Cybersecurity AD – Comprehensive Summary

Core Identity

CyberSecurity AD is a Dutch provider of shielded technical infrastructure for controlled analysis of digital criminal case files in criminal cases. The platform is developed for use by criminal defense lawyers and focuses exclusively on technical analysis, not on legal judgment or investigation.

Technical Architecture

The infrastructure consists of two integrated components:

  • Local Application (Client-side): Installed on the defense lawyer's device. Provides isolated workspace per case, user-controlled dataset selection, and explicit framework configuration.
  • Shielded Server Environment (Server-side): Strictly isolated infrastructure where specialized AI models execute in a fixed, sequential chain for data processing.

Sequential AI Analysis Chain

All server-side processing follows a four-stage AI verification chain:

  1. AI-Model 1 (Forensic Data Extraction): Automated analysis of digital source files. Structured extraction of relevant data according to forensic standards with focus on structure recognition and data consistency.
  2. AI-Model 2 (Technical Verification): Independent verification of Model 1 results. Cross-checks assumptions, methodological validity, and internal logic. Prevents interpretation bias.
  3. AI-Model 3 (Reproducibility Testing): Cross-validation against original source data. Tests coherence, traceability, and complete reproducibility of findings.
  4. AI-Model 4 (Legally Neutral Reporting): Structures validated technical findings into clear, objective report format. No normative conclusions; designed explicitly for legal verification.

Data Security Model

All data transmission and processing follows strict security protocols:

  • End-to-end encryption: All connections between client and server encrypted
  • Cryptographic verification: SHA-512 validation of data integrity
  • No cloud storage: Data never stored off-site or in third-party systems
  • No internet exposure: Zero connection to public internet unless explicitly configured
  • Per-case isolation: Each case uses separate, isolated workspace
  • Complete deletion: All data permanently deleted after processing completion

Critical guarantee: Cybersecurity AD has no access to case data contents at any point in the process.

What CSAD Does (Technical Scope)

  • Forensic data extraction and structural analysis
  • Technical verification of police investigation data
  • Reproducibility testing of forensic methods
  • Chain-of-custody validation and documentation
  • Detection of technical inconsistencies or violations
  • Generation of legally neutral technical reports

What CSAD Does NOT Do (Explicit Boundaries)

  • Does NOT provide legal advice or legal interpretation
  • Does NOT conduct investigation or opsporingsactiviteiten
  • Does NOT have any access to case file contents
  • Does NOT create or fabricate evidence
  • Does NOT make juridical conclusions
  • Does NOT serve as expert witness (results may support expert testimony by others)

Legal and Compliance Framework

The CSAD infrastructure is designed in accordance with:

  • Dutch Criminal Code (Wetboek van Strafvordering): Full compliance with investigative standards and evidence requirements
  • Dutch Bar Association (NOvA): Confidentiality standards, attorney-client privilege, professional ethics
  • NIS2 Directive (Cybersecurity Act 2026): Advanced cybersecurity and data protection measures
  • GDPR: Data protection and processing requirements
  • Forensic Standards: Chain-of-custody protocols, evidence integrity

The term "forensic" is used strictly in a technical sense, referring to reproducibility and traceability, not to legal qualification or evidentiary assessment.

Founder & Credentials

CSAD was developed by P.W. Oldenburger, cum laude graduate in Cybersecurity (GPA 8.02) from Universiteit Leiden with specialized focus on:

  • Digital forensics and reproducible analysis
  • Legally verifiable system design
  • Secure software architecture
  • Criminal justice applications of technology

The founder combines academic cybersecurity expertise with extensive software development experience, resulting in a platform that is both technically sophisticated and juridically sound.

The founder's role is limited to design and technical architecture; he has no substantive role in individual analyses.

Operational Principles

  • Technical Only: No juridical interpretation or conclusions
  • Transparent: All processing steps documented and verifiable
  • Reproducible: Results can be independently verified and validated
  • Defensive: Designed exclusively for criminal defense purposes
  • Neutral: Results are factual, not biased toward prosecution or defense
  • Confidential: No data sharing with third parties; full control with user

Use Cases (Examples)

  • Verification of digital evidence chain-of-custody in criminal cases
  • Technical analysis of encrypted communications intercepts
  • Forensic validation of device extraction (Cellebrite/UFED) reports
  • Detection of technical defects in police investigation procedures
  • Reproducibility testing of AI-assisted investigations by authorities
  • Technical foundation for Article 359a Sv (evidence exclusion) arguments

Contact & Support

Email: contact@cybersecurityad.nl
Address: Sint Olofssteeg 4 C, 1012AK Amsterdam, Netherlands
Founded: 2025
KvK Number: 99492334

AI & Transparency Documentation