The role of CyberSecurity AD

CyberSecurity AD develops and manages technical infrastructure for controlled analysis of digital criminal case files. The service does not include substantive case assessment and no investigative activities.

Legal separation: The infrastructure is designed to make technical findings legally verifiable, not to create or interpret evidence. All interpretation and legal assessment remains exclusively with lawyers.

Legally verifiable means: technically controllable by the defense and the court, without evidentiary assessment or legal qualification.

The core consists of:

1 · CSAD Application

The locally installed CSAD application on the user side.

2 · CSAD Server

A strictly shielded CSAD server environment where specialized AI models are executed in a fixed, controllable chain.

This infrastructure is specifically designed for use in criminal cases and aligns with legal standards and professional requirements within criminal defense practice.

How the CSAD platform works

1 · CSAD application (user side)

The CSAD application is installed locally on desktop or mobile device. The interface is deliberately simple and operates per individual case.

Within the application:

  • the user selects the dataset to be submitted;
  • the user explicitly determines which analysis frameworks are applied;
  • a separate, isolated working environment is created for each case;
  • access is exclusively possible with a personal security key; per user and per case, unique cryptographic key material is used and SHA-512 integrity checks are applied, ensuring that processing is demonstrably shielded and privacy & compliance are maximally safeguarded.

2 · Secure data transfer

Data transfer occurs exclusively via an encrypted, authenticated connection between the CSAD application and the CSAD server environment.

Characteristics:

no cloud storage;
end-to-end encryption;
cryptographic verification via SHA-512;
no connection to the public internet.

CyberSecurity AD has no access whatsoever to the content of submitted data.

3 · Processing of digital case files (AI chain)

Server-side processing is performed by a sequential chain of four specialized AI models. Each model fulfills its own, controllable role; additionally, existing as well as new legal/LegalTech AI models can be connected as Model X to the CSAD chain.

Model 1 – Forensic Data Extraction

This model performs structured extraction of digital source files according to forensic standards.

Function:

  • Identifying and structuring relevant data
  • Checking data consistency and completeness
  • Recording technical metadata
  • Preparing data for further verification

Goal: create a technically reproducible foundation without substantive interpretation.

Model 2 – Technical Verification

This model checks the results of the data extraction for methodological correctness and internal logic.

Function:

  • Testing assumptions and processing steps
  • Checking technical consistency
  • Identifying possible errors or bias
  • Validating applied analysis methods

Goal: increase technical reliability before further legal contextualization.

Model 3 – Jurisprudence Comparison

This model analyzes technical findings in relation to relevant jurisprudence.

Function:

  • Relating technical outcomes to existing case law
  • Identifying legal points of attention
  • Identifying possible defenses or assessment frameworks
  • Structuring findings within relevant legal context

This model does not perform legal assessment and does not draw conclusions. It exclusively reports structured connections between technical findings and existing jurisprudence.

Goal: provide the defense with legally relevant context without normative interpretation.

Model 4 – Technical Reporting

This model structures all validated findings into a clear, legally usable report.

Function:

  • Merging verified data
  • Recording full traceability of analysis steps
  • Presenting technical findings objectively
  • Explicitly documenting reproducibility

The report contains no legal qualifications and no evidentiary assessment.

Goal: generate a technically controllable and legally verifiable final document.

More about the CSAD AI models →

Extensibility
Existing and new legal/LegalTech AI models can be connected as Model X to the CSAD chain, provided they meet the CSAD requirements for isolation, logging and reproducibility.

4 · Feedback and reporting

After completion of the AI analysis, the report is returned via the same secure connection to the CSAD application.

The user receives:

verification data for reproducibility;
a technical report with all validated findings;
full traceability of applied analysis steps.

Access and readability guarantee:

The output (report + associated verification artifacts) is only readable with the same case/user key, or — if configured — with a managed master key for emergency recovery/continuity. Without these key(s), the data remains cryptographically inaccessible.

The report remains locally on the user's device and can be exported or archived according to their own workflows.

Confidentiality & Compliance

CyberSecurity AD ensures:

  • No data sharing with third parties
  • Isolated environment per case
  • No access to case file contents
  • Fully removable after completion
  • Case-specific processing without reuse

The infrastructure is designed in accordance with:

  • applicable law;
  • recognized cybersecurity principles;
  • the NIS2 Directive (Cybersecurity Act 2026);
  • Dutch Bar Association (NOvA) requirements for confidentiality and professional privilege.

Why CyberSecurity AD

CyberSecurity AD was established from technical necessity, not from marketing.

Why CyberSecurity AD?

CyberSecurity AD was designed and developed by P.W. Oldenburger, cum laude transcript in Associate Degree Cybersecurity from the Amsterdam University of Applied Sciences in 2025, with a weighted average of 8.02. With specialization in Artificial Intelligence, cybersecurity, digital forensics and legally verifiable systems, CyberSecurity AD focuses on controllable, reproducible technical infrastructure. Diploma verification is available via a DUO extract.

References:

Deep software engineering background

In addition to his cybersecurity specialization, the founder has extensive experience as a software developer. The CSAD architecture was built by someone who:

  • designs secure applications and infrastructures;
  • implements complex analysis and verification chains;
  • works with controllable and verifiable code structures.

This combination of academic knowledge and practical software development forms the foundation of CSAD.

No access, no interpretation

CyberSecurity AD delivers infrastructure, not judgment. The data remains technically delineated, legally neutral and fully under the user's control.