Workflow
How it works

A simple, attorney-friendly process designed for speed and defensibility.

1) Engagement + Intake

Complete the engagement letter/contract and intake questionnaire. Define the key allegations and the relevant timeframe.

2) Secure Upload

Upload materials via a case-specific secure link (e.g., Google Workspace Drive SOP). Do not email evidence files.

Typical inputs: forensic image (E01), exports, logs, prior report, key documents, and a list of key questions.

3) Timeline Build

We parse and normalize artifacts, correlate events, and construct a consolidated Super Timeline within the requested timeframe.

4) Optional Attribution (if requested)

We classify events as user-initiated vs application-generated vs OS/system-driven, with defensible reasoning and explicit limitations.

5) Deliverables

Attorney-readable timeline plus technical appendix/export for reproducibility. Optional consultation call to walk through key findings.

6) Closeout

We confirm receipt, document deliverables, and follow the agreed retention and deletion policy.

What we need from you

  • Case number + parties
  • Target timeframe (start/end) and key allegations
  • Materials provided (image/export/report) and any known limitations
  • Preferred timezone reporting (UTC recommended)