[vc_row fullwidth=”true” fullwidth_content=”false” css=”.vc_custom_1552687763120{padding-top: 50px !important;padding-bottom: 50px !important;background-image: url(https://new.acato.org/wp-content/uploads/2019/03/about-us.jpg?id=163) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column width=”5/6″][vc_custom_heading text=”WHO IS ACATO?” font_container=”tag:h2|text_align:left|color:%23ffffff” use_theme_fonts=”yes”][vc_column_text css=”.vc_custom_1552687809360{margin-bottom: 0px !important;}”]ACATO is a German forensics laboratory for digital devices (e.g. hard drives, smartphones, SSD from blackboxes, network infrastructure) based in Munich (Bavaria, Germany).  The special equipment allows the certified forensic experts to go far beyond the abilities of general digital forensics. [/vc_column_text][/vc_column][vc_column width=”1/6″][/vc_column][/vc_row][vc_row][vc_column width=”7/12″][vc_empty_space height=”60px”][mk_fancy_title color_style=”gradient_color” grandient_color_from=”#e5272f” grandient_color_to=”#1375ba” grandient_color_angle=”diagonal_left_top” font_family=”none”]

The reputation of the experts goes beyond the county borders:

[/mk_fancy_title][vc_column_text css=”.vc_custom_1552689437064{margin-bottom: 0px !important;}”]

In 2015 our Chipoff Forensics expert, Christian Bartsch, presented at the Mobile Forensics Summit of the German Central Police (BKA Meckenheim) the newest methodologies for extracting evidence from severely damaged devices such as smartphones and aircraft black boxes. The closed-door event was attended by the best police forensics experts of Germany (80 from police, customs, tax, and homeland security), Austria (2x), Switzerland (3x Zürich) and United Kingdom (3x New Scotland Yard).

[/vc_column_text][vc_column_text css=”.vc_custom_1552689505713{margin-bottom: 0px !important;}”]

In May 2016 our expert was again recommended by the german authority for Security in the information technology (BSI): In Aachen the presentation at the University of applied science attracted police forensics from Germany (LKA NRW, customs, tax investigators) and neigbouring countries (Belguim Police, Police Academy of Netherlands). Also experts from leading audit firms (i.e. E&Y, KPMG, GrantThornton, PwC) came the long way to listen to the newest infos on chipoff forensics which also included different aspects based on newest research.

[/vc_column_text][ultimate_modal btn_size=”block” btn_text=”MAKE THE WORLD A SAFER PLACE” modal_size=”block” modal_style=”overlay-slideup” overlay_bg_opacity=”80″ img_size=”80″]The company has access to over 900 reference devices (cellphones and smartphones) are on site for reseach and shadow copy activities. A specialized drive depot also has parts (Actuator, Heads, Motor, Spindle, PCB) for recovering evidence from damaged hard drives.

Due to the complex and sensitive work, the internal organisation is operating in accordance with ISO 270035-270242. The quality management has been in place since 2011, when the company started building its QM manual based on the ISO9001 standard. This is complemented by the internal Case Management tool “RescueBase” that has all vital information on cases centralized and documented.

The continued effort to improve quality and efficiency has led to the major project to digitalize all parts records so that a search for parts is becoming faster as a wide range of details is in the database and the history of each part is documented.

Furthermore, ACATO GmbH is an enterprise fully owned by Germans citizens and is bound by german privacy laws to keep data of clients confidential. No data is shared with american courts unless the client has requested us to do so. Our digital infrastructure is 100% in our hands and not stored on foreign cloud systems.

Any tool that ACATO develops or provides to a third party is only developed internally. No programming is outsourced to companies abroad. Therefore, source codes never leave the company premises. The testing of tools is done to the best possible level. Nevertheless, we rely on partners abroad to test the tools in real life scenarios (i.e. removing ransomware from computers of italian companies).

Nevertheless, research and development is a process that continues over many years. Even in the field of smartphone forensics our company has sometimes helped other manufacturers with expertise or supplying reference devices for their research. Cooperation in research is a contribution all dedicated forensics experts can do to make the world a safer place.[/ultimate_modal][/vc_column][vc_column width=”5/12″][mk_padding_divider size=”200″ visibility=”hidden-sm”][vc_single_image image=”186″ img_size=”full” add_caption=”yes” alignment=”center” css=”.vc_custom_1552886439966{margin-bottom: 0px !important;}”][/vc_column][/vc_row][vc_row fullwidth=”true” fullwidth_content=”false” css=”.vc_custom_1552692689942{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #f5f5f5 !important;}”][vc_column][mk_fancy_title color_style=”gradient_color” grandient_color_from=”#e5272f” grandient_color_to=”#1375ba” grandient_color_angle=”diagonal_left_top” font_family=”none” align=”center”]

