iPhone & iPad
Logical, file system and physical extractions across iPhone 5s through current generation. iCloud acquisition, Keychain decryption and encrypted backup parsing.
- Passcode bypass
- iCloud sync
- iMessage recovery

We extract, decode and analyse mobile phone evidence for solicitors, families and businesses across Australia and New Zealand — and present it in a form that holds up under cross-examination.
Modern mobile devices are layered storage systems. We work each layer methodically — from live communications down to carved deletions — and reconcile them into one chronological view.
SMS, MMS, iMessage, WhatsApp, Signal, Telegram, email, voicemail and call logs — including deleted threads.
Photos, videos, audio, screenshots, documents and downloads with EXIF and provenance preserved.
GPS pings, Wi-Fi connections, cell towers and geotagged media reconstructed onto a unified map.
Social media, dating apps, browser history, payment apps and 1,000+ third-party app artefacts.
IMEI, serials, OS state, account logins, installed apps, push tokens and configuration history.
Carved SQLite rows, unallocated space recovery and reconstructed databases — messages, photos, contacts.
Our toolchain profiles 35,000+ device variants — from current-generation iPhones and Pixels to legacy feature phones, tablets, wearables and drones. We work to the highest extraction level the device and its security state allow.
Logical, file system and physical extractions across iPhone 5s through current generation. iCloud acquisition, Keychain decryption and encrypted backup parsing.
Bootloader-level acquisition for supported chipsets, MTK and Qualcomm exploits, full file system images and Keystore decryption across major Android OEMs.
Legacy Nokia, Samsung, Sony Ericsson and other feature phones — chip-off and JTAG techniques where logical access is unavailable.
Same workflows as their phone counterparts — including iPad cellular variants, Samsung Galaxy Tab and rugged enterprise tablets.
Health, location, heart-rate and notification data from smartwatches and fitness trackers — often the only surviving record after a phone wipe.
Flight logs, GPS waypoints and onboard camera footage from DJI and other drone platforms, plus selected smart-home and IoT devices.
Note · We do not attempt to unlock physically damaged phones. Every device is assessed before a quote is issued.
Our practice is built on Oxygen Forensic Detective — the all-in-one platform trusted by law enforcement, intelligence agencies and corporate investigators worldwide. A single workflow handles acquisition, decoding, decryption, AI-assisted review and court-ready reporting across phones, tablets, drones, wearables and cloud accounts.
That breadth matters. Modern matters rarely involve one device or one app — a custody dispute might turn on a deleted iMessage, an iCloud backup, a hidden Signal account and a geotagged photo. We see them all, and stitch them into one timeline a court can follow.
35,000+
80+
Hundreds
Hash-verified
Confidential brief, lawful authority confirmed, device or account scoped, fixed-fee quote provided.
Device imaged in our lab. Hashes captured. Chain of custody opened.
Encrypted apps decoded, deleted data carved, timelines and location histories reconstructed.
Plain-English findings with annotated exhibits. Expert testimony available where required.
Every enquiry is read by a licensed investigator and treated in strict confidence.
A short note about your matter — no detail required upfront.
From a licensed investigator, not a chatbot or call centre.
Confidential. No obligation. Fixed-fee quote where possible.