{"id":2337,"date":"2025-12-11T10:50:01","date_gmt":"2025-12-11T09:50:01","guid":{"rendered":"https:\/\/digitalespurensicherung.org\/home\/"},"modified":"2026-03-17T16:48:28","modified_gmt":"2026-03-17T15:48:28","slug":"home","status":"publish","type":"page","link":"https:\/\/digitalespurensicherung.org\/en\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2337\" class=\"elementor elementor-2337 elementor-9\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-751210c e-flex e-con-boxed e-con e-parent\" data-id=\"751210c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_link&quot;:&quot;https:\\\/\\\/assets.mixkit.co\\\/videos\\\/47321\\\/47321-720.mp4&quot;,&quot;background_play_on_mobile&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-background-video-container\">\n\t\t\t\t\t\t\t<video class=\"elementor-background-video-hosted\" role=\"presentation\" autoplay muted playsinline loop><\/video>\n\t\t\t\t\t<\/div><div class=\"elementor-element elementor-element-29d244d e-con-full e-flex e-con e-child\" data-id=\"29d244d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f0aa8f9 elementor-widget elementor-widget-heading\" data-id=\"f0aa8f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Digital forensics you can trust<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e474e1 elementor-widget elementor-widget-text-editor\" data-id=\"6e474e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Precise, secure, and court-admissible investigations in IT forensics, mobile forensics, and vehicle screening\u2014carried out using certified methods, state-of-the-art forensic equipment, and the highest level of confidentiality.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f14af71 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"f14af71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/digitalespurensicherung.org\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Legally compliant forensics<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4fbb7f5 e-flex e-con-boxed e-con e-parent\" data-id=\"4fbb7f5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8b2cffd e-con-full e-flex e-con e-child\" data-id=\"8b2cffd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-51d4f4f e-con-full e-flex e-con e-child\" data-id=\"51d4f4f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4be2a5f elementor-widget elementor-widget-image\" data-id=\"4be2a5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"784\" height=\"1186\" src=\"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2026\/02\/Untitled-design-11.jpg\" class=\"attachment-full size-full wp-image-2739\" alt=\"\" srcset=\"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2026\/02\/Untitled-design-11.jpg 784w, https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2026\/02\/Untitled-design-11-198x300.jpg 198w, https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2026\/02\/Untitled-design-11-677x1024.jpg 677w, https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2026\/02\/Untitled-design-11-768x1162.jpg 768w\" sizes=\"(max-width: 784px) 100vw, 784px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c2f88c e-con-full e-flex e-con e-child\" data-id=\"0c2f88c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d81ce34 premium-adv-carousel__vertical premium-adv-carousel__infinite elementor-widget elementor-widget-premium-media-wheel\" data-id=\"d81ce34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-media-wheel.default\">\n\t\t\t\t\t\t\t<div class=\"premium-adv-carousel-no-lightbox premium-adv-carousel__container\" data-settings=\"{&quot;type&quot;:&quot;infinite&quot;,&quot;scroll&quot;:false,&quot;speed&quot;:50,&quot;pauseOnHover&quot;:false,&quot;dir&quot;:&quot;vertical&quot;,&quot;reverse&quot;:&quot;reverse&quot;,&quot;renderEvent&quot;:&quot;scroll&quot;}\">\r\n\r\n\t\t\t<div style=\"visibility:hidden;\" class=\"premium-adv-carousel__inner-container\">\r\n\r\n\t\t\t\t<div class=\"premium-adv-carousel__items\">\r\n\r\n\t\t\t\t\t\t\t\t<div class=\"premium-adv-carousel__item-outer-wrapper\">\r\n\t\t\t\t<div class=\"elementor-repeater-item-1c891d5 premium-adv-carousel__item premium-adv-carousel__item-image\">\r\n\t\t\t\t\t<div class=\"premium-adv-carousel__media-wrap\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/shape-42.png\" alt=\"shape-42\" class=\"premium-adv-carousel__item-img \">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"premium-adv-carousel__item-outer-wrapper\">\r\n\t\t\t\t<div class=\"elementor-repeater-item-befa739 premium-adv-carousel__item premium-adv-carousel__item-image\">\r\n\t\t\t\t\t<div class=\"premium-adv-carousel__media-wrap\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/shape-42.png\" alt=\"shape-42\" class=\"premium-adv-carousel__item-img \">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"premium-adv-carousel__item-outer-wrapper\">\r\n\t\t\t\t<div class=\"elementor-repeater-item-fafd3c0 premium-adv-carousel__item premium-adv-carousel__item-image\">\r\n\t\t\t\t\t<div class=\"premium-adv-carousel__media-wrap\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/shape-42.png\" alt=\"shape-42\" class=\"premium-adv-carousel__item-img \">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"premium-adv-carousel__item-outer-wrapper\">\r\n\t\t\t\t<div class=\"elementor-repeater-item-2ef064a premium-adv-carousel__item premium-adv-carousel__item-image\">\r\n\t\t\t\t\t<div class=\"premium-adv-carousel__media-wrap\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/shape-42.png\" alt=\"shape-42\" class=\"premium-adv-carousel__item-img \">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0f58d3c e-con-full e-flex e-con e-child\" data-id=\"0f58d3c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3541b66 elementor-widget elementor-widget-heading\" data-id=\"3541b66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WHO WE ARE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d48f499 elementor-widget elementor-widget-heading\" data-id=\"d48f499\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Specialists in digital forensics and professional counter-surveillance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e529fd5 elementor-widget elementor-widget-text-editor\" data-id=\"e529fd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"102\" data-end=\"508\">We are a specialized