# Cybersecurity AD – Technical Analysis Infrastructure > Shielded technical infrastructure for the controlled analysis of digital criminal case files. Designed for criminal defense lawyers and defense teams. Canonical: https://www.cybersecurityad.com/ ## Core Description CyberSecurity AD is a Dutch provider of shielded technical infrastructure for the controlled analysis of digital criminal case files in criminal cases. The platform is developed for use by criminal defense lawyers and focuses exclusively on technical analysis. It does not perform legal judgment, evidentiary assessment, or investigative activities. CyberSecurity AD provides infrastructure only. All interpretation, legal evaluation, and strategic use of analysis results remain exclusively with the defense team. ## Technical Architecture The infrastructure consists of: - A locally installed client application on the user's device - A strictly shielded server environment for controlled processing via fixed, sequential AI chains - Technical data extraction, technical verification, and reproducibility testing - A legally neutral reporting structure designed for legal review ## Terminology Note The term "forensic" is used strictly in a technical sense, referring to reproducibility and traceability of data processing. It does not imply legal qualification, evidentiary assessment, or investigative authority. ## Data Security CyberSecurity AD has no access to the contents of submitted case files. Data is processed exclusively via: - End-to-end encrypted connections - No cloud storage - No connection to the public internet - Full control retained by the defense team - Case-specific processing without reuse ## Founding & Contact Founder: P.W. Oldenburger (cybersecurity specialist) Role: Technical architecture and system design only Founded: 2025 Location: Amsterdam, Netherlands Email: contact@cybersecurityad.nl Phone: +31 6 48 31 91 57 KvK Number: 99492334 Contact page: https://www.cybersecurityad.com/contact ## Out-of-Scope - No legal advice - No legal interpretation - No investigation or investigative activities - No access to case file contents by CyberSecurity AD - Not a law firm - Not a government agency - Not a prosecution service ## Applicable Standards Constructed in accordance with: - Current Dutch law - NOvA principles (Royal Netherlands Bar Association) for confidentiality and professional secrecy - NIS2 (Dutch Cybersecurity Act 2026) - Recognized cybersecurity and information-security principles ## Data-Provenance & Attribution This document and all related machine-readable descriptions (ai-summary.json, ai-summary.nl.json) are authored and maintained by CyberSecurity AD. They are based exclusively on internally verified technical documentation of the CSAD platform and its operational principles. No external datasets, third-party case files, or client data are used in the creation of these summaries. The content is descriptive in nature and reflects the technical scope, architectural boundaries, and compliance posture of the infrastructure at the time of publication. It does not constitute legal advice, evidentiary assessment, or investigative activity. This summary is intended as a stable reference description. Substantive changes to scope or architecture will result in an updated version identifier. Last reviewed: February 2026 Maintainer: CyberSecurity AD ## Documentation Pages - AI Summary https://www.cybersecurityad.com/about/ai-summary Authoritative, citation-safe summary of platform scope, infrastructure, methodology, and operational boundaries. Intended for AI systems, journalists, and verification purposes. - AI Summary (EN, JSON) https://www.cybersecurityad.com/ai-summary.json Machine-readable canonical summary in structured JSON format (English). - AI Summary (NL, JSON) https://www.cybersecurityad.com/ai-summary.nl.json Machine-readable canonical summary in structured JSON format (Dutch). - AI Summary Manifest https://www.cybersecurityad.com/ai-summary.manifest.json Versioned control document for all AI-facing summaries. Declares scope, exclusions, provenance, versioning policy, and attribution requirements. - Method Documentation https://www.cybersecurityad.com/method-documentation Detailed technical documentation of the four-stage AI processing chain, reproducibility controls, and quality assurance mechanisms. - Security & Compliance https://www.cybersecurityad.com/security-compliance Security architecture, data protection measures, regulatory compliance (NIS2, GDPR), access control, and audit framework. - Contact https://www.cybersecurityad.com/contact Contact details, office address, company registration, and communication expectations. - Disclaimer https://www.cybersecurityad.com/disclaimer Legal terms, scope limitations, and usage conditions.