Case: Police Report Counter-Expertise - Firme-H2E
Skip to content
Firme-H2E
  • Our Services
    • Cyber Investigation and Computer Forensics
    • IT Expertise & Legal Support
    • IT Data Visualization
    • IT Disputes and Projects
    • E-Reputation
    • Prevention & Training
    • ──────────────────
    • ──────────────────
    • ──────────────────
    • Legal Aid
    • Anton Piller Orders
  • About Us
    • Our Story
    • FAQ
  • Case Studies
    • Case: Deleted iPhone Messages
    • Case: Software Contract Dispute
    • Case: Screenshot Falsification
    • Case: Server Damage Insurance
    • Case: Cryptocurrency Fraud
    • Case: Police Report Counter-Expertise
  • Our Audience
    • Lawyers
    • Investigators
    • Insurance Adjusters
  • Blog
  • Estimate
  • Contact
  • FR
Get IT Forensic Support Now
Firme-H2E
  • Our Services
    • Cyber Investigation and Computer Forensics
    • IT Expertise & Legal Support
    • IT Data Visualization
    • IT Disputes and Projects
    • E-Reputation
    • Prevention & Training
    • ──────────────────
    • ──────────────────
    • ──────────────────
    • Legal Aid
    • Anton Piller Orders
  • About Us
    • Our Story
    • FAQ
  • Case Studies
    • Case: Deleted iPhone Messages
    • Case: Software Contract Dispute
    • Case: Screenshot Falsification
    • Case: Server Damage Insurance
    • Case: Cryptocurrency Fraud
    • Case: Police Report Counter-Expertise
  • Our Audience
    • Lawyers
    • Investigators
    • Insurance Adjusters
  • Blog
  • Estimate
  • Contact
  • FR

Counter-Expertise of a
Police Phone Report: Incomplete Extraction, Disputed Evidence

Scroll to Explore

Case Type: Criminal law – disputed digital evidence

Client: Criminal defense law firm


Parties Involved: Public Prosecutor vs. Defendant (criminal harassment,
breach of conditions)


Mandate Assigned to H2E Firm:

Conduct a counter-expert analysis of a phone extraction report produced by a police force


Duration of Mandate: 
20 business days

Context

The public prosecutor had submitted as evidence a technical report generated by a mobile extraction tool used by police.


This very brief report identified text messages deemed incriminating, allegedly sent to someone the accused was forbidden to contact.

The defense attorney questioned the completeness of the analysis: no full message history, no metadata, no mention of deleted messages.

He commissioned H2E Firm to conduct an independent
counter-expertise.

H2E Firm’s Intervention

Step 1

Critical Review of the Police Report

  • Verification of the tool used (MSAB XRY)
  • No session log or hash validation included
  • Inconsistencies in message timestamps
  • “Partial data” disclaimer ignored in the report’s conclusion
Step 2

Independent Full Extraction

  • Creation of a forensic image of the device in our possession
  • Extraction via Cellebrite UFED and reconstruction of SQLite databases
  • Identification of over 120 missing messages from the initial report, some showing that the complainant initiated contact
Step 3

Report and Testimony

  • Expert report written with a comparative section (initial report vs. H2E report)
  • Highlighting of methodological shortcomings in the initial report
  • Prepared testimony to neutrally explain why the evidence, as presented, was insufficient
Outcome

After reviewing H2E’s report, the judge ruled that the prosecution’s submitted evidence was incomplete and could not be accepted without reservation.


The charges for breach of conditions were withdrawn before trial.


Since then, the defense firm has referred several similar cases to H2E.

Key Takeaways
  • A technical report is not infallible just because it comes from a public authority
  • An independent counter-expertise can restore balance in court proceedings
  • The tools, methodology, and documentation are as important as the extracted results
Tools Used
  • Cellebrite UFED
  • SQLite Forensics Toolkit
  • Structured bilingual expert report (summary + methodology + technical annexes)

Do you have a case?

Submit it securely using our platform.

No emails. No delays. Use our dedicated submission system to get expert help fast.

Submit Your Case

Your information is kept confidential and reviewed by certified experts.

Firme H2E

Legal IT Expertise Firm | Greater Montreal Area


  • Facebook
  • LinkedIn
Quick Links
  • Home
  • Our Services
  • Our Audience
  • About Us
  • Case Studies
  • Our Story
  • Blogs
  • Legal Aid
  • Anton Piller
  • FAQ’s
  • Contact
Contact Us
  • Location
    970 Demers Street, Carignan, J3L 1E9
  • Business email
    expertise@firmeh2e.com
  • Toll-free
    1-888-796-8706
  • Local
    1-450-700-4233
Stay Informed. Stay Secure.

Subscribe to stay informed about industry updates and connect with our experts.

Note: We serve all over Quebec and Canada

© 2025 Firme H2E. All rights reserved.

  • Privacy Policy
  • Terms & Conditions
Gérer consentement
Pour offrir la meilleure expérience possible, nous utilisons des technologies telles que les témoins (cookies) pour stocker et/ou accéder aux informations de votre appareil. Consentir à ces technologies nous permet de traiter des données telles que le comportement de navigation ou les identifiants uniques sur ce site. Ne pas consentir ou retirer votre consentement pourrait affecter négativement certaines fonctionnalités.
Fonctionnel Always active
Le stockage ou l accès technique est strictement nécessaire à la finalité légitime de permettre l utilisation d un service spécifique explicitement demandé par l abonné ou l utilisateur, ou dans le seul but d effectuer la transmission d une communication sur un réseau de communications électroniques.
Préférences
Le stockage ou l accès technique est nécessaire dans la finalité d intérêt légitime de stocker des préférences qui ne sont pas demandées par l abonné ou l utilisateur.
Statistiques
Le stockage ou l accès technique utilisé exclusivement à des fins statistiques. Le stockage ou l accès technique utilisé exclusivement à des fins statistiques anonymes. Sans assignation à comparaître, conformité volontaire de la part de votre fournisseur d accès à Internet ou enregistrements supplémentaires provenant d un tiers, les informations stockées ou extraites à cette seule fin ne peuvent généralement pas être utilisées pour vous identifier.
Marketing
Le stockage ou l accès technique est nécessaire pour créer des profils d utilisateurs afin d envoyer de la publicité, ou pour suivre l utilisateur sur un site web ou sur plusieurs sites web à des fins de marketing similaires.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Voir
  • {title}
  • {title}
  • {title}