What is digital forensics?
Digital forensics is the scientific discipline of identifying, acquiring, preserving, analysing, and reporting on digital evidence in a manner that satisfies legal, regulatory, or internal-investigation requirements. The practice covers a wide range of data sources — mobile devices, computers, servers, cloud accounts, network traffic, image and video — and applies a common standard of documentation and chain of custody across all of them.
What standards do you work to?
Our forensics practice is aligned with ISO/IEC 27037 (digital-evidence identification, collection, acquisition and preservation) and the wider ISO/IEC 27000 family of standards. We document chain of custody, hash-verify every acquisition, and produce reports that meet the evidential standards of European courts. [VERIFY: any current accreditation references to publish]
Which forensics tools do you use?
We are certified across the major forensics platforms — Cellebrite UFED and Premium, OpenText EnCase, Magnet AXIOM, Oxygen Forensics, Amped Authenticate and FIVE, and Exterro FTK among others. Tool choice depends on the case: device population, jurisdiction, time pressure, and the legal posture of the investigation. We will recommend the right combination during scoping. [VERIFY: full current certification list]
Can you handle mobile-device forensics?
Yes — mobile is one of our core forensics specialisations. We have current Cellebrite certifications and run a fully equipped mobile-acquisition lab in the Netherlands. We support both logical and physical acquisitions, including newer iOS and Android device models, and we can perform on-site acquisitions for time-critical or sensitive cases.
What is OSINT and when do you use it?
Open-source intelligence — OSINT — is intelligence collected from publicly available sources. We use OSINT in investigations where subject background, corporate-structure mapping, network relationships, or event reconstruction needs to be built up from public sources. OSINT is non-intrusive — done properly, the subject of an investigation does not know it is happening. We combine custom collection workflows, Maltego, and structured analyst tradecraft.
Can your reports be used as evidence in court?
Yes. Our forensics reports are written to meet the evidential standards of European courts and are routinely used in criminal, civil, and regulatory proceedings. Our practitioners can also give expert-witness testimony where required. We work to the documentation standards expected by national-police digital-evidence units. [VERIFY: number of cases where DataExpert practitioners have given expert-witness testimony]
Do you work directly with law enforcement?
Yes. A meaningful share of our forensics and OSINT work is delivered on instruction from European law-enforcement and regulatory bodies, including the Dutch National Police. We are practised at the protocols and confidentiality regimes those engagements demand, and our practitioners have the security clearances expected of contractors operating in that environment. [VERIFY: specific clearances/levels to publish]
Can DataExpert run an investigation on its own, or only support an internal team?
Both. For some clients we run the full investigation end to end — acquisition, analysis, reporting, and testimony. For others we extend the capacity of an existing internal investigations team. The right shape depends on your in-house capability and the sensitivity of the matter. We will scope honestly in either direction.