company for digital forensics and counter-surveillance, committed to clarifying digital matters precisely, transparently, and under strict confidentiality. Our work is based on certified investigative procedures and the use of modern forensic tools to obtain robust results in IT forensics, mobile forensics, and counter-surveillance. <\/p><p data-start=\"510\" data-end=\"877\">The identification, preservation, and analysis of digital evidence is carried out according to clearly defined and standardized processes. Whether it involves the forensic examination of IT systems, mobile devices, or the protection of sensitive information, we consistently ensure the highest accuracy, transparency, and legal admissibility. <\/p><p data-start=\"879\" data-end=\"1171\">With short response times and a working approach consistently aligned with the client, we support private individuals, companies, and legal professionals in obtaining reliable findings, making well-founded decisions, and effectively addressing digital risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89f2c5a elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"89f2c5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/digitalespurensicherung.org\/en\/about-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More information<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-68c9ab6 e-flex e-con-boxed e-con e-parent\" data-id=\"68c9ab6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-611babd e-con-full e-flex e-con e-child\" data-id=\"611babd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f82b793 elementor-widget elementor-widget-heading\" data-id=\"f82b793\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our core services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f38642c elementor-widget elementor-widget-heading\" data-id=\"f38642c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our digital forensics services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33a423e elementor-widget elementor-widget-text-editor\" data-id=\"33a423e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"766\" data-end=\"927\">Precise forensic expertise in IT forensics, mobile forensics, and counter-surveillance\u2014for confidential and legally robust results.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b4e6ad3 e-con-full e-flex e-con e-child\" data-id=\"b4e6ad3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d2bb0cc e-con-full e-flex e-con e-child\" data-id=\"d2bb0cc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8df1f15 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"8df1f15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/Untitled-design-16.png\" class=\"attachment-full size-full wp-image-2346\" alt=\"\" srcset=\"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/Untitled-design-16.png 500w, https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/Untitled-design-16-300x300.png 300w, https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/Untitled-design-16-150x150.png 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">IT Forensics<\/h3><p class=\"elementor-image-box-description\">Through forensic analysis of IT systems, networks, and cloud platforms, we provide robust findings to clarify digital incidents\u2014precise, confidential, and legally compliant.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3504440 elementor-widget elementor-widget-button\" data-id=\"3504440\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/digitalespurensicherung.org\/it-forensics\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-arrow-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9164ae9 e-con-full e-flex e-con e-child\" data-id=\"9164ae9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b2357bb elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"b2357bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/Untitled-design-18.png\" class=\"attachment-full size-full wp-image-2348\" alt=\"\" srcset=\"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/Untitled-design-18.png 500w, https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/Untitled-design-18-300x300.png 300w, https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/Untitled-design-18-150x150.png 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Mobile Forensics<\/h3><p class=\"elementor-image-box-description\">Through precise forensic analysis of mobile data, we provide robust and confidential findings to clarify digital matters.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca3380c elementor-widget elementor-widget-button\" data-id=\"ca3380c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/digitalespurensicherung.org\/en\/mobile-forensics\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-arrow-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-be92d3d e-con-full e-flex e-con e-child\" data-id=\"be92d3d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1100109 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"1100109\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/Untitled-design-19.png\" class=\"attachment-full size-full wp-image-2349\" alt=\"\" srcset=\"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/Untitled-design-19.png 500w, https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/Untitled-design-19-300x300.png 300w, https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/Untitled-design-19-150x150.png 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Data Recovery<\/h3><p class=\"elementor-image-box-description\">With precise analysis and recovery methods, we support the reliable recovery of critical data from complex digital environments.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1bd59a elementor-widget elementor-widget-button\" data-id=\"d1bd59a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/digitalespurensicherung.org\/en\/data-recovery\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-arrow-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e15932 e-flex e-con-boxed e-con e-parent\" data-id=\"5e15932\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bb752c4 e-con-full e-flex e-con e-child\" data-id=\"bb752c4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a517c75 elementor-widget elementor-widget-heading\" data-id=\"a517c75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How we work<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-239eeb6 elementor-widget elementor-widget-heading\" data-id=\"239eeb6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Precision at every step<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff10e6b elementor-widget elementor-widget-text-editor\" data-id=\"ff10e6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"785\" data-end=\"962\">By combining secure data acquisition, precise analysis, and clear reporting, we deliver reliable forensic findings.