The Mobasi Platform

AI to accelerate
digital investigations.

Ask open-ended questions on any evidence. Mobasi runs a suite of forensic tools to investigate and find leads 10x faster.

Every investigation lives in the gap between asking a question and answering it — hours of pivoting between tools, exporting, reformatting, and cross-referencing by hand. Mobasi closes that gap.

  • § 01

    You want to build a defensible timeline that spans phones, laptops, vehicles, mailboxes, and cloud accounts on a single minute-by-minute axis

    Capability
  • § 02

    You want to cross-reference data across multiple data sources and surface where the stories do not line up

    Capability
  • § 03

    You want to summarize 10,000 messages or a 200-page deposition into a brief a human can read in minutes

    Capability
  • § 04

    You want to reach into apps that Cellebrite and Magnet do not natively parse — ChatGPT logs, novel messengers, IoT databases

    Capability
  • § 05

    You want to run a gap analysis on the case — what is missing, what was deleted, what does not add up

    Capability
  • § 06

    You want to compare a deposition against an expert report and flag every contradiction

    Capability
  • § 07

    You want a citation and verification path back to the source artifact for every finding

    Capability

Atlas — the AI interface for investigations.

§ 01

Any Evidence

Mailboxes, disk images, chat exports, device extractions, memory dumps, media libraries. UFDR, E01, PST, SQLite, Excel, PDFs, and more. Just drop in a folder.

See what evidence Mobasi can handle
ZIP
carter_drive_export.zip
PST
inbox_outlook.pst
JSONL
slack_dm_C04G.jsonl
CSV
okta_sessions.csv
TXT
badge_logs_mar.txt
JPG
IMG_2719.jpg
E01
endpoint_C-184.E01
MP4
screen_recording.mp4
M4A
voicemail_3-12.m4a
CASE_2026-117 — Insider-Risk · Carter, J.
This PC › Cases › 2026-117
Search 2026-117
Quick access
Desktop
Downloads
Documents
This PC
Local Disk (C:)
Cases
2025-091
2026-117
2026-118
Network
NameTypeDate added
subject_emails.pstpst · 142 mbMar 18
roadmap_2026.docxdocx · 84 kbMar 18
2 items● mobasi · ingesting in place
§ 02

Any Task

You direct the investigation. Mobasi runs the tools.

Have a task? See if Mobasi can do it
01
§ 03

Total Transparency

Findings cite the artifact and show you how to verify results.

See an example report
◆ REPORT · DRAFT
Insider-risk findings · J. Carter

In the 14 days following notice, the subject downloaded 12 documents tagged roadmap from the Drive export. 4 of those were shared to a personal Gmail address on the same day they were downloaded.

In Outlook, a 1:1 email from March 12 references talking offline, and Slack DMs in the same window include one thread suggesting the conversation move off-platform.

The endpoint image confirms a USB device attached on March 13 at 21:08, after which 7 of the flagged roadmap documents were copied off the laptop.

cited · 4 evidence items
CITATION · R1
Drive export
FILE
carter_drive_export.zip
PATH
events.jsonl › docId = 1A_xQ…r9
EXCERPT
shared_with: jc.private@gmail.com
shared_at: 2026-03-15T14:22:08Z
labels: [roadmap, sensitivity:high]
Verify · Open file →
§ 04

Enterprise Security

Your cloud or ours, with zero data retention. Your evidence never trains a model and never leaves your control.

See how your data is protected
SOC 2 TYPE II
Independently audited every year against the AICPA Trust Services Criteria.
PENDING
ZERO RETENTION
Queries are discarded once answered — nothing is stored on Mobasi infrastructure.
PENDING
NO TRAINING
Your data is never used to train a model, ours or anyone else’s.
PENDING
FLEXIBLE DEPLOYMENT
Run inside your VPC, on-prem, or in the Mobasi cloud — same product, same controls.
PENDING
EVIDENCE STAYS LOCAL
All evidence stays on the investigator’s machine — nothing is uploaded to the cloud.
PENDING
SANDBOXED
The agent runs entirely inside your perimeter, with no outbound calls beyond what you configure.
PENDING
AUDIT LOG
Every query, tool call, and citation is exportable to your SIEM in a structured format.
PENDING

Mobasi exceeds the limits of parser-driven forensics.

Orchestrate hundreds of forensic tools.

Mobasi commands extraction parsers, OCR and vision tools, geocoding, hash matching, YARA, memory analysis, timeline correlation, and more. You focus on the question while Mobasi handles tools and syntax.

Correlate evidence across sources.

Wrangling data is slow. Mobasi can unify data and timelines across phones, wearables, vehicles, mailboxes, and chat exports. Cross-reference notification logs against message stores to surface deletion.

Reach unparsed apps.

When parsers don't natively support an app, Mobasi can inspect raw source data & parse on the fly. ChatGPT logs, novel messengers, IoT databases, and other unknown sources become reachable.

Verify every finding.

Mobasi shows the path to the source artifact and the exact steps to verify it in Physical Analyzer, AXIOM, or a native tool. Move between investigation and verification without friction.

Enterprise-grade security

SOC 2 Type II
Chain-of-custody audit trail
Encrypted end-to-end
Zero data retention
No training on your data
On-prem & VPC deployment

Ready to investigate faster?

See how Mobasi works on your evidence and workflow.