Contact Us for a Free

Digital Forensics
Case Evaluation


Computer Forensics Form

Digital Forensics

Digital forensics is the identification and recovery of electronic data. If you or your company become the victim of unauthorized access to your systems or data, it is imperative to preserve as much information as possible. Preservation of emails, documents and system information can help identify how the access occurred and what data was compromised.

Protus3 will work to preserve and recover all possible data and attempt to determine what led to the compromise. Whether the unauthorized access is an outside entity or inside source, Protus3 will work to get you the information you need to make the appropriate decisions for yourself and your company.

Mobile Forensics

Mobile forensics is the acquisition and analysis of mobile devices. As with digital forensics, data is collected and reviewed using state-of-the-art equipment and software.

Mobile devices are being used more than ever in both our personal lives as well as to conduct business. Mobile devices contain text messages, images, videos, location and other data that may be relevant to an internal review of civil or criminal matters. Expedient collection of data from a mobile device can provide valuable information in many ongoing investigations or reviews and may be required.

Using proper software and processes, Protus3 can preserve the data on these devices to ensure it is not lost.

Mobile Forensics

Follow The Data

The popularity of mobile devices such as cell phones, tablets, watches, GPS devices, and more is continuing to grow. The growth in the use of mobile devices leads to a greater likelihood that these devices come into play in civil litigation and criminal investigations. When this happens, it is imperative that the data on these devices is not lost or deleted.

Mobile forensics is a branch of digital forensics involving the acquisition and analysis of mobile devices in an effort to find, preserve or recover digital evidence. Ever-changing technological advances, new model releases, and everyday use of data encryption makes the forensic collection of the data on mobile devices more challenging.

Mobile forensics collects and analyzes data including internet searches, history, text messages, iMessages, photography, app data, call logs, voicemail, GPS location data, and much more. In many cases, "deleted" data can be recovered as well, especially if the data can be restored in a timely manner.

Request Help


Because there are so many smart phone models with varied designs, capabilities, and operating systems, it's important to use the right software technology to best collect, preserve, and display the data for each different model.

Standard tools, such as Cellebrite's UFED forensic software, support many different phone and mobile device models. Cell phone forensics may be utilized for cases from homicide, missing persons and death investigations, to embezzlement, harassment, domestic cases and more.



With state-of-the-art technology and decades of knowledge, our forensic examiners know where to look for relevant information involving many types of cases. We aid in taking large amounts of information and data and focusing in on the elements that are relevant to the matter at hand.

Digital forensics can help in many matters but not all. The type of data, the amount of time since the incident and many other factors can affect the outcome of any digital forensics review. Protus3, with a preliminary review of the issue, will work to provide you or your company, through legal counsel if required, the best path.

Request Help

Our Services

  • icon
    Image cell phones
  • icon
    Detect malware
  • icon
    Provide client with easy-to-read report and explain data
  • icon
    Preserve evidence
  • icon
    Locate when the information was last accessed
  • icon
    Analyze logs and data for evidence of intrusion
  • icon
    Image desktops
  • icon
    Consult on sensitive corporate and personal issues involving extortion and bribery
  • icon
    Provide in depth analysis of raw data
  • icon
    Recover deleted documents/files
  • icon
    Recover deleted texts / SMS messages
Super Chuck

Our Certifications

  • Certified Information Systems Security Professional (CISSP)
  • Certified Information Security Manager (CISM)
  • Encase Certified Examiner (EnCE)
  • Licensed Counterintelligence Service Trainee, North Carolina Private Protective Services
  • Licensed Private Investigator, North Carolina Private Protective Services
  • Licensed Private Investigator Associate, North Carolina Private Protective Services
  • Degrees in Information Technology, Security, Computer Science, Criminology, and Sociology.

Common Questions answered by a Protus3 forensic expert

frequently asked questions