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4e846d elementor-widget elementor-widget-html\" data-id=\"d4e846d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div>\n\n\n    <meta charset=\"UTF-8\">\n    <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">\n    <title>Dynamic Progress Steps<\/title>\n\n    <!-- Google Font: Poppins -->\n    <link href=\"https:\/\/fonts.googleapis.com\/css2?family=Poppins:wght@400;500;600&amp;display=swap\" rel=\"stylesheet\">\n\n    <style>\n\n        * {\n            font-family: 'Poppins', sans-serif;\n        }\n\n        .progress-container {\n            display: flex;\n            align-items: center;\n            position: relative;\n            width: 100%;\n            margin-bottom: 30px;\n        }\n\n        .progress-bar {\n            position: absolute;\n            top: 15px;\n            left: 0;\n            width: 100%;\n            height: 2px;\n            background: repeating-linear-gradient(\n                90deg,\n                #d3d3d3 0,\n                #d3d3d3 10px,\n                transparent 10px,\n                transparent 20px\n            );\n        }\n\n        .step-container {\n            display: flex;\n            gap: 20px;\n            width: 100%;\n        }\n\n        .step {\n            cursor: pointer;\n            text-align: left;\n            margin-top: 20px;\n            padding: 40px 20px;\n            width: 33%;\n            background-color: #F4F6FF;\n            border-radius: 0px;\n            position: relative;\n            transition: background-color 0.3s ease;\n        }\n\n        .step h3 {\n            margin: 0;\n            font-size: 40px;\n            font-weight: 500;\n        }\n\n        .step h5 {\n            padding-top: 10px;\n            font-size: 20px;\n            font-weight: 500;\n        }\n\n        .step p {\n            font-size: 14px;\n        }\n\n        \/* Active Step *\/\n        .step.active {\n            background-color: #000f50;\n            color: #ffffff;\n        }\n\n        .step.active h3,\n        .step.active h5,\n        .step.active p {\n            color: #ffffff;\n        }\n\n        \/* Circles *\/\n        .circle {\n            width: 20px;\n            height: 20px;\n            border-radius: 50%;\n            background-color: #ECEDF4;\n            border: 3px solid #ECEDF4;\n            position: absolute;\n            top: 3px;\n            left: 50%;\n            transform: translateX(-50%);\n            transition: all 0.3s ease;\n        }\n\n        \/* Active Circle (reduced shadow) *\/\n        .circle.active {\n            background-color: #000f50;\n            border-color: #000f50;\n            box-shadow: 0 0 4px rgba(0, 15, 80, 0.4);\n            transform: translateX(-50%) scale(1.2);\n        }\n\n        \/* Tablet View *\/\n        @media (max-width: 768px) {\n            .step {\n                padding: 30px 15px;\n            }\n\n            .step h3 {\n                font-size: 35px;\n            }\n\n            .step h5 {\n                font-size: 18px;\n            }\n\n            .step p {\n                font-size: 13px;\n            }\n\n            .circle {\n                width: 18px;\n                height: 18px;\n                top: 5px;\n            }\n\n            .progress-bar {\n                top: 12px;\n            }\n        }\n\n        \/* Mobile View *\/\n        @media (max-width: 468px) {\n\n            .progress-container {\n                flex-direction: column;\n                align-items: flex-start;\n            }\n\n            .progress-bar {\n                top: 0;\n                left: 20px;\n                width: 2px;\n                height: 100%;\n                background-color: #000f50;\n            }\n\n            .circle {\n                width: 26px;\n                height: 26px;\n                left: 5px;\n            }\n\n            .step-container {\n                flex-direction: column;\n                gap: 20px;\n                margin-top: 20px;\n            }\n\n            .step {\n                width: 100%;\n                background-color: #f9f9f9;\n                border-radius: 10px;\n                box-shadow: 0 2px 5px rgba(0,0,0,0.08);\n                padding: 15px;\n            }\n\n            .step h3 {\n                font-size: 20px;\n                color: #000;\n            }\n\n            .step p {\n                font-size: 14px;\n                color: #555;\n            }\n        }\n        \n        \/* Hover animation for step *\/\n.step:hover {\n    background-color: #000f50;\n    color: #ffffff;\n}\n\n\/* Text color on hover *\/\n.step:hover h3,\n.step:hover h5,\n.step:hover p {\n    color: #ffffff;\n}\n\n\/* Hover \u2192 affect corresponding circle *\/\n.step:hover ~ .progress-container .circle {\n    background-color: #000f50;\n}\n\n    <\/style>\n\n\n\n    <div class=\"progress-container\">\n        <div class=\"progress-bar\"><\/div>\n        <div class=\"circle active\" style=\"left: 16.66%;\"><\/div>\n        <div class=\"circle\" style=\"left: 50%;\"><\/div>\n        <div class=\"circle\" style=\"left: 83.33%;\"><\/div>\n    <\/div>\n\n    <div class=\"step-container\">\n\n        <div class=\"step active\" onclick=\"setActiveStep(0)\">\n            <h3>01<\/h3>\n            <h5>Evidence preservation<\/h5>\n            <p>All relevant digital data is collected and preserved in a forensically sound manner using certified forensic tools.<\/p>\n        <\/div>\n\n        <div class=\"step\" onclick=\"setActiveStep(1)\">\n            <h3>02<\/h3>\n            <h5>In-depth expert analysis<\/h5>\n            <p>Our experts evaluate the data with precision to determine clear and traceable findings.