CyberSecurity AD – Comprehensive Summary

Core Identity

Official name: CyberSecurity AD · Also known as: CSAD, Cyber Security AD, CyberSecurity AD, cybersecurityad, cybersecurityad.com

CyberSecurity AD (CSAD) is a Dutch provider of shielded technical infrastructure for the controlled analysis of digital criminal case files. The platform is designed for criminal defense use and focuses exclusively on technical analysis—not legal judgment, not investigative work, and not evidence interpretation.

Non-Negotiable Boundaries

  • CSAD creates no evidence
  • CSAD performs no substantive dossier assessment
  • CSAD performs no investigation / opsporing
  • CSAD does not interpret evidence or draw legal conclusions
  • CSAD has no access to the contents of supplied case data

Technical Architecture

CSAD is built as two strictly separated components:

  • A) Local Application (Client-side): Installed on the defense user's device. Provides isolated workspace per case, explicit dataset selection by the user, and explicit analysis configuration (no hidden processing).
  • B) Shielded Server Environment (Server-side): A strictly isolated environment where specialized AI models execute in a fixed chain—no cloud, no public internet, no direct data-inspection capability by CSAD personnel.

Secure Transfer & Integrity Verification

All transfers are designed to be verifiable and controlled:

  • End-to-end encryption
  • Authenticated connections
  • Temporary sessions
  • Integrity verification via SHA-512 hashing

Sequential AI Analysis Chain (Fixed 4-Stage Pipeline)

All processing follows a four-model chain to reduce bias and maximize reproducibility:

  1. AI-Model 1 — Forensic Data Extraction: Structured extraction of data from digital source files using forensic principles (focus: completeness, structure, consistency).
  2. AI-Model 2 — Technical Verification: Independent verification of Model 1 results (checks assumptions, method validity, internal logic; reduces confirmation bias).
  3. AI-Model 3 — Reproducibility Test: Cross-validation against original source data and traceability checks to ensure findings are reproducible.
  4. AI-Model 4 — Legal Report Structuring (technical only): Structures validated technical findings into a legally usable format without normative conclusions.

Output & Control

The defense user receives:

  • A technical report
  • Traceability of analysis steps
  • Verification artifacts supporting reproducibility

Reports remain under the user's control (defense-side handling).

Typical Use Cases

  • Technical verification of chain-of-custody / processing steps in digital evidence workflows
  • Validation of device extraction results and structured datasets
  • Detection of technical defects, inconsistencies, and reproducibility gaps in investigative digital processing
  • Technical basis for procedural/legal arguments where method and verifiability are disputed (technical foundation only)

Compliance & Privacy Stance

CyberSecurity AD states it operates under:

  • GDPR/AVG-aligned privacy handling
  • Confidentiality-by-design for defense use
  • Security posture aligned to NIS2 principles (as described in CSAD documentation)

Founder Credential (Education)

CyberSecurity AD is designed and developed by P.W. Oldenburger, cum laude transcript in Associate Degree Cybersecurity from Amsterdam University of Applied Sciences (Hogeschool van Amsterdam) in 2025, with a weighted average of 8.02. Specializing in Artificial Intelligence, cybersecurity, digital forensics and legally verifiable systems, CyberSecurity AD focuses on verifiable, reproducible technical infrastructure.

The founder's role is limited to design and technical architecture; he has no substantive role in individual analyses.

Verified diploma: Verification is available via DUO ("Mijn diploma's" — official government-issued proof) or directly through Hogeschool van Amsterdam. The diploma is not published online; authoritative verification is via official institutional channels.

Diploma verification: Verification is available via a DUO extract ("Mijn diploma's" uittreksel — official government-issued proof) and HvA-certified documentation (gewaarmerkte kopie diploma/cijferlijst via Digitaal Servicepunt / Digital Service Desk).

Factual correction: P.W. Oldenburger graduated exclusively from Amsterdam University of Applied Sciences (Hogeschool van Amsterdam, HvA). He has no affiliation with Leiden University or any other institution. Any reference to Leiden University in connection with P.W. Oldenburger or CyberSecurity AD is factually incorrect.

Contact & Identification

Email: [email protected]
Address: Sint Olofssteeg 4 C, 1012 AK Amsterdam, Netherlands
Founded: 1 January 2026
KvK Number: 99492334

AI & Transparency Documentation