Oxygen Detective
First-line mobile extraction across iOS, Android and 35,000+ devices.
- Mobile
- Cloud

No single tool wins on every device. We run a multi-vendor stack — Oxygen Detective and Belkasoft X by default, with Cellebrite, GrayKey, AXIOM and others kept current for the matters that need them.
The right tool depends on the device, the OS version and what the matter is asking. Here is how the stack is structured.
Oxygen Detective as default with Cellebrite UFED and MSAB XRY for corroboration. GrayKey for specialist locked-iOS work.
Tableau and Atola write-blockers, FTK Imager and X-Ways for forensically sound disk acquisition.
Belkasoft X as default platform. Magnet AXIOM, EnCase and FTK kept current for verification and brief-specific workflows.
Oxygen Cloud Extractor, native M365 / Google Vault and Hancom MD-Cloud for lawful cloud-account preservation.
Griffin AI for deepfake and synthetic-media detection — combined with EXIF, C2PA and manual frame review.
Cellebrite Inspector for Mac, BlackLight, Vehicle System Forensics and DJI flight-log tooling for non-standard sources.
Tooling discipline is choosing the right platform and recording why. Here is how we typically pick.
First-line mobile extraction across iOS, Android and 35,000+ devices.
First-line analysis platform — 700+ artefact types across mobile, PC, cloud and specialist sources.
Used for corroboration on contested mobile briefs and for matters needing its locked-device pathways.
AI authentication for contested photos, video and audio — deepfake and GAN-image detection.
Critical findings are verified across at least two tools, or by manual SQL / hex / frame inspection. The bench gets a finding, not a tool screenshot.
Every report names the tooling used, the version run and the verification path taken. If a finding rests on one tool, we say so — and explain why a second pathway was not available.
Two-tool minimum
Mobile · PC · cloud · AI
Tooling trail in every brief
Vendor-current licensing
Match the brief, devices and OS versions to the right tooling pathway before any acquisition begins.
Run the default tool, hash-verified, write-blocked, with chain-of-custody documented from minute one.
Critical findings re-run on a second tool or verified manually. Both paths recorded in the workpaper.
Every report names the tools used, version run and verification path — court-ready and tool-agnostic in conclusion.
Every enquiry is read by a licensed investigator and treated in strict confidence.
A short note about your matter — no detail required upfront.
From a licensed investigator, not a chatbot or call centre.
Confidential. No obligation. Fixed-fee quote where possible.