Summary Introduction Preparations Safety Trust Backup Methodology Checking Windows Computers Review Programs Launching at Startup Review Running Processes Review Network Connections Extract Data for Further Analysis Checking Mac Computers Review Programs Launching at Startup Review Running Processes Review Kernel Extensions Review Network Connections Extract Data for Further Analysis Checking Smartphones Check Devices Linked to Chat Applications Monitor Network Traffic Checking Android Devices Review installed Applications Check if the Phone is Rooted Extract Data for Further Analysis Optional : Check for Indicators of Stalkerware Installation Checking iOS Devices Review iCloud Accounts Check for Mobile Device Management Profiles Check for Jailbreaks Extract Data for Further Analysis Checking Devices Remotely Mac Computers License and Credits