Langley, BC
(604) 800-9060
Teradrive Forensics

Use case

Cyber-stalking and harassment forensics.

When digital harassment crosses into a legal matter, the forensic record makes the case: who, how, when, and through what means.

Cyber-Stalking & Harassment — editorial illustration

Signs you may need this

Common indicators we hear from counsel and corporate clients.

  • Unwanted, persistent contact across multiple channels
  • Suspicion that a device or account is being monitored
  • Threatening or harassing messages
  • Stalkerware or spyware suspected on a phone
  • Need for evidence supporting a peace bond or protection order

Scope of this work

What we cover and what we typically find.

We accept cyber-stalking and harassment engagements only when there is an active or imminent legal proceeding: a protection-order application, a civil claim, a criminal complaint with police involvement, or counsel preparing to file. We do not handle generic "I think someone is watching me" cases.

If the matter does not yet have a legal anchor and you need general help, your local police non-emergency line and an IT consultant are usually better starting points.

How we approach it

A defensible, repeatable process.

  1. Scope with counsel and confirm the legal anchor.
  2. Preserve the relevant devices and accounts with chain of custody.
  3. Examine for the harassment-specific artifact set (stalkerware, account compromise, message history, location data).
  4. Report findings with a timeline and exhibit indexing.
  5. Provide affidavit support for the protection-order application or civil claim.

What we deliver

Concrete outputs from a typical engagement.

  1. 01

    Forensic acquisition of affected devices and accounts

  2. 02

    Stalkerware and spyware detection

  3. 03

    Attribution analysis where evidence permits

  4. 04

    Preservation of harassing communications

  5. 05

    Report suitable for court or law enforcement

Common questions

Cyber-Stalking & Harassment questions we hear most.

Will my abuser know I had the device examined?

Most forensic acquisitions are not detectable by the device user after the fact. Where the device must be returned to the abuser's reach, we document the acquisition window and discuss safety planning with counsel.

Can you remove stalkerware from a phone safely?

Sometimes the safest approach is to preserve the evidence first, then factory reset and re-set up the phone. Removing stalkerware before preservation can destroy evidence. The preservation-then-reset sequence depends on the matter.

Can your report support a protection-order application?

Yes. Our examiner reports and affidavits are written for BC Supreme Court (Family), BC Provincial Court (Family), and other Canadian courts handling protection-order matters.

How long does the investigation take?

Single-device matters typically move from intake to draft report in two to four weeks. Urgent matters can be expedited.

Should I contact police first?

For criminal harassment or imminent safety concerns, yes. We complement police involvement; we do not replace it. The forensic record we produce often supports both the criminal and civil tracks.

Have a harassment matter with a legal anchor?

Tell us about the proceeding and the device. Our team will reach out as soon as possible.