Services

Explore our core service lines below.

Spyware & Stalkerware Detection • Mobile Device Forensics • Phone Analysis

Do you suspect that someone is spying on your phone, reading your messages, or knowing too much about your private conversations and whereabouts? This may indicate the presence of spyware or stalkerware installed on your device —or access gained through compromised accounts. I offer professional spyware and stalkerware detection on:

Smartphone Examination • iPhone / Android Phone Analysis • Digital Forensics

Professional examination of smartphones and other digital devices in an evidential context. Verification of data integrity and detection of system interference. Smartphones increasingly constitute a key source of digital evidence in criminal, civil and commercial proceedings. However, the relevance of a device does not lie solely in its content, but primarily in:

Cyber Due Diligence – Hidden Digital Risk Before Decisions

Hidden Digital Risk Before Strategic Decisions Financial, tax and legal aspects are routinely examined in transactions. Digital exposure and evidentiary risk are often not. Cyber Due Diligence is not a standard IT audit. It is an assessment of whether technology, data governance and access control may later translate into liability, disputes or reputational damage.

Expert Opinion Review & Digital Evidence Integrity Assessment

Expert Opinion Review & Digital Evidence Integrity Assessment A digital forensics expert report can determine the outcome of a legal case. This is why it must be methodologically sound, technically correct, and fully compliant with chain‑of‑custody and evidence integrity principles. I provide an independent, objective review that establishes: whether the expert report has real evidential value, whether the analysis was conducted correctly and reliably, whether the report contains technical or logical errors, whether data integrity and proper evidence handling were maintained, what cannot be concluded from the submitted materials, whether the expert’s conclusions follow logically from the evidence. Submit materials for initial review What exactly do I verify? ✔ 1. Methodology & Data Acquisition correctness of forensic imaging (bit‑by‑bit / device image), compliance with DFIR (Digital Forensics & Incident Response) standards, tools used during analysis and their limitations. ✔ 2. Chain‑of‑Custody Verification evidence handling and documentation, absence of unauthorised modifications, integrity of the original source media, proper logging of every acquisition and analysis step. ✔ 3. Technical & Logical Accuracy logical contradictions, missing analytical steps, mixing facts with interpretations, conclusions unsupported by data. ✔ 4. Evidential Value Assessment which parts of the opinion are admissible or useful in court, which parts lack evidential value, what can be established from digital evidence — and what cannot. ✔ 5. Review or Supplementary Opinion Upon request, I prepare a full review opinion that may be submitted directly into the case file.

Incident Response – Liability, Evidence and Executive Decisions

Managing Incidents Through the Lens of Liability and Evidence When an IT or cybersecurity incident occurs, the first question is usually: “How fast can we fix it?” From a Digital Risk perspective, an equally important question is: “What happens if this becomes a dispute, investigation or legal proceeding?” Incident Response is not only about restoring systems. It is the moment when technology begins to generate liability.

IT Disputes – Facts, Evidence and Liability

Facts, Evidence and Liability In technology disputes, the outcome is rarely decided by who is “technically right”. It is decided by who can demonstrate facts in a verifiable and procedurally defensible manner. What typically matters most: data credibility, how evidence was collected, chain of custody, whether events can be reconstructed. This is where Digital Risk becomes liability.