What We Do
Purpose‑Built Forensics
- Custodian‑friendly collection options: onsite, remote, or in‑lab.
- Defensible documentation: consent, scope, hash logs, chain of custody.
- Attorney‑aligned reporting focused on facts, timelines, and policy impact.
Common Matters
- Departing employee/IP theft; insider risk
- Harassment/misconduct investigations
- Regulatory & litigation discovery
Devices & Data Types
Platforms
- iOS (iPhone, iPad) — supervised/unsupervised
- Android — managed (MDM) & unmanaged/BYOD
- Business & personal devices (policy‑permitting)
Core Artifacts
- Texts/SMS, iMessage, call logs
- Chat apps (policy‑ & encryption‑permitting)
- Photos, videos, audio/voicemail
- Contacts, calendars, notes
- Locations, Wi‑Fi, Bluetooth history
App Evidence
- Email (Exchange/Gmail clients)
- Enterprise apps (Teams/Slack/Zoom)
- Cloud storage & sharing traces
- Browser history, downloads
Acquisition Methods
Logical / Targeted
- Consent‑based extractions of messages, media, and app data
- Cloud backups (iCloud/Google) when appropriate
- Rapid triage to confirm relevance
Advanced Options
- Selective file‑system/data‑partition acquisitions (device‑ and OS‑dependent)
- Journals/artifact pulls for deleted item recovery (where supported)
- Encrypted devices: workflow for passcodes/MDM unlocks or fallback strategies
Standard Workflow (Client‑Facing)
- Intake & Scoping: Allegation, custodians, device inventory, policies, region/privacy checks.
- Authority & Consent: Counsel letter, consent forms, device custody and access approvals.
- Acquisition: Logical/targeted or advanced file‑system methods; capture hashes and logs.
- Verification: Validate image integrity; document environment and tool versions.
- Parsing & Processing: Normalize timezones; extract chats, media, locations, app artifacts.
- Analysis: Build event timelines; correlate with email/chat/endpoint activity if applicable.
- Reporting: Findings memo with exhibits; optional expert declaration.
- Preservation: Evidentiary storage and retention aligned to matter policy.
Analysis & Deliverables
What You Receive
- Collection & chain‑of‑custody report (hashes, method, scope)
- Timeline workbook (messages, calls, locations, media)
- Exhibits: chat exports, screenshots, and selected artifacts
- Findings summary: issues, evidence, and recommended next steps
Optional Add‑Ons
- Audio/video transcription; translation
- Handwriting OCR and form extraction
- Cross‑source correlation (M365, endpoints, SaaS)
Triage vs. Full Forensic
Triage (QuickLook)
- Rapid confirmation of relevance and scope
- Targeted extractions of key apps/time windows
- Ideal for early case assessment or HR intake
Full Forensic
- Broader coverage; deeper artifact recovery
- Enhanced timelines and cross‑system correlation
- Suited for litigation, regulatory, or complex matters
Security & Privacy
- Least‑privilege access; role‑based controls; encrypted storage in transit/at rest.
- Respect for personal content on BYOD devices; targeted extractions to work data where possible.
- Region‑aware handling and documentation for cross‑border matters.
Engagement & Onboarding
Engagement Options
- QuickStart: Single device, targeted scope, fixed fee, rapid readout.
- Multi‑Device: Parallel acquisitions with weekly status updates.
- Advisory: Policies, BYOD playbooks, and readiness training.
Onboarding Checklist
- Signed SOW; custodian/device list; OS & passcode status
- Authority/consent forms; MDM/work profile details
- Timeline targets; reporting format preferences
BlueStar Core Services
ESI Consulting
- ESI protocols & discovery strategy
- Defensible preservation & collection planning
- Production standards & documentation
Hosted eDiscovery
- Processing & culling/ECA
- RelativityOne or CS Disco
- Analytics & dashboards
Managed Attorney Review
- First‑pass, second‑level/QC, privilege & redactions
- AI/TAR; defensible validation
- Staffing models with SLAs
Digital Forensics
- Endpoints, mobile, Microsoft 365 & SaaS
- Chain‑of‑custody rigor and audit trails
- Expert declarations & testimony
Language Translation
- Multilingual workflows inside review
- Confidential handling of PHI/PII
- Seamless handoff to production
Paper Discovery
- Scanning, Bates, indexing & binders
- Oversize prints & tight QC
- Delivery receipts & logs