaming consoles, appliances, and much more.

Every Digital Forensic Case is different. We offer a free initial consultation to help our clients determine their specific Digital Forensic needs. Most cases include some or all of the following steps:

  • Consultation – Discussion with the client to help determine a strategy for their case. Often, review of the discovery and other documents in the case are performed prior to meeting with the client. Typically, these early stages of the Digital Forensic process are when preservation letters, protective orders, etc. are drafted and put in place.
  • Acquisition – Creation and secure storage of bit-stream image(s) of the data from the evidence media. Bit-stream images are exact duplicates of every bit of data on a given media, such as a hard disk drive, USB drive, or cell phone storage. The creation of the bit-stream images also serves as a preservation of the evidence.
  • Electronic Discovery – Production of electronically stored information (ESI) based on some protocol. This protocol could specify keyword searches, date ranges, authors, etc. Typically, the results are checked for confidentiality by the media’s custodian before being disclosed to the opposing party. Results often contain data that was previously deleted. The recovery of deleted data is performed utilizing the most sophisticated tools and robust methods.
  • Analysis – A thorough and detailed examination of the ESI is performed to construct an expert conclusion. Often, timelines of events or document revisions can be created. State-of-the-art tools and techniques are employed to ensure the validity of the results.
  • Reporting – Formal and professional written reports of the expert’s findings are created. The expert’s reports are carefully crafted to explain complex technical details in ways even the least technically sophisticated people can understand.
  • Testimony – In court testimony and/or depositions are given.

Please see our Rates page for explanations of the costs for digital forensic services.


Laptop and magnifying glass

Our computer forensic expert uses a variety of the latest tools to forensically copy data from computers, drives, servers and cloud storage for examination.  Our examination of the preserved data is where we really shine.  Testimonials given by clients, judges and juries have been our greatest reward for cases worked well from beginning to end.  We have invested heavily in software and equipment at our lab to quickly provide results on the most complex cases.  Michael Ullemeyer leads our Digital Forensics and previously worked, 12 years, as a senior digital forensic examiner for the Santa Barbara Police Department’s High Tech Forensics Unit.  He worked in this capacity processing 100s of cases involving computers and mobile devices.  He has brought with him his vast experience working complex cases and digital investigations.

Computer forensic investigators adhere to a rigorous discipline and use a variety of techniques and proprietary forensic applications to examine the ESI…all geared to accomplish a complete “autopsy” of the forensic computer data on a hard drive.


Cell phone on fingerprint

Cell phones now collect and contain more information about people than their computers.  Courts are beginning to recognize this and are mandating the collection and preservation of phone data relating to litigation and public record act requests.  We are constantly updating our mobile forensics tools to be on the leading edge of cell phone forensics and data recovery, supporting the recovery of data from hundreds of device models. 

We have access to the latest methods to recover data from most locked devices. Information we can often recover includes:

Police tape and cell phone
  • text messages/imessages
  • emails & chat recovery
  • Keyword searches
  • GPS location data, Wi-Fi spots 
  • photos and videos 
  • call logs and voicemail messages
  • recent calls, contact lists, address book data
  • Internet activity/searches/bookmarks
  • 3rd party APP data

We can analyze recent phone activity.  We have tools to analyze all makes and model cell phones.  We have been certified by courts as experts and provided testimony regarding cell phone forensics and cell tower location analysis, both in civil and as criminal defense experts.