\n\nThe data is analyzed by our specialists with great care to derive robust results and clear conclusions.<\/p>\n        <\/div>\n\n        <div class=\"step\" onclick=\"setActiveStep(2)\">\n            <h3>03<\/h3>\n            <h5>Traceable forensic reporting<\/h5>\n            <p>We prepare concise, confidential, and legally robust investigation reports.\nWe place particular emphasis on a structured presentation and traceable documentation of the results.<\/p>\n        <\/div>\n\n    <\/div>\n\n    <script>\n        function setActiveStep(stepIndex) {\n            const steps = document.querySelectorAll(\".step\");\n            const circles = document.querySelectorAll(\".circle\");\n\n            steps.forEach((step, index) => {\n                step.classList.toggle(\"active\", index === stepIndex);\n                circles[index].classList.toggle(\"active\", index === stepIndex);\n            });\n        }\n    <\/script>\n\n\n\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2ab4aa3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2ab4aa3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_link&quot;:&quot;https:\\\/\\\/assets.mixkit.co\\\/videos\\\/21610\\\/21610-720.mp4&quot;,&quot;background_play_on_mobile&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-background-video-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<video class=\"elementor-background-video-hosted\" role=\"presentation\" autoplay muted playsinline loop><\/video>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6fbd34f\" data-id=\"6fbd34f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f315d2c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f315d2c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-a9ae954\" data-id=\"a9ae954\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c3eeae7 elementor-widget elementor-widget-counter\" data-id=\"c3eeae7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Cases solved<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"500\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">+<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-7dfe865\" data-id=\"7dfe865\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-031e83c elementor-widget elementor-widget-counter\" data-id=\"031e83c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Customer satisfaction<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"98\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">%<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-5905c77\" data-id=\"5905c77\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d93f102 elementor-widget elementor-widget-counter\" data-id=\"d93f102\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Many years of expertise<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"10\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">+<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-a525bda\" data-id=\"a525bda\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fd4dcd0 elementor-widget elementor-widget-counter\" data-id=\"fd4dcd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Support<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"24\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">\/7<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-fedc156 e-flex e-con-boxed e-con e-parent\" data-id=\"fedc156\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e36fa1d e-con-full e-flex e-con e-child\" data-id=\"e36fa1d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eda75f4 elementor-widget elementor-widget-heading\" data-id=\"eda75f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQ \u2013 Frequently asked questions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32d775c elementor-widget elementor-widget-text-editor\" data-id=\"32d775c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Clear answers to frequently asked questions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00a4fd2 elementor-widget elementor-widget-n-accordion\" data-id=\"00a4fd2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6750\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-6750\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> How is the confidentiality of my data and case details ensured? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6750\" class=\"elementor-element elementor-element-62345da e-con-full e-flex e-con e-child\" data-id=\"62345da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ecdca6 elementor-widget elementor-widget-text-editor\" data-id=\"4ecdca6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Yes. All data and case-related information is treated with strict confidentiality. Access to data is restricted exclusively to authorized specialists and is governed by clearly defined internal policies. All investigations are conducted in compliance with applicable legal and technical standards to ensure confidentiality, integrity, and security at all times.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6751\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6751\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> How long does a forensic investigation take? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6751\" class=\"elementor-element elementor-element-12440db e-con-full e-flex e-con e-child\" data-id=\"12440db\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f2ea1a elementor-widget elementor-widget-text-editor\" data-id=\"2f2ea1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The duration of a forensic investigation depends on the scope and complexity of the respective case, in particular on the type of systems to be examined, the volume of data, and the specific questions involved. In many cases, initial results can be provided at short notice, while comprehensive analyses may take several days or weeks. We provide transparent information about the timeframe at the start of the investigation.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6752\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6752\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What types of digital evidence can be recovered from computers or servers? