Use case
Cyber-stalking and harassment forensics.
When digital harassment crosses into a legal matter, the forensic record makes the case: who, how, when, and through what means.

Signs you may need this
Common indicators we hear from counsel and corporate clients.
- Unwanted, persistent contact across multiple channels
- Suspicion that a device or account is being monitored
- Threatening or harassing messages
- Stalkerware or spyware suspected on a phone
- Need for evidence supporting a peace bond or protection order
Scope of this work
What we cover and what we typically find.
We accept cyber-stalking and harassment engagements only when there is an active or imminent legal proceeding: a protection-order application, a civil claim, a criminal complaint with police involvement, or counsel preparing to file. We do not handle generic "I think someone is watching me" cases.
If the matter does not yet have a legal anchor and you need general help, your local police non-emergency line and an IT consultant are usually better starting points.
How we approach it
A defensible, repeatable process.
- Scope with counsel and confirm the legal anchor.
- Preserve the relevant devices and accounts with chain of custody.
- Examine for the harassment-specific artifact set (stalkerware, account compromise, message history, location data).
- Report findings with a timeline and exhibit indexing.
- Provide affidavit support for the protection-order application or civil claim.
What we deliver
Concrete outputs from a typical engagement.
- 01
Forensic acquisition of affected devices and accounts
- 02
Stalkerware and spyware detection
- 03
Attribution analysis where evidence permits
- 04
Preservation of harassing communications
- 05
Report suitable for court or law enforcement
Services typically engaged
Forensic services we draw on for this scenario.
Mobile Forensics
iOS and Android extraction including chip-off, JTAG, and ISP techniques for damaged or locked devices that conventional tools cannot read.
Learn moreComputer Forensics
Forensic imaging and analysis of Windows, macOS, and Linux systems for litigation, internal investigations, and expert witness work.
Learn moreCloud Forensics
Defensible collection and analysis of Microsoft 365, Google Workspace, AWS, Slack, Teams, and Salesforce evidence under legal hold.
Learn moreExpert Witness
Court-qualified expert witnesses delivering affidavits, expert reports, and trial testimony in Canadian civil and criminal matters.
Learn moreCommon questions
Cyber-Stalking & Harassment questions we hear most.
Will my abuser know I had the device examined?
Most forensic acquisitions are not detectable by the device user after the fact. Where the device must be returned to the abuser's reach, we document the acquisition window and discuss safety planning with counsel.
Can you remove stalkerware from a phone safely?
Sometimes the safest approach is to preserve the evidence first, then factory reset and re-set up the phone. Removing stalkerware before preservation can destroy evidence. The preservation-then-reset sequence depends on the matter.
Can your report support a protection-order application?
Yes. Our examiner reports and affidavits are written for BC Supreme Court (Family), BC Provincial Court (Family), and other Canadian courts handling protection-order matters.
How long does the investigation take?
Single-device matters typically move from intake to draft report in two to four weeks. Urgent matters can be expedited.
Should I contact police first?
For criminal harassment or imminent safety concerns, yes. We complement police involvement; we do not replace it. The forensic record we produce often supports both the criminal and civil tracks.
Related scenarios
Other use cases that often arise alongside this one.
Have a harassment matter with a legal anchor?
Tell us about the proceeding and the device. Our team will reach out as soon as possible.