TYPICAL TOPICS OF WORK

[/mk_fancy_title][vc_row_inner][vc_column_inner width=”1/3″][mk_icon_box icon=”mk-icon-check-square-o” title=”Fraud Investigations” text_size=”24″ font_weight=”bold” icon_size=”medium” icon_color=”” icon_circle_color=”” animation=”scale-up”][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square-o” title=”Chipoff Forensics” text_size=”24″ font_weight=”bold” icon_size=”medium” icon_color=”” icon_circle_color=”” animation=”scale-up”][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square-o” title=”Forensic App Research” text_size=”24″ font_weight=”bold” icon_size=”medium” icon_color=”” icon_circle_color=”” animation=”scale-up”][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square-o” title=”Unlocking of devices” text_size=”24″ font_weight=”bold” icon_size=”medium” icon_color=”” icon_circle_color=”” animation=”scale-up”][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square-o” title=”Decrypting of devices” text_size=”24″ font_weight=”bold” icon_size=”medium” icon_color=”” icon_circle_color=”” animation=”scale-up”][/mk_icon_box][/vc_column_inner][vc_column_inner width=”1/3″][mk_icon_box icon=”mk-icon-check-square-o” title=”Anti Ransomware Tools” text_size=”24″ font_weight=”bold” icon_size=”medium” icon_color=”” icon_circle_color=”” animation=”scale-up”][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square-o” title=”Mail Forensics tools” text_size=”24″ font_weight=”bold” icon_size=”medium” icon_color=”” icon_circle_color=”” animation=”scale-up”][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square-o” title=”Court Expert Witness” text_size=”24″ font_weight=”bold” icon_size=”medium” icon_color=”” icon_circle_color=”” animation=”scale-up”][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square-o” title=”Video and Photo forensics” text_size=”24″ font_weight=”bold” icon_size=”medium” icon_color=”” icon_circle_color=”” animation=”scale-up”][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square-o” title=”Suspect identification” text_size=”24″ font_weight=”bold” icon_size=”medium” icon_color=”” icon_circle_color=”” animation=”scale-up”][/mk_icon_box][/vc_column_inner][vc_column_inner width=”1/3″][mk_icon_box icon=”mk-icon-check-square-o” title=”Data Recovery” text_size=”24″ font_weight=”bold” icon_size=”medium” icon_color=”” icon_circle_color=”” animation=”scale-up”][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square-o” title=”Smartphone forensics” text_size=”24″ font_weight=”bold” icon_size=”medium” icon_color=”” icon_circle_color=”” animation=”scale-up”][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square-o” title=”Blackbox forensics” text_size=”24″ font_weight=”bold” icon_size=”medium” icon_color=”” icon_circle_color=”” animation=”scale-up”][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square-o” title=”Cellphone chipoff” text_size=”24″ font_weight=”bold” icon_size=”medium” icon_color=”” icon_circle_color=”” animation=”scale-up”][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square-o” title=”Computer forensics” text_size=”24″ font_weight=”bold” icon_size=”medium” icon_color=”” icon_circle_color=”” animation=”scale-up”][/mk_icon_box][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row fullwidth=”true” fullwidth_content=”false” bg_type=”grad” css=”.vc_custom_1552599167136{padding-top: 50px !important;padding-bottom: 40px !important;}” bg_grad=”background: url(data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjxkZWZzPjxsaW5lYXJHcmFkaWVudCBpZD0iZ3JhZGllbnQiIHgxPSIwJSIgeTE9IjAlIiB4Mj0iMCUiIHkyPSIxMDAlIj48c3RvcCBvZmZzZXQ9IjAlIiBzdHlsZT0ic3RvcC1jb2xvcjojRTUyNzMwOyIgLz48c3RvcCBvZmZzZXQ9IjEwMCUiIHN0eWxlPSJzdG9wLWNvbG9yOiMxMzc0QkE7IiAvPjwvbGluZWFyR3JhZGllbnQ+PC9kZWZzPjxyZWN0IGZpbGw9InVybCgjZ3JhZGllbnQpIiBoZWlnaHQ9IjEwMCUiIHdpZHRoPSIxMDAlIiAvPjwvc3ZnPg==);background: -webkit-gradient(linear, left top, left bottom, color-stop(0%, #E52730), color-stop(100%, #1374BA));background: -moz-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -webkit-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -o-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -ms-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: linear-gradient(100deg,#E52730 0%,#1374BA 100%);”][vc_column width=”2/3″][vc_column_text css=”.vc_custom_1552600091618{margin-bottom: 0px !important;}”]

Contact us for analysis and quote

We offer immediate, 24/7 assistance from our team of digital investigators.[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_btn title=”CREATE CASE” style=”3d” color=”black” align=”center” button_block=”true” link=”url:https%3A%2F%2Fnew.acato.org%2Fcreate-case%2F|title:Create%20Case|target:%20_blank|”][vc_column_text css=”.vc_custom_1552600497951{margin-bottom: 0px !important;}”]

CALL: +49 89 – 54041070

[/vc_column_text][/vc_column][/vc_row]