LEA & CFS
Artefaktum is supporting law enforcement agencies with case management and investigation and integrating technical investigative tools and technologies.
Artefaktum is supporting law enforcement agencies with case management and investigation and integrating technical investigative tools and technologies.
Artefaktum provides investigation support of cybercrime or large scale international fraud cases, critical technology integration and mission support services to protect and advance Public security priorities and to enable law enforcement collaborate with other government agencies and partner nations for collection and dissemination intelligence and case related information.
General Investigation support
Artefaktum provides criminal investigative support to domestic and foreign law enforcement agencies, tracing and locating fugitives wanted for prosecution or to serve sentences and case-related collection of relevant data from dozens of open sources, social media, and surface, deep and dark web.
CyberCrime
Crypto and Digital Assets Investigation
Investigation into hacks, frauds, scams and market manipulation by identifying, locating and tracing funds on the blockchain, through mixers and across chains.
Financial Investigation Units support
Artefaktum provides actionable evidence and multinational information & data collection and (asset tracing/sanctions enforcement/crypto) crime investigators with the correct services and tools for the job. We help fighting money launderers, terrorist financiers and sanctions evaders through blockchain cutting-edge intelligence.
HighTech Crime Support
Visual Research
Artefaktum offers analysis of data of the surroundings collected from a camera or pictures found on confiscated hardware or face recognition, number plate recognition, augmented and mixed realities, location determination, and identifying objects.
Security Breach Consulting & IRT
Joint Prevention Campaigns
Artefaktum provides ransomware preparedness assessment workshops for public bodies agencies, cities, and hospitals to identify the cyber kill chain; remote access configuration, phishing prevention, email and web protections, access controls and endpoint monitoring and end user awareness
For questions about services, careers, or contracts contact us:
f63d5f63d5