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6752\" class=\"elementor-element elementor-element-2b43fbb e-con-full e-flex e-con e-child\" data-id=\"2b43fbb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-73c8263 elementor-widget elementor-widget-text-editor\" data-id=\"73c8263\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>As part of an IT forensic investigation, various types of digital evidence can be preserved and analyzed. This includes, among other things, files and documents, emails, system and access logs, user activities, timestamps, internet and network data, as well as deleted or damaged content. The specific scope of recoverable evidence depends on the condition of the systems, the infrastructure in use, and the objective of the investigation.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6753\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6753\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Can deleted messages or media files be recovered from a mobile phone? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6753\" class=\"elementor-element elementor-element-b20ce18 e-con-full e-flex e-con e-child\" data-id=\"b20ce18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8749161 elementor-widget elementor-widget-text-editor\" data-id=\"8749161\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>In many cases, this is possible. Using forensic methods, deleted messages, images, videos, as well as location and movement data can be reconstructed from mobile devices, provided the relevant storage areas have not been overwritten. The success of the recovery depends, among other things, on the device type, the operating system, the time of deletion, and user behavior after deletion. A reliable assessment is usually possible after an initial forensic analysis.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6754\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6754\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Can mobile devices be forensically examined for the presence of spyware or surveillance software? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6754\" class=\"elementor-element elementor-element-d72b272 e-con-full e-flex e-con e-child\" data-id=\"d72b272\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb95b5b elementor-widget elementor-widget-text-editor\" data-id=\"cb95b5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex flex-col text-sm pb-25\"><article class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" tabindex=\"-1\" data-turn-id=\"7f608934-197b-47dd-916f-fc8dbd093a92\" data-testid=\"conversation-turn-156\" data-scroll-anchor=\"true\" data-turn=\"assistant\"><div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] @w-sm\/main:[--thread-content-margin:--spacing(6)] @w-lg\/main:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\" tabindex=\"-1\"><div class=\"flex max-w-full flex-col grow\"><div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;]:mt-1\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"f326f012-e4b8-49ae-827f-76841c821d87\" data-message-model-slug=\"gpt-5-2\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[1px]\"><div class=\"markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling\"><p data-start=\"121\" data-end=\"689\" data-is-last-node=\"\" data-is-only-node=\"\">Yes. Mobile devices can be specifically analyzed as part of a forensic investigation for the presence of spyware or surveillance software. This includes evaluating system files, installed applications, configuration changes, network connections, and suspicious activities. Depending on the device type, operating system, and extent of manipulation, indications of unauthorized surveillance measures can be identified. A reliable assessment is usually possible after a structured forensic analysis.    <\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/article><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a08803 e-flex e-con-boxed e-con e-parent\" data-id=\"6a08803\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-afa97fe e-con-full e-flex e-con e-child\" data-id=\"afa97fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3200d0e e-con-full e-flex e-con e-child\" data-id=\"3200d0e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e49eeea elementor-widget elementor-widget-heading\" data-id=\"e49eeea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Initiate your forensic investigation today<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-259a563 elementor-widget elementor-widget-text-editor\" data-id=\"259a563\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tOur experts provide fast, discreet, and reliable forensic analysis tailored to your organization&#8217;s specific requirements. Whether you are responding to a security incident, investigating data breaches, or securing digital evidence\u2014we deliver precise insights that help you take the right actions quickly and securely. \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be453a2 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"be453a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/digitalespurensicherung.org\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact us now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-58a88a7 e-con-full e-flex e-con e-child\" data-id=\"58a88a7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f57f34 elementor-widget elementor-widget-metform\" data-id=\"0f57f34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"metform.default\">\n\t\t\t\t\t<div id=\"mf-response-props-id-361\" data-previous-steps-style=\"\" data-editswitchopen=\"\" data-response_type=\"alert\" data-erroricon=\"fas fa-exclamation-triangle\" data-successicon=\"fas fa-check\" data-messageposition=\"top\" class=\"   mf-scroll-top-no\">\n\t\t<div class=\"formpicker_warper formpicker_warper_editable\" data-metform-formpicker-key=\"361\" >\n\t\t\t\t\n\t\t\t<div class=\"mf-widget-container\">\n\t\t\t\t\r\n\t\t<div\r\n\t\t\tid=\"metform-wrap-0f57f34-361\"\r\n\t\t\tclass=\"mf-form-wrapper\"\r\n\t\t\tdata-form-id=\"361\"\r\n\t\t\tdata-action=\"https:\/\/digitalespurensicherung.org\/en\/wp-json\/metform\/v1\/entries\/insert\/361\"\r\n\t\t\tdata-wp-nonce=\"5d82787cb8\"\r\n\t\t\tdata-form-nonce=\"ef6f45ff08\"\r\n\t\t\tdata-quiz-summery = \"false\"\r\n\t\t\tdata-save-progress = \"false\"\r\n\t\t\tdata-form-type=\"general-form\"\r\n\t\t\tdata-stop-vertical-effect=\"\"\r\n\t\t\t><\/div>\r\n\r\n\r\n\t\t<!