Oxygen Detective
Our default for mobile extraction — strong iOS and Android coverage with deep cloud reach.
- iOS
- Android
- Cloud

Oxygen Forensic Detective is the primary mobile extraction platform we run. Full file-system access, cloud collection and 35,000+ supported devices — applied with court-grade discipline from acquisition through to report.
Tooling alone doesn't make a case — but the right tooling, applied consistently, ensures nothing recoverable is left behind.
Logical, file-system and physical acquisitions across modern iOS and Android — including locked, BFU and AFU device states where supported.
Lawful collection from iCloud, Google, Microsoft 365, social platforms and 100+ services with token or credential authority.
WhatsApp, Signal, Telegram, iMessage, SMS and 20,000+ app artefacts decoded into reviewable timeline.
SQLite carving, journal recovery and unallocated-space analysis to surface deleted messages, photos and call logs.
Cellular, Wi-Fi and GPS artefacts cross-referenced for movement timelines suitable for court.
Multiple devices, accounts and sources combined into one searchable case for cross-correlation.
No single tool is best at everything. Here is how Oxygen sits beside the other extraction platforms we maintain access to.
Our default for mobile extraction — strong iOS and Android coverage with deep cloud reach.
Government-grade mobile extraction with strong locked-device pathways. Used as corroborating tool.
Specialist iOS access tooling for older locked devices. Used selectively where the matter requires it.
Mobile extraction platform with broad device support — used for corroboration on contested briefs.
We run multiple extraction platforms because no single tool wins on every device. Oxygen is the default; Cellebrite, GrayKey and MSAB are kept current for the matters where they out-perform it.
Every extraction is hash-verified, write-blocked where applicable and chain-of-custody documented. The report tells the bench what was acquired, with which tool, and how each finding was verified.
35,000+
20,000+
100+ services
Hash + cross-tool
Write-blocked, hash-verified extraction of the device or cloud source under chain-of-custody.
Native parsing of communications, location, media and app artefacts into a single case workspace.
Critical findings re-acquired or corroborated using a second tool to remove single-tool risk.
Plain-English report with technical appendix, exhibits and tooling trail ready for court.
Every enquiry is read by a licensed investigator and treated in strict confidence.
A short note about your matter — no detail required upfront.
From a licensed investigator, not a chatbot or call centre.
Confidential. No obligation. Fixed-fee quote where possible.