Skip to main content

Rune Forensics: Clarity from Complexity

With over a decade of investigative experience and a strong foundation in law enforcement, Rune Forensics offers a unique blend of practical casework and technical expertise. Our background includes leading digital forensic investigations, managing evidence in high-stakes criminal cases, and providing courtroom testimony that withstands scrutiny. Today, we bring that same rigor to legal professionals, businesses, and private clients, transforming complex digital data into clear, defensible evidence.

About

Rune Forensics is led by a CISSP certified cybersecurity professional with master’s degrees in both Cybersecurity and Criminal Justice. Having completed close to 1,000 hours of specialized training through the National Computer Forensics Institute (NCFI), SANS, EC-Council, NW3C, and other leading organizations. This training includes advanced courses in cloud forensics, computer forensics, mobile device analysis, network intrusion forensics, and forensic examinations using industry tools such as X-Ways, Cellebrite, and Magnet Axiom.


We hold multiple industry certifications including CFCE, CAWFE, CMDE, CCME, CHFI, CEH, and MCFE. Our experience spans federal, state, and local investigations involving cybercrime, complex data recovery, and incident response. We have supported a wide range of matters, from misdemeanor theft and digital evidence in property crimes to complex homicide and human trafficking cases. In addition, our founder is a Certified Drug Recognition Expert (DRE), bringing unique expertise in evaluating impairment and substance-related evidence.


Whether recovering deleted information, analyzing cloud environments, or presenting findings in court, we are dedicated to delivering precise, defensible results. At Rune Forensics, we combine advanced technical skills with a clear understanding of legal processes, risk management, and evidence integrity to help clients address challenging digital investigations with confidence.

Services

Logical and full file system (FFS) extractions using industry standard tools such as Magnet Verakey. Support for Android and iOS, including deleted content recovery and account data analysis. 

Analysis of Windows, Linux, and Mac OS systems, including user activity reconstruction, keyword searches, registry examination, deleted data recovery, browser history analysis, and file activity review.

Review and extraction of cloud data activity on platforms such as Google, Apple, AWS, Azure, & many popular social media apps. 

Support with next steps, including identifying subpoena targets, attributing accounts to individuals, and reviewing opposing forensic reports for accuracy and methodology.

Further Information

With Magnet VeraKey Full File System (FFS) capabilities and advanced forensic toolsets, Rune Forensics can recover deleted data on a wide range of devices, including smartphones, computers, and cloud accounts. From intentionally wiped files to remnants left in unallocated space, we apply industry-proven methods to extract the maximum available evidence.

Rune Forensics assists clients in civil, criminal, and administrative matters that rely on accurate digital evidence. Services include the examination and recovery of data, clear reporting, and support through the entire investigative process.


Types of cases and issues addressed:

  • Intellectual property theft and trade secret disputes
  • Employee misconduct, policy violations, and internal investigations
  • Corporate fraud, embezzlement, and financial wrongdoing
  • Data breaches, unauthorized access, and cybercrime
  • Abuse, harassment, stalking, and protective order matters
  • Family law cases including divorce and custody disputes involving electronic records
  • Digital evidence in impaired driving or substance-related incidents
  • Death investigations that require reconstruction of digital timelines
  • Legal disputes that involve electronic discovery and review of opposing expert reports

Rune Forensics offers end-to-end digital investigations tailored to your objectives. Whether it’s uncovering insider threats, reconstructing user activity, or mapping data exfiltration, our processes are designed to provide clear timelines and defensible findings. Every engagement follows strict protocols for evidence handling and documentation, ensuring compliance with legal standards and best practices.


An example of services provided are as follows:

  • Mobile & Digital Forensics: Data extractions, deleted data recovery, analysis, and reporting
  • Computer Forensics: Imaging, file system analysis, volume shadow copies, and email forensic
  • Drone Forensics: Flight logs, images, telemetry, and geolocation reconstruction
  • Surveillance Video Acquisition: Recovery, conversion, and authentication of video files
  • Audio/Video & Image Forensics: Enhancement, metadata review, and authenticity verification
  • Internet, Social Media & Cloud Analysis: Account activity, deleted communications, and data recovery
  • GPS & Location Data Analysis: Mapping routes, timelines, and location validation
  • Cell Site Location Information (CSLI) Analysis: Call detail record interpretation and mapping
  • Cellular Records Analysis: Call patterns, text logs, and subscriber information
  • CSAM and Sensitive Data Investigations: Independent review of digital evidence, validation of forensic findings, and confirmation of lawful handling procedures to ensure accuracy, proper classification, and compliance with legal standards.
  • Peer to Peer (P2P) Investigations: Independent review of P2P activity, verification of file attribution, assessment of IP address reliability, and evaluation of investigative techniques to identify possible misattribution or overcollection.
  • Data Recovery: Damaged, deleted, or corrupted files from digital devices
  • Email Forensics: Examination of email headers and metadata, recovery of deleted or hidden messages, phishing investigation, and authentication of communications.
  • Independent Analysis of Digital Evidence: Validate or challenge findings by re-examining devices, forensic images, or reports.
  • Expert Witness Services: Forensic reporting, affidavits, and testimony in criminal and civil matters

Rune Forensics provides clear, objective reports and, when needed, expert witness testimony to explain complex technical findings in plain language. We assist legal teams with case strategy, preparation of exhibits, and review of opposing forensic reports, ensuring your position is backed by credible, well-documented analysis.

Contact Us