----------------------------- \r\n\t\t\t* controls_data : find the the props passed indie of data attribute\r\n\t\t\t* props.SubmitResponseMarkup : contains the markup of error or success message\r\n\t\t\t* https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/JavaScript\/Reference\/Template_literals\r\n\t\t--------------------------- -->\r\n\r\n\t\t\t\t<script type=\"text\/mf\" class=\"mf-template\">\r\n\t\t\tfunction controls_data (value){\r\n\t\t\t\tlet currentWrapper = \"mf-response-props-id-361\";\r\n\t\t\t\tlet currentEl = document.getElementById(currentWrapper);\r\n\t\t\t\t\r\n\t\t\t\treturn currentEl ? currentEl.dataset[value] : false\r\n\t\t\t}\r\n\r\n\r\n\t\t\tlet is_edit_mode = '' ? true : false;\r\n\t\t\tlet message_position = controls_data('messageposition') || 'top';\r\n\r\n\t\t\t\r\n\t\t\tlet message_successIcon = controls_data('successicon') || '';\r\n\t\t\tlet message_errorIcon = controls_data('erroricon') || '';\r\n\t\t\tlet message_editSwitch = controls_data('editswitchopen') === 'yes' ? true : false;\r\n\t\t\tlet message_proClass = controls_data('editswitchopen') === 'yes' ? 'mf_pro_activated' : '';\r\n\t\t\t\r\n\t\t\tlet is_dummy_markup = is_edit_mode && message_editSwitch ? true : false;\r\n\r\n\t\t\t\r\n\t\t\treturn html`\r\n\t\t\t\t<form\r\n\t\t\t\t\tclassName=\"metform-form-content\"\r\n\t\t\t\t\tref=${parent.formContainerRef}\r\n\t\t\t\t\tonSubmit=${ validation.handleSubmit( parent.handleFormSubmit ) }\r\n\t\t\t\t\r\n\t\t\t\t\t>\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t\t${is_dummy_markup ? message_position === 'top' ?  props.ResponseDummyMarkup(message_successIcon, message_proClass) : '' : ''}\r\n\t\t\t\t\t${is_dummy_markup ? ' ' :  message_position === 'top' ? props.SubmitResponseMarkup`${parent}${state}${message_successIcon}${message_errorIcon}${message_proClass}` : ''}\r\n\r\n\t\t\t\t\t<!--------------------------------------------------------\r\n\t\t\t\t\t*** IMPORTANT \/ DANGEROUS ***\r\n\t\t\t\t\t${html``} must be used as in immediate child of \"metform-form-main-wrapper\"\r\n\t\t\t\t\tclass otherwise multistep form will not run at all\r\n\t\t\t\t\t---------------------------------------------------------->\r\n\r\n\t\t\t\t\t<div className=\"metform-form-main-wrapper\" key=${'hide-form-after-submit'} ref=${parent.formRef}>\r\n\t\t\t\t\t${html`\r\n\t\t\t\t\t\t\t\t<div data-elementor-type=\"wp-post\" key=\"2\" data-elementor-id=\"361\" className=\"elementor elementor-361\" data-elementor-post-type=\"metform-form\">\n\t\t\t\t<div className=\"elementor-element elementor-element-d73ac51 e-flex e-con-boxed e-con e-parent\" data-id=\"d73ac51\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div className=\"e-con-inner\">\n\t\t\t\t<div className=\"elementor-element elementor-element-c27eefd elementor-widget__width-inherit elementor-widget elementor-widget-mf-listing-fname\" data-id=\"c27eefd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;mf_input_name&quot;:&quot;mf-listing-fname&quot;}\" data-widget_type=\"mf-listing-fname.default\">\n\t\t\t\t\t\n\t\t<div className=\"mf-input-wrapper\">\n\t\t\t\n\t\t\t<input type=\"text\" className=\"mf-input \" id=\"mf-input-text-c27eefd\" \n\t\t\t\tname=\"mf-listing-fname\" \n\t\t\t\tplaceholder=\"${ parent.decodeEntities(`Nachname`) } \"\n\t\t\t\tonInput=${ parent.handleChange }\n\n\t\t\t\t\t\t\t\t\taria-invalid=${validation.errors['mf-listing-fname'] ? 'true' : 'false'}\n\t\t\t\t\tref=${ el => parent.activateValidation({\"message\":\"This field is required.\",\"minLength\":1,\"maxLength\":\"\",\"type\":\"none\",\"required\":false,\"expression\":\"null\"}, el) }\n\t\t\t\t\t\t\t\/>\n\n\t\t\t\t\t\t\t<${validation.ErrorMessage}\n\t\t\t\t\terrors=${validation.errors}\n\t\t\t\t\tname=\"mf-listing-fname\"\n\t\t\t\t\tas=${html`<span className=\"mf-error-message\"><\/span>`}\n\t\t\t\t\t\/>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div className=\"elementor-element elementor-element-132d844 elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-mf-telephone\" data-id=\"132d844\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;mf_input_name&quot;:&quot;mf-telephone&quot;}\" data-widget_type=\"mf-telephone.default\">\n\t\t\t\t\t\n\t\t<div className=\"mf-input-wrapper\">\n\t\t\t\n\t\t\t<input\n\t\t\t\ttype=\"tel\"\n\t\t\t\tclassName=\"mf-input \"\n\t\t\t\tid=\"mf-input-telephone-132d844\" \n\t\t\t\tname=\"mf-telephone\"\n\t\t\t\tplaceholder=\"${ parent.decodeEntities(`Telefonnummer`) } \"\n\t\t\t\t\t\t\t\t\tonInput=${parent.handleChange}\n\t\t\t\t\taria-invalid=${validation.errors['mf-telephone'] ? 'true' : 'false'}\n\t\t\t\t\tref=${el => parent.activateValidation({\"message\":\"This field is required.\",\"minLength\":1,\"maxLength\":\"\",\"type\":\"none\",\"required\":false,\"expression\":\"null\"}, el)}\n\t\t\t\t\t\t\t\t\/>\n\t\t\t\n\t\t\t\t\t\t\t<${validation.ErrorMessage}\n\t\t\t\t\terrors=${validation.errors}\n\t\t\t\t\tname=\"mf-telephone\"\n\t\t\t\t\tas=${html`<span className=\"mf-error-message\"><\/span>`}\n\t\t\t\t\t\/>\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div className=\"elementor-element elementor-element-51204b1 elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-mf-email\" data-id=\"51204b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;mf_input_name&quot;:&quot;E-Mail&quot;}\" data-widget_type=\"mf-email.default\">\n\t\t\t\t\t\r\n\t\t<div className=\"mf-input-wrapper\">\r\n\t\t\t\r\n\t\t\t<input \r\n\t\t\t\ttype=\"email\" \r\n\t\t\t\t \r\n\t\t\t\tdefaultValue=\"\" \r\n\t\t\t\tclassName=\"mf-input \" \r\n\t\t\t\tid=\"mf-input-email-51204b1\" \r\n\t\t\t\tname=\"E-Mail\" \r\n\t\t\t\tplaceholder=\"${ parent.decodeEntities(`E-Mail Adresse`) } \" \r\n\t\t\t\t \r\n\t\t\t\tonBlur=${parent.handleChange} onFocus=${parent.handleChange} aria-invalid=${validation.errors['E-Mail'] ? 'true' : 'false' } \r\n\t\t\t\tref=${el=> parent.activateValidation({\"message\":\"This field is required.