Langley, BC
(604) 800-9060
Teradrive Forensics

Use case

Divorce and matrimonial digital forensics.

Hidden cryptocurrency, deleted text messages, location and financial-app history, stalkerware. The digital record often tells the story the spreadsheet does not.

Divorce & Matrimonial — editorial illustration

Signs you may need this

Common indicators we hear from counsel and corporate clients.

  • Suspected hidden assets or undisclosed accounts
  • Concerns about communications relevant to custody
  • Allegations requiring objective digital evidence
  • Joint devices needing forensic preservation
  • Cloud or social media evidence to capture

Scope of this work

What we cover and what we typically find.

We accept matrimonial engagements only when there is an active or imminent legal proceeding. Filed divorce or separation, ongoing custody application, protection-order matter, or counsel about to file. Most engagements are retained through family law counsel.

We do not provide consumer cybersecurity advice, generic device reviews, or unstructured personal investigations.

How we approach it

A defensible, repeatable process.

  1. Scope with counsel: define the in-scope devices, accounts, and date range, and the legal anchor for the engagement.
  2. Preserve the relevant devices and accounts.
  3. Examine for the matter-specific artifact set (financial apps, hidden-crypto wallets, deleted messages, stalkerware).
  4. Report findings with a timeline, exhibit indexing, and a methodology disclosure suitable for BC Supreme Court (Family) or BC Provincial Court (Family).
  5. Provide affidavit support where the matter requires sworn evidence.

What we deliver

Concrete outputs from a typical engagement.

  1. 01

    Forensic image of permitted devices and accounts

  2. 02

    Communication and financial-trail analysis

  3. 03

    Hidden-asset indicators where present

  4. 04

    Examiner report admissible in BC family court

  5. 05

    Expert testimony if required

Common questions

Divorce & Matrimonial questions we hear most.

Can you trace cryptocurrency one spouse may be hiding?

Yes, when we have access to the device or to bank records that show fiat-to-crypto transactions. The trace combines forensic device examination with on-chain analysis and exchange-record subpoena support.

What if the suspected device belongs to my spouse?

Forensic access usually requires either consent, joint ownership of the device, or a court order. We work with counsel on the access analysis at scoping. We do not perform unauthorized access.

Can deleted messages support a custody or protection-order application?

Often, yes, when recovered through a defensible process and authenticated. The strength depends on the device, the OS version, and how recently the deletion occurred.

How do you detect stalkerware on a phone?

Through a combination of installed-app review, accessibility-service analysis, device-administrator permission audit, and process-activity inspection. Some commercial stalkerware leaves persistent artifacts even after uninstall.

Will my spouse find out about the forensic exam?

Most acquisitions are not detectable by the device user after the fact. Where the device must be returned to shared use, we document any artifacts the user might notice.

Have a matrimonial matter that needs digital evidence?

Tell us about the proceeding. Our team will reach out as soon as possible.