Intel iMac, MBP, Mini
Target Disk Mode and write-blocked imaging on Intel Macs — the strongest forensic class still available on Apple hardware.
- Target Disk
- T2
- Write-block

We image Intel and Apple Silicon Macs, parse APFS and Unified Logs, recover deleted records and reconstruct user activity — with reports that hold up under cross-examination.
macOS leaves traces in dozens of places — APFS snapshots, Unified Logs, KnowledgeC, Spotlight metadata, Time Machine and iCloud sync. We work each one and reconcile them chronologically.
Bit-for-bit acquisition of internal and external drives — write-blocked, hash-verified, defensible across Intel and Apple Silicon.
RAM acquisition where supported — credentials, encryption keys and running processes that vanish on shutdown.
Carving and APFS snapshot analysis recover deleted documents, images and Mail records — even after Trash is emptied.
Login records, KnowledgeC, biome, Quick Look thumbnails and Recents reconstructed into a single chronology.
Apple Mail, Outlook for Mac, iMessage and SMS forwarding analysed end-to-end with attachments and metadata.
iCloud Drive, Photos, Continuity, Handoff and AirDrop traces — what was synced, downloaded or shared with which device.
Apple Silicon changed how Macs are imaged. We use the workflow appropriate to the chip, OS version and security state — and tell you upfront what's realistic.
Target Disk Mode and write-blocked imaging on Intel Macs — the strongest forensic class still available on Apple hardware.
DFU-mode acquisition where supported, plus live imaging with the user's credentials under lawful authority.
Multi-user systems and macOS Server analysed — login records, file shares and Open Directory data preserved.
Lawful examination where credentials, recovery keys or institutional unlock paths are available.
Mac forensics has changed dramatically with T2 and Apple Silicon. We use validated, write-controlled workflows — Target Disk Mode, DFU acquisition and live imaging where required — never ad-hoc copies.
Every step is documented. Every file is hashed. The output is an exhibit pack a magistrate, judge or arbitrator can rely on.
APFS · HFS+
Intel · M1 → M4
FileVault · T2
Hash-verified
Confidential brief, lawful authority confirmed, model and macOS version checked, fixed-fee quote provided.
Target Disk, DFU or live imaging in our lab. Hashes captured. Chain of custody opened.
APFS, Unified Logs, KnowledgeC and Time Machine parsed; deleted records carved; timeline reconciled.
Plain-English findings with annotated exhibits. Expert testimony available where required.
Every enquiry is read by a licensed investigator and treated in strict confidence.
A short note about your matter — no detail required upfront.
From a licensed investigator, not a chatbot or call centre.
Confidential. No obligation. Fixed-fee quote where possible.