\",\"emailMessage\":\"Please enter a valid Email address\",\"minLength\":1,\"maxLength\":\"\",\"type\":\"none\",\"required\":false,\"expression\":\"null\"}, el)}\r\n\t\t\t\t\t\t\t\/>\r\n\r\n\t\t\t\t\t\t<${validation.ErrorMessage} \r\n\t\t\t\terrors=${validation.errors} \r\n\t\t\t\tname=\"E-Mail\" \r\n\t\t\t\tas=${html`<span className=\"mf-error-message\"><\/span>`}\r\n\t\t\t\/>\r\n\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t<\/div>\n\t\t\t\t<div className=\"elementor-element elementor-element-52d5326 elementor-widget__width-inherit elementor-widget elementor-widget-mf-textarea\" data-id=\"52d5326\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;mf_input_name&quot;:&quot;mf-textarea&quot;}\" data-widget_type=\"mf-textarea.default\">\n\t\t\t\t\t\r\n\t\t<div className=\"mf-input-wrapper\">\r\n\t\t\t\r\n\t\t\t<textarea className=\"mf-input mf-textarea \" id=\"mf-input-text-area-52d5326\"\r\n\t\t\t\tname=\"mf-textarea\" \r\n\t\t\t\tplaceholder=\"${ parent.decodeEntities(`Ihre Nachricht`) } \"\r\n\t\t\t\tcols=\"30\" rows=\"10\"\r\n\t\t\t\t\t\t\t\t\tonInput=${ parent.handleChange }\r\n\t\t\t\t\taria-invalid=${validation.errors['mf-textarea'] ? 'true' : 'false'}\r\n\t\t\t\t\tref=${ el => parent.activateValidation({\"message\":\"This field is required.\",\"minLength\":1,\"maxLength\":\"\",\"type\":\"none\",\"required\":false,\"expression\":\"null\"}, el)}\r\n\t\t\t\t\t\t\t\t><\/textarea>\r\n\r\n\t\t\t\t\t\t\t<${validation.ErrorMessage}\r\n\t\t\t\t\terrors=${validation.errors}\r\n\t\t\t\t\tname=\"mf-textarea\"\r\n\t\t\t\t\tas=${html`<span className=\"mf-error-message\"><\/span>`}\r\n\t\t\t\t\t\/>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div className=\"elementor-element elementor-element-babac42 elementor-widget elementor-widget-mf-checkbox\" data-id=\"babac42\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;mf_input_name&quot;:&quot;mf-checkbox&quot;,&quot;mf_input_list&quot;:[{&quot;mf_input_option_text&quot;:&quot;Ich habe die Datenschutzerkl\\u00e4rung zur Kenntnis genommen. Ich stimme zu, dass meine Angaben und Daten zur Beantwortung meiner: Anfrage elektronisch erhoben und gespeichert werden. Hinweis: Sie k\\u00f6nnen Ihre Einwilligung jederzeit f\\u00fcr die Zukunft per E-Mail an die E\\u2014 Mail datenschutz@aqon-intelligence.de widerrufen&quot;,&quot;mf_input_option_value&quot;:&quot;policy&quot;,&quot;_id&quot;:&quot;a720911&quot;,&quot;mf_input_option_status&quot;:&quot;&quot;,&quot;mf_input_option_selected&quot;:&quot;&quot;}]}\" data-widget_type=\"mf-checkbox.default\">\n\t\t\t\t\t\r\n\t\t<div className=\"mf-input-wrapper\">\r\n\t\t\t\r\n\t\t\t<div \r\n\t\t\t\t\t\t\t\t\tref=${el => parent.handleCheckbox(el, 'onLoad')}\r\n\t\t\t\t\t\t\t\t\tclassName=\"mf-checkbox multi-option-input-type\"\r\n\t\t\t\t\tid=\"mf-input-checkbox-babac42\">\r\n\t\t\t\t\t\t\t\t\t<div className=\"mf-checkbox-option \">\r\n\t\t\t\t\t\t<label>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input type=\"checkbox\"\r\n\t\t\t\t\t\t\t\tclassName=\"mf-input mf-checkbox-input \"\r\n\t\t\t\t\t\t\t\tname=\"mf-checkbox\"\r\n\t\t\t\t\t\t\t\tvalue=\"policy\"\r\n\t\t\t\t\t\t\t\tdefaultChecked=\"\"\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tonInput=${ el =>  parent.handleCheckbox(el.target, 'onClick') }\r\n\t\t\t\t\t\t\t\t\taria-invalid=${validation.errors['mf-checkbox'] ? 'true' : 'false'}\r\n\t\t\t\t\t\t\t\t\tref=${el => {\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tparent.activateValidation({\"message\":\"This field is required.\",\"minLength\":1,\"maxLength\":\"\",\"type\":\"none\",\"required\":true,\"expression\":\"null\"}, el)}\r\n\t\t\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\/>\r\n\t\t\t\t\t\t\t<span>\r\n\t\t\t\t\t\t\t\t${ parent.decodeEntities(`Ich habe die Datenschutzerkl\u00e4rung zur Kenntnis genommen. Ich stimme zu, dass meine Angaben und Daten zur Beantwortung meiner: Anfrage elektronisch erhoben und gespeichert werden. Hinweis: Sie k\u00f6nnen Ihre Einwilligung jederzeit f\u00fcr die Zukunft per E-Mail an die E\u2014 Mail datenschutz@aqon-intelligence.de widerrufen`) } \t\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t\t<\/label>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<input type=\"hidden\" name=\"mf-checkbox\" value=\"\" \/>\r\n\r\n\t\t\t\t\t\t\t<${validation.ErrorMessage}\r\n\t\t\t\t\terrors=${validation.errors}\r\n\t\t\t\t\tname=\"mf-checkbox\"\r\n\t\t\t\t\tas=${html`<span className=\"mf-error-message\"><\/span>`}\r\n\t\t\t\t\t\/>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div className=\"elementor-element elementor-element-c65ec09 mf-btn--left elementor-widget elementor-widget-mf-button\" data-id=\"c65ec09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"mf-button.default\">\n\t\t\t\t\t\t\t<div className=\"mf-btn-wraper \" data-mf-form-conditional-logic-requirement=\"\">\r\n\t\t\t\t\t\t\t<button type=\"submit\" className=\"metform-btn metform-submit-btn \" id=\"\">\r\n\t\t\t\t\t<span>${ parent.decodeEntities(`Versenden`) } <\/span>\r\n\t\t\t\t<\/button>\r\n\t\t\t        <\/div>\r\n        \t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t`}\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t${is_dummy_markup ? message_position === 'bottom' ? props.ResponseDummyMarkup(message_successIcon, message_proClass) : '' : ''}\r\n\t\t\t\t\t${is_dummy_markup ? ' ' : message_position === 'bottom' ? props.SubmitResponseMarkup`${parent}${state}${message_successIcon}${message_errorIcon}${message_proClass}` : ''}\r\n\t\t\t\t\r\n\t\t\t\t<\/form>\r\n\t\t\t`\r\n\t\t<\/script>\r\n\r\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b82a0e e-flex e-con-boxed e-con e-parent\" data-id=\"7b82a0e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61b4239 elementor-widget elementor-widget-shortcode\" data-id=\"61b4239\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"> <\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Digital forensics you can trust Precise, secure, and court-admissible investigations in IT forensics, mobile forensics, and vehicle screening\u2014carried out using [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-2337","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Home - AVERIQON RESEARCH UG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digitalespurensicherung.org\/en\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Home - AVERIQON RESEARCH UG\" \/>\n<meta property=\"og:description\" content=\"Digital forensics you can trust Precise, secure, and court-admissible investigations in IT forensics, mobile forensics, and vehicle screening\u2014carried out using [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digitalespurensicherung.org\/en\/\" \/>\n<meta property=\"og:site_name\" content=\"AVERIQON RESEARCH UG\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-17T15:48:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2026\/02\/Untitled-design-11.