top of page

What We Do

Cell Phone Analysis / Exploitation

Cell phones have radically changed the way people communicate. For every phone call, text, or email there is record that is produced and maintained by the cellular service provider. Taken in their raw form, records can look like a jumbled mess. But in reality, the records are telling a story. Our clients need real experts who understand not only how to interpret these records, but also illustrate the results in a clear, concise, and easy to understand manner. Most importantly, our clients deserve competent, polished, and highly trained expert witnesses who know the courtroom and can deliver compelling results to the judiciary.

Training

PCA offers multi-level, Cellular Analysis and Certification for law enforcement. The classes are taught by retired members of the FBI Cellular Analysis Survey Team (CAST) and provide educational opportunities that are considered to be the gold standard in law enforcement. Outside the FBI, PCA is the only organization that matches the FBI CAST training regiment and certification courses.

20181212_131521.jpg
IMG_7157.jpg

Expert Witness Testimony

PCA Experts are tested and proven courtroom expert witnesses. With experience in hundreds of trials , PCA’s team members provide professional and relatable testimony. PCA takes great pride in our ability to explain highly technical and detailed records in a way that allows jurors to understand cell phone networks, records and our expert opinions. Our Experts are prepared for any Daubert or Frye challenge. We offer decades of experience and excellent courtroom demeanor that allows PCA to accurately and effectively present cell phone data in any legal setting.

Digital Forensics

Forensic analysis of devices can recover communications, internet activity, geolocation data, or device usage logs from cell phones, computers, and even vehicle infotainment systems. Our Forensics Experts have 25+ years of experience performing technology investigations. Our advanced capabilities allow us to recover data from password protected, unsupported, and damaged devices when other solutions fail.

df4.jpg
bottom of page