Services

Services

Rune Forensics provides independent digital forensic analysis, reporting, and expert support across a wide range of matters involving devices, accounts, and digital records.

Each matter is approached with a focus on what the evidence supports and how it will hold up under review.

If your issue is not listed, you are encouraged to reach out to discuss the specifics of your matter.

Mobile Device Forensics

Phones often contain key facts in a matter. I examine messages, app data, media, location artifacts, call activity, and other device records to determine what can actually be established from the data.

Computer Forensics

Computers often provide a broader record of activity. I examine file access, internet history, email, external device activity, deleted data, and system artifacts to identify relevant activity and explain the limits of the findings.

Cloud and Account Analysis

Some matters cannot be understood from a device by itself. I review cloud records, account data, and provider returns alongside local artifacts to build timelines, compare activity, and determine what is reliable.

Expert Testimony

When a matter requires explanation beyond the written report, I provide testimony based on the actual forensic work performed. The focus is on clear explanation, defensible methods, and opinions that stay within what the evidence supports.

Comprehensive Digital Investigations

Rune Forensics provides comprehensive digital investigations tailored to the needs of each matter. This includes identifying user activity, reconstructing timelines, analyzing data movement, and determining how information was accessed, stored, or transmitted.

Each engagement follows structured forensic methods, with attention to evidence handling, documentation, and defensible reporting.

Mobile and Digital Forensics

Data extraction, deleted data recovery, analysis, and reporting

Computer Forensics

Forensic imaging, file system analysis, volume shadow copies, and email analysis

Drone Forensics

Flight logs, images, telemetry, and geolocation reconstruction

Surveillance Video Acquisition

Recovery, conversion, and authentication of video files

Audio, Video, and Image Forensics

Enhancement, metadata review, and authenticity verification

Internet, Social Media, and Cloud Analysis

Account activity, deleted communications, and data recovery

GPS and Location Data Analysis

Route mapping, timeline reconstruction, and location validation

Cell Site Location Information (CSLI) Analysis

Call detail record interpretation and mapping

Cellular Records Analysis

Call patterns, text logs, and subscriber information

CSAM and Sensitive Data Investigations

Independent review of digital evidence, validation of forensic findings, and review of handling procedures

Peer to Peer (P2P) Investigations

Verification of file attribution, IP address analysis, and review of investigative methods

Data Recovery

Recovery of damaged, deleted, or corrupted data from devices

Email Forensics

Header analysis, metadata review, recovery of deleted communications, and authentication

Independent Analysis of Digital Evidence

Review and validation of forensic findings, devices, images, and reports

Expert Witness Services

Forensic reporting, affidavits, and testimony in civil and criminal matters

How the work is handled

Each matter is handled through a consistent forensic process from initial review through reporting. When additional support is required, it is coordinated based on the needs of the case.

Contact