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"784\" \/>\n\t<meta property=\"og:image:height\" content=\"1186\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/digitalespurensicherung.org\/en\/\",\"url\":\"https:\/\/digitalespurensicherung.org\/en\/\",\"name\":\"Home - AVERIQON RESEARCH UG\",\"isPartOf\":{\"@id\":\"https:\/\/digitalespurensicherung.org\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/digitalespurensicherung.org\/en\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/digitalespurensicherung.org\/en\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2026\/02\/Untitled-design-11.jpg\",\"datePublished\":\"2025-12-11T09:50:01+00:00\",\"dateModified\":\"2026-03-17T15:48:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/digitalespurensicherung.org\/en\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/digitalespurensicherung.org\/en\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/digitalespurensicherung.org\/en\/#primaryimage\",\"url\":\"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2026\/02\/Untitled-design-11.jpg\",\"contentUrl\":\"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2026\/02\/Untitled-design-11.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/digitalespurensicherung.org\/en\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/digitalespurensicherung.org\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/digitalespurensicherung.org\/en\/#website\",\"url\":\"https:\/\/digitalespurensicherung.org\/en\/\",\"name\":\"Quintego IT Forensik\",\"description\":\"IT-Forensik-Abh&ouml;rschutz-Ermittlungsdienst-Videotechnik\",\"publisher\":{\"@id\":\"https:\/\/digitalespurensicherung.org\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/digitalespurensicherung.org\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/digitalespurensicherung.org\/en\/#organization\",\"name\":\"Quintego IT Forensics\",\"url\":\"https:\/\/digitalespurensicherung.org\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/digitalespurensicherung.org\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/Forensic-logo-2-e1764930530809.png\",\"contentUrl\":\"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/Forensic-logo-2-e1764930530809.png\",\"width\":500,\"height\":187,\"caption\":\"Quintego IT Forensics\"},\"image\":{\"@id\":\"https:\/\/digitalespurensicherung.org\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Home - AVERIQON RESEARCH UG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digitalespurensicherung.org\/en\/","og_locale":"en_US","og_type":"article","og_title":"Home - AVERIQON RESEARCH UG","og_description":"Digital forensics you can trust Precise, secure, and court-admissible investigations in IT forensics, mobile forensics, and vehicle screening\u2014carried out using [&hellip;]","og_url":"https:\/\/digitalespurensicherung.org\/en\/","og_site_name":"AVERIQON RESEARCH UG","article_modified_time":"2026-03-17T15:48:28+00:00","og_image":[{"width":784,"height":1186,"url":"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2026\/02\/Untitled-design-11.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/digitalespurensicherung.org\/en\/","url":"https:\/\/digitalespurensicherung.org\/en\/","name":"Home - AVERIQON RESEARCH UG","isPartOf":{"@id":"https:\/\/digitalespurensicherung.org\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digitalespurensicherung.org\/en\/#primaryimage"},"image":{"@id":"https:\/\/digitalespurensicherung.org\/en\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2026\/02\/Untitled-design-11.jpg","datePublished":"2025-12-11T09:50:01+00:00","dateModified":"2026-03-17T15:48:28+00:00","breadcrumb":{"@id":"https:\/\/digitalespurensicherung.org\/en\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digitalespurensicherung.org\/en\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalespurensicherung.org\/en\/#primaryimage","url":"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2026\/02\/Untitled-design-11.jpg","contentUrl":"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2026\/02\/Untitled-design-11.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/digitalespurensicherung.org\/en\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digitalespurensicherung.org\/en\/home\/"},{"@type":"ListItem","position":2,"name":"Home"}]},{"@type":"WebSite","@id":"https:\/\/digitalespurensicherung.org\/en\/#website","url":"https:\/\/digitalespurensicherung.org\/en\/","name":"Quintego IT Forensik","description":"IT-Forensik-Abh&ouml;rschutz-Ermittlungsdienst-Videotechnik","publisher":{"@id":"https:\/\/digitalespurensicherung.org\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digitalespurensicherung.org\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/digitalespurensicherung.org\/en\/#organization","name":"Quintego IT Forensics","url":"https:\/\/digitalespurensicherung.org\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalespurensicherung.org\/en\/#\/schema\/logo\/image\/","url":"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/Forensic-logo-2-e1764930530809.png","contentUrl":"https:\/\/digitalespurensicherung.org\/wp-content\/uploads\/2025\/12\/Forensic-logo-2-e1764930530809.png","width":500,"height":187,"caption":"Quintego IT Forensics"},"image":{"@id":"https:\/\/digitalespurensicherung.org\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/digitalespurensicherung.org\/en\/wp-json\/wp\/v2\/pages\/2337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalespurensicherung.org\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/digitalespurensicherung.org\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/digitalespurensicherung.org\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalespurensicherung.org\/en\/wp-json\/wp\/v2\/comments?post=2337"}],"version-history":[{"count":18,"href":"https:\/\/digitalespurensicherung.org\/en\/wp-json\/wp\/v2\/pages\/2337\/revisions"}],"predecessor-version":[{"id":3681,"href":"https:\/\/digitalespurensicherung.org\/en\/wp-json\/wp\/v2\/pages\/2337\/revisions\/3681"}],"wp:attachment":[{"href":"https:\/\/digitalespurensicherung.org\/en\/wp-json\/wp\/v2\/media?parent=2337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}