Skip to main content Skip to search

Digital Forensics

Digital evidence

The methodology used for securing and processing digital information has a number of conditions in order to bring it into legal and reliable evidence in court cases. For example, the integrity of the digital evidence must be preserved and the evidence fully reproducible.

The report is the final product of the study and contains a clear management summary and informed conclusion. Of course, the technical findings of our specialists are also part of this report.

Minimize the risks

Following an incident, it is important for several reasons to establish exactly what happened and what caused it. If an incident has to do with personal data, investigation is even required by law under European privacy law. The main rules for the handling of personal data in the Netherlands are laid down in the General Data Protection Regulation (GDPR).

Important questions in the event of an incident are:

  • What is the cause of this incident?
  • How long has this been going on?
  • What systems and what data are involved?
  • Is there intent or negligence?

The importance of digital research

In a highly digitised society, the analysis of digital data is of undeniable importance. In addition to a physical life, most people have a digital life. By collecting and analyzing traces of both identities, a complete picture of one’s doings is created. Digital data provides insight into where someone was located, used means of communication and gain insight into the seriousness of an incident. Digital evidence, obtained correctly, is often decisive in many legal disputes.


Our specialists use modern forensic hardware and software, ensuring the integrity of the evidence. A small selection of the many types of digital forensic services that PSG provides:

  • Computer breach (hacking)
  • Protective attachment
  • Corporate espionage
  • (Cyber) stalking
  • Data Recovery
  • Corporate fraud
  • Data breaches
  • Phishing
  • Et cetera

Depending on the type of research, forensic techniques are used to collect relevant digital evidence. A non-exhaustive list of techniques used are:

  • Data recovery (recovery deleted/deleted files, if not overwritten);
  • Internet history
  • Search terms using
  • Chat history
  • Opened files and directories visited
  • E-mail traffic
  • Cloud environments
  • Usernames, passwords, and tokens
  • Presence encrypted files
  • Presence of child pornography
  • Working memory analysis (RAM)
  • Processes/services
  • Ports
  • Malicious software (malware)
  • Timeline analysis aimed at identifying, for example:
  • Improper access
  • Tools, techniques & procedures (TTPs)
  • Determination of data exfiltration] (size and impact)
  • Connected peripherals (phones and USB devices)
  • And much more!

PSG’s forensic investigators have years of experience in defence, police, Interpol and special investigation services. They are all in possession of a permit granted by the Ministry of Justice and Security for private investigation. In addition, they obtained globally recognized certifications, including:

  • Certified Information Systems Security Professional (CISSP)
  • Certified Information Security Manager (CISM)
  • Certified Computer Examiner (CCE)
  • Encase Certified Examiner (EnCE)
  • Certified Fraud Examiner (CFE)
  • Certified Ethical Hacker (CEH)

Forensic experts from PSG Recherche prove their added value in every investigation. In addition to globally recognized certifications, they have years of experience with the National Investigation Service, Interpol and leading private sector security organizations.

Our experts are real specialists keeping their knowledge up-to-date through ongoing training and training. In this way, they constantly contribute to the high quality level of PSG Recherche.

Privacy instellingen

We gebruiken cookies om ervoor te zorgen dat onze website zo soepel mogelijk draait. In de instellingen kunt u zelf kiezen welke cookies u wilt toestaan of wilt weigeren.

Privacy verklaring | Sluit