Counter-Analysis of Police Reports - Firme-H2E
Skip to content
Firme-H2E
  • Our Services
    • Cyber Investigation and Computer Forensics
    • IT Expertise & Legal Support
    • IT Data Visualization
    • IT Disputes and Projects
    • E-Reputation
    • Prevention & Training
    • ──────────────────
    • ──────────────────
    • ──────────────────
    • Legal Aid
    • Anton Piller Orders
  • About Us
    • Our Story
    • FAQ
  • Case Studies
    • Case: Deleted iPhone Messages
    • Case: Software Contract Dispute
    • Case: Screenshot Falsification
    • Case: Server Damage Insurance
    • Case: Cryptocurrency Fraud
    • Case: Police Report Counter-Expertise
  • Our Audience
    • Lawyers
    • Investigators
    • Insurance Adjusters
  • Blog
  • Estimate
  • Contact
  • FR
Get IT Forensic Support Now
Firme-H2E
  • Our Services
    • Cyber Investigation and Computer Forensics
    • IT Expertise & Legal Support
    • IT Data Visualization
    • IT Disputes and Projects
    • E-Reputation
    • Prevention & Training
    • ──────────────────
    • ──────────────────
    • ──────────────────
    • Legal Aid
    • Anton Piller Orders
  • About Us
    • Our Story
    • FAQ
  • Case Studies
    • Case: Deleted iPhone Messages
    • Case: Software Contract Dispute
    • Case: Screenshot Falsification
    • Case: Server Damage Insurance
    • Case: Cryptocurrency Fraud
    • Case: Police Report Counter-Expertise
  • Our Audience
    • Lawyers
    • Investigators
    • Insurance Adjusters
  • Blog
  • Estimate
  • Contact
  • FR

Critical Review of an Incomplete Phone Extraction Report

Scroll to explore

Case type: Criminal law – Defense

Client: Criminal defense lawyer


Parties involved: Crown v. Accused (possession of illicit material)


Mandate given to Firme H2E:

Counter-expertise of forensic analysis report produced by police services


Duration: 20 business days

Context

A 34-year-old man faced serious charges related to possession of illicit material discovered on his mobile phone during a search. The police report concluded that several compromising files had been voluntarily downloaded by the accused.

Defense counsel had doubts about the methodology employed. The police report contained no information about the source of the files, the applications involved, or the possibility that content had been passively received through messaging groups.

Firme H2E was retained to perform an independent counter-analysis of the seized phone and police report.

Firme H2E Intervention

Step 1

Police Report Review

  • Critical analysis of methodology described (or not described) in the report
  • Identification of gaps: no documentation of tool version used, partial extraction, missing metadata
  • Verification of documented chain of custody
Step 2

Independent Extraction

  • Requested access to seized device through counsel and the court
  • Performed new complete extraction with Cellebrite UFED (documented version)
  • In-depth analysis of SQLite databases from the messaging application involved
  • Recovered metadata ignored by police extraction
Step 3

Comparative Analysis and Report

  • Discovered that 87% of contested files originated from discussion groups where the accused was only a passive member
  • Demonstrated that files had been automatically downloaded by the application (default setting)
  • Identified inconsistencies in police report timestamps (uncorrected timezone offset)
  • Produced detailed report with recommendations for cross-examination
Result

Firme H2E’s counter-expertise report raised reasonable doubt about the intentional element of the offense.

H2E’s expert was called to testify and demonstrated to the court the methodological flaws in the police report.

The judge found that the evidence presented by the Crown was insufficient. The accused was acquitted of the main charges.

Key Takeaways
  • A police report is not infallible: methodology must be verifiable and challengeable
  • Messaging applications often download content automatically, complicating the notion of intent
  • An independent counter-analysis can reveal crucial gaps in evidence
Tools Used
  • Cellebrite UFED (complete extraction)
  • Cellebrite Physical Analyzer (in-depth analysis)
  • SQLite Browser (application database analysis)
  • EXIF metadata and timestamp analysis
  • Comparative documentation (H2E vs. police report)

Have a case?

Submit it securely through our platform.

No emails. No delays. Use our dedicated submission system to get expert help fast.

Submit Your Case

Your information stays confidential and is reviewed by certified experts.

Firme H2E

Legal IT Expertise Firm | Greater Montreal Area


  • Facebook
  • LinkedIn
Quick Links
  • Home
  • Our Services
  • Our Audience
  • About Us
  • Case Studies
  • Our Story
  • Blogs
  • Legal Aid
  • Anton Piller
  • FAQ’s
  • Contact
Contact Us
  • Location
    970 Demers Street, Carignan, J3L 1E9
  • Business email
    expertise@firmeh2e.com
  • Toll-free
    1-888-796-8706
  • Local
    1-450-700-4233
Stay Informed. Stay Secure.

Subscribe to stay informed about industry updates and connect with our experts.

Note: We serve all over Quebec and Canada

© 2025 Firme H2E. All rights reserved.

  • Privacy Policy
  • Terms & Conditions
Manage consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}