Digital Forensics • Analysis of Digital Evidence • IT Expert Reports • Independent Review of External Opinions
Comprehensive digital forensics: expert reports, counter-opinions, data recovery, log analysis and interpretation of digital evidence.
Explore our core service lines below.
Comprehensive digital forensics: expert reports, counter-opinions, data recovery, log analysis and interpretation of digital evidence.
A complete approach to securing IT and industrial OT/ICS systems: audits, compliance, resilience, incident response and security advisory retainer.
Professional smartphone examination — analysis of data, messengers, locations and deleted information. Detection of wiretaps, event timelines, technical and court opinions.
Retainer model: ongoing expert support in digital forensics, IT/OT cybersecurity and court expert opinions. Fast response, confidentiality and practical guidance for companies and law firms.
Practical trainings in digital forensics, IT/OT security and security audits. Programmes tailored to industry, level and objectives of participants.
Do you suspect that someone is spying on your phone, reading your messages, or knowing too much about your private conversations and whereabouts? This may indicate the presence of spyware or stalkerware installed on your device —or access gained through compromised accounts. I offer professional spyware and stalkerware detection on:
Professional examination of smartphones and other digital devices in an evidential context. Verification of data integrity and detection of system interference. Smartphones increasingly constitute a key source of digital evidence in criminal, civil and commercial proceedings. However, the relevance of a device does not lie solely in its content, but primarily in:
Hidden Digital Risk Before Strategic Decisions Financial, tax and legal aspects are routinely examined in transactions. Digital exposure and evidentiary risk are often not. Cyber Due Diligence is not a standard IT audit. It is an assessment of whether technology, data governance and access control may later translate into liability, disputes or reputational damage.
Expert Opinion Review & Digital Evidence Integrity Assessment A digital forensics expert report can determine the outcome of a legal case. This is why it must be methodologically sound, technically correct, and fully compliant with chain‑of‑custody and evidence integrity principles. I provide an independent, objective review that establishes: whether the expert report has real evidential value, whether the analysis was conducted correctly and reliably, whether the report contains technical or logical errors, whether data integrity and proper evidence handling were maintained, what cannot be concluded from the submitted materials, whether the expert’s conclusions follow logically from the evidence. Submit materials for initial review What exactly do I verify? ✔ 1. Methodology & Data Acquisition correctness of forensic imaging (bit‑by‑bit / device image), compliance with DFIR (Digital Forensics & Incident Response) standards, tools used during analysis and their limitations. ✔ 2. Chain‑of‑Custody Verification evidence handling and documentation, absence of unauthorised modifications, integrity of the original source media, proper logging of every acquisition and analysis step. ✔ 3. Technical & Logical Accuracy logical contradictions, missing analytical steps, mixing facts with interpretations, conclusions unsupported by data. ✔ 4. Evidential Value Assessment which parts of the opinion are admissible or useful in court, which parts lack evidential value, what can be established from digital evidence — and what cannot. ✔ 5. Review or Supplementary Opinion Upon request, I prepare a full review opinion that may be submitted directly into the case file.
Managing Incidents Through the Lens of Liability and Evidence When an IT or cybersecurity incident occurs, the first question is usually: “How fast can we fix it?” From a Digital Risk perspective, an equally important question is: “What happens if this becomes a dispute, investigation or legal proceeding?” Incident Response is not only about restoring systems. It is the moment when technology begins to generate liability.
Facts, Evidence and Liability In technology disputes, the outcome is rarely decided by who is “technically right”. It is decided by who can demonstrate facts in a verifiable and procedurally defensible manner. What typically matters most: data credibility, how evidence was collected, chain of custody, whether events can be reconstructed. This is where Digital Risk becomes liability.