I have an iPhone that may have been accessed without permission and I need a full forensic examination to understand exactly what happened. Your task is to acquire a forensically-sound image of the device, analyze it, and clearly document any evidence of unauthorized logins, configuration changes, or data exfiltration attempts. Please follow standard chain-of-custody practices from the moment you receive the handset (or remote image) so that the results are admissible should legal action become necessary. Acquisition and analysis with tools such as Cellebrite UFED, Magnet AXIOM, or equivalent is preferred, and every file you touch must be verified with cryptographic hashes. Deliverables I expect: • Read-only forensic image of the iOS device (with SHA-256/MD5 hashes) • Timeline and artifact breakdown showing when and how the unauthorized access occurred • Screenshots or extractions of key evidence (keychain items, logs, notifications, etc.) • A concise executive summary plus a detailed technical report describing methodology, tools, and findings I will be available to answer clarifying questions quickly, and I’m ready to supply any legal authorizations or device passcodes required for the acquisition. Let me know your estimated turnaround time and any additional materials you’ll need to begin.