In Beta
Your car knows more than you think.

Vehicle Forensics extracts digital evidence from car infotainment systems — Bluetooth pairings, navigation history, call logs, paired devices, and more. Court-admissible from day one.

Your infotainment system is a hard drive with a steering wheel.

Modern vehicles store a surprising amount of personal data. We know where to find it.

Bluetooth Pairings

Every phone that ever connected. Device names, MAC addresses, pairing timestamps. Proves who was in the vehicle and when.

Navigation History

Every destination searched, every route calculated, every favorite saved. GPS coordinates with timestamps. Where they went, when they went.

Call Logs & Contacts

Synced phonebooks, recent calls, missed calls. The head unit caches this data even after the phone disconnects. Sometimes for years.

Text Messages

SMS and MMS synced via Bluetooth MAP profile. The vehicle stores message content, sender, and timestamp in local databases.

Projection Devices

Apple CarPlay and Android Auto connection history. Device identifiers, connection counts, and timestamps for every smartphone projection session.

System Events

Ignition cycles, door openings, speed logs, odometer readings. The CAN bus doesn't forget. Neither do we.

The Process

We speak the machine's language.

Vehicle infotainment systems run on embedded operating systems — QNX, Linux, Android Automotive — with proprietary databases scattered across eMMC flash storage.

We use progressive extraction methods. Start non-invasive (USB, UART), escalate only if needed (JTAG, chip-off). Every byte is hashed, timestamped, and documented for court.

Current focus: Chrysler/Dodge/Jeep Uconnect systems (Panasonic VP4R platform, NNG iGO navigation). Expanding to Ford SYNC and GM IntelliLink.

$ vf-extract --target uconnect-4c --method uart

[INIT] Connecting to VP4R via UART @ 115200 baud
[SCAN] eMMC detected: 32GB (nav partition: 17.6GB)
[SCAN] OS: QNX Neutrino RTOS
[SCAN] Nav: NNG iGO v9.35.2.96141

[EXTRACT] Bluetooth pairings ......... 4 devices
[EXTRACT] Projection devices ......... 13 sessions
[EXTRACT] Navigation destinations .... 29 entries
[EXTRACT] Contacts (synced) .......... 847 records
[EXTRACT] Call log ................... 312 calls
[EXTRACT] SMS cache .................. 156 messages

[HASH] SHA-256: a7c3f9...e41b
[DONE] Report generated. Court-ready.

Built for the courtroom, not the classroom.

Every extraction follows forensic-grade procedures from the first byte to the final report.

01

Chain of Custody

Every action logged with timestamps, examiner ID, and tool versions. Unbroken chain from vehicle to report.

02

Cryptographic Hashing

SHA-256 hashes on every image and extracted artifact. Proves data integrity — nothing added, nothing altered.

03

Write-Protected Imaging

Bit-for-bit forensic images created on write-blocked media. The original evidence is never modified.

04

Expert Reporting

Reports written for judges and juries, not just engineers. Plain-language findings backed by technical exhibits.

The people who need what's in the machine.

Attorneys

Prove presence, establish timelines, corroborate or challenge testimony with data the other side doesn't know exists.

🔍

Private Investigators

Vehicle data fills gaps that phone records and surveillance can't. Bluetooth pairings and nav history don't lie.

🛡

Law Enforcement

Supplement existing digital forensics with vehicle-specific extraction. Most agencies don't have this capability in-house.

Need evidence from a vehicle?

Vehicle Forensics is currently in development. If you have a case that needs vehicle data extraction — or you want to be notified when we launch — get in touch.