CyberSecurity AD
Secure AI analysis of digital criminal case files for criminal defense
Cybersecurity AD provides shielded infrastructure for the analysis of digital criminal case files with controlled AI deployment. Without access to case data and with full control in the hands of the defense. Confidential. Reproducible. Legally verifiable.
AI-Summary
CyberSecurity AD is a Dutch provider of shielded technical infrastructure for the controlled analysis of digital criminal case files. The platform is developed for use by criminal defense lawyers and focuses exclusively on technical analysis, not on legal judgment or investigation.
The infrastructure consists of a locally installed client-side application and a strictly shielded server environment where digital case files are processed through a fixed, sequential AI chain. This chain includes forensic data extraction, technical verification, reproducibility testing, and a legally neutral reporting structure. The term "forensic" is used strictly in a technical sense, referring to reproducibility and traceability of data processing, and does not imply legal qualification, evidentiary assessment, or investigative authority.
CyberSecurity AD has no access to the contents of submitted case files. Data is processed exclusively through end-to-end encrypted connections, without cloud storage or connection to the public internet. The analysis remains fully under the control of the defense.
CyberSecurity AD provides technical infrastructure only; all interpretation, legal assessment, and strategic use of analysis results remain exclusively with the defense team.
What Cybersecurity AD is
Cybersecurity AD develops and manages technical infrastructure for controlled analysis of digital criminal case files. The service provision does not include substantive case assessment and does not involve investigative activities.
Legal separation: The infrastructure is designed to make technical findings legally verifiable, not to create or interpret evidence. All interpretation and legal judgment remain exclusively with defense lawyers.
The core consists of:
- a locally installed CSAD application on the user side, and
- a strictly shielded CSAD server environment where specialized AI models are executed in a fixed, controllable chain.
This infrastructure is specifically designed for use in criminal cases and aligns with legal standards and professional requirements within the criminal defense community.
How the platform works
CSAD application (user side)
The CSAD application is installed locally on desktop or mobile device. The interface is intentionally simple and works on a per-case basis.
Within the application:
- a separate, isolated work environment is created for each case;
- the user selects the dataset to be submitted themselves;
- the user explicitly determines which analysis frameworks are applied.
Secure data transfer
Data transfer occurs exclusively via an encrypted, authenticated connection between the CSAD application and the CSAD server environment.
Characteristics:
- end-to-end encryption;
- cryptographic verification via SHA-512;
- no cloud storage;
- no connection to the public internet.
Cybersecurity AD has no access to the content of submitted data.
Processing of digital case files (AI chain)
Server-side processing is performed by a sequential chain of four specialized AI models. Each model fulfills its own, controllable role.
AI Model 1 — Forensic data extraction
Automated analysis of digital source files. Extraction of relevant data according to forensic standards, with focus on structure recognition and data consistency.
AI Model 2 — Technical verification
Independent verification of Model 1 results for assumptions, methodological validity, and internal logic. Prevents interpretation bias and confirmation bias.
AI Model 3 — Reproducibility testing
Cross-validation against original source data. Tests coherence, traceability, and reproducibility of findings.
AI Model 4 — Legal reporting structure
Structuring of validated technical findings into a clear, objective report. No normative conclusions; designed for legal verification.
Feedback and reporting
After completion of the AI analysis, the report is returned via the same secure connection to the CSAD application.
The user receives:
- a technical report with all validated findings;
- full traceability of applied analysis steps;
- verification data for reproducibility.
The report remains local on the user's device and can be exported or archived according to their own workflows.
Confidentiality & Compliance
Cybersecurity AD ensures:
The infrastructure is designed in accordance with:
Why Cybersecurity AD
Cybersecurity AD was established from technical necessity, not marketing.
P.W. Oldenburger — specialized founder
Cybersecurity AD was developed by P.W. Oldenburger, cum laude graduate in Cybersecurity (GPA 8.02), with focus on digital forensics, reproducibility and legally verifiable systems. The founder's role is limited to design and technical architecture; he has no substantive role in individual analyses.
Deep software engineering background
In addition to his cybersecurity specialization, the founder has extensive experience as a software developer. The CSAD architecture was built by someone who:
- designs secure applications and infrastructures themselves;
- implements complex analysis and verification chains;
- works with controllable and verifiable code structures.
This combination of academic knowledge and practical software development forms the foundation of CSAD.
No access, no interpretation
Cybersecurity AD provides infrastructure, not judgment. The data remains technically bounded, legally neutral, and entirely under control of the user.