Skip to main content
Extraction and chain of custody of digital evidence
Emails and attachments
Recovery and analysis of deleted information
Analysis of IT system implementations
Counter-expert report on forensic reports
Technical IT consulting in judicial or administrative proceedings
Ratification of the forensic report
Analysis of information leaks in corporate environments
Communications via messaging applications
Certification of the originality of computer files
Blockchain and cryptoassets
Phishing of electronic communications
Artificial intelligence and robotics
Drones