
Blueberry Security
Discreet digital forensics for individuals and families.
When something feels wrong — your phone, your accounts, someone in your life — you need someone who will investigate and tell you the truth.
The Work Most Cybersecurity Firms Aren’t Built For
Most cybersecurity is designed for companies. Frameworks for enterprises. Tools for SOCs. Insurance for boards.
There is almost nothing built for the individual whose ex-spouse has unusual technical skills. For the family that doesn’t know if a device has been compromised. For the founder who suspects her phone is being monitored — but everyone keeps telling her she’s fine.
That is the work we do.
Forensic investigation for the people who can’t call IT — because they are the org chart.
You Are Not Imagining It
By the time most clients reach us, they have already been dismissed — by friends, by family, sometimes by their therapist or their lawyer. They have spent weeks or months questioning their own perception.
Our job is to investigate the question itself.
Sometimes the answer is: yes, this happened, and here is what we found. Sometimes the answer is: no, you are fine, and here is why we know.
Either answer is the deliverable.
We do not confirm fear for billable hours. We tell the truth.
Three Practices. One Standard.
Personal Forensics
Digital forensic investigation for individuals and families
For people who suspect their phone has been compromised, their accounts are being accessed without their knowledge, or monitoring software has been installed on their devices.
We investigate devices, accounts, and network activity to determine what happened — and document it to the same evidentiary standard used in court.
Common investigations:
- Stalkerware and monitoring software on iPhone and Android
- Unauthorized account access and email breach
- Device compromise and remote access
- Digital identity and dark web exposure
- Intimate partner surveillance cases
We investigate, and we tell you the truth.
Litigation Support
Privileged forensic work and expert witness services for attorneys
When attorneys retain us, all work is conducted under attorney-client privilege with court-admissible documentation. We have served as expert witnesses in family law, civil litigation, and criminal defense matters.
If you are an attorney with a client whose situation requires digital forensic investigation, we are the call.
Family Office & Advisor Services
Digital risk and forensic support for family offices and high-net-worth individuals
High-net-worth individuals face a distinct threat landscape. The risks are real, the targets are known, and the consequences of a breach extend well beyond data.
We provide digital risk assessments, communication security reviews, and forensic investigation for family offices, executive protection firms, and the advisors who serve them.
A Confidential, Structured Process
1. Confidential Consultation A direct conversation with Quinn or a senior investigator. NDA-protected from the first call. No sales process, no intake form that sits in a queue.
2. Scoped Engagement A clear written proposal with defined deliverables, timeline, and pricing. No hidden costs. No surprises.
3. Investigation and Findings Forensic work conducted to court-admissible standards. Regular communication throughout. A written findings report you can act on — or submit as evidence.
Certified Expertise. Trusted by Attorneys and Fortune 50 Enterprises.
Blueberry Security was founded by Quinnlan Varcoe after a career building incident response and security operations programs for Fortune 50 enterprises and defense contractors.
18 active certifications from the field’s most rigorous programs: GIAC, ISC², Offensive Security, AWS, Splunk, and CompTIA. Forensic methodology trusted in investigations ranging from major ransomware events to family law proceedings requiring expert witness testimony.
The forensic standard doesn’t change based on client size. Every investigation is documented to the same evidentiary standard — regardless of whether the findings end up in a personal decision or a courtroom.
Common Questions
Can you tell if spyware or stalkerware is on my phone? Yes. We examine iPhones and Android devices for monitoring applications, unauthorized configuration profiles, remote access tools, and other indicators of compromise. We document what we find and explain it clearly.
How do I know if my accounts have been accessed without my permission? We conduct account and credential investigations that examine access logs, authentication history, and indicators of unauthorized access. We also assess whether your credentials are circulating on breach databases or dark web markets.
What if the investigation finds nothing? A clean finding is still a finding. Many clients need to know, definitively, that they are not being monitored. We document our methodology and conclusions either way.
Is my consultation confidential? Yes. Every engagement begins under NDA. Attorney-referred matters operate under attorney-client privilege. We do not discuss client matters with anyone outside the engagement.
Do you work with attorneys? Yes. Litigation support is one of our three practice areas. We provide privileged forensic investigation, evidence preservation, and expert witness services for family law, civil litigation, and criminal defense matters.
Do you work remotely, or do I need to ship my device? We serve clients nationally. Many investigations are conducted remotely. Device examinations may require shipping or in-person coordination depending on the scope of the matter.
If Something Feels Wrong, Start With Answers.
Most engagements begin with a single conversation. Whether you are an individual who suspects something is off, an attorney with a client who needs forensic support, or an advisor looking for a trusted technical resource — that conversation is where we start.

Speak with Quinnlan Varcoe Today

Clients Testimonials
Blueberry Security has proven to be an outstanding partner. Their ability to seamlessly integrate with our services and deliver white-labeled incident response has significantly enhanced our value to clients. Their expertise, reliability, and collaborative approach make them a trusted extension of any security firm looking to expand their capabilities.
Aaron Birnbaum
Managing Partner @ Seron Security
Quinnlan brings more than cybersecurity expertise—she brings strategic alignment. Her support enabled us to scale incident response operations quickly without sacrificing depth or quality. For any partner needing trusted, high-caliber support, she’s the kind of asset who elevates your offering and reputation.
Caroline Lombard
Threat Specialist @ Amazon Web Services
I’ve worked with Quinnlan on multiple engagements, and her ability to navigate high-stakes incidents—like the Log4j fallout—was invaluable. For partners, having someone like her on your team means bringing true expertise to the table without building everything in-house. She’s a game-changer for channel growth.
Justin Cox
Senior AWS Security Analyst @ Paypal
Working with Blueberry Security has been one of the most seamless collaborations I’ve had in the industry. Their composure under pressure, technical precision, and real-world credibility consistently exceed expectations. They’re not just a vendor—you can trust them to represent your brand and deliver results that retain clients and drive loyalty.
Soufiane Jihadi
Senior Incident Response Consultant @ Deloitte
