{"id":3054,"date":"2025-05-21T10:27:28","date_gmt":"2025-05-21T08:27:28","guid":{"rendered":"https:\/\/www.cyberagentur.de\/projects\/forensic-digital-copies-fd\/"},"modified":"2026-03-19T16:46:28","modified_gmt":"2026-03-19T15:46:28","slug":"fd","status":"publish","type":"project","link":"https:\/\/www.cyberagentur.de\/en\/programs\/fd\/","title":{"rendered":"Forensic Digital Copies (FD)"},"content":{"rendered":"  <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n<h3 class=\"wp-block-heading has-text-align-left\">Background<\/h3>\n\n<p>Until now, forensically relevant data has been collected in heterogeneous formats that are difficult to merge. As a result, it is only possible to compare individual pieces of information, such as time stamps or location data, with a great deal of additional effort. The calculation of new information such as gait patterns also requires heterogeneous data to be merged into a standardized data format beforehand.  <\/p>\n\n<h3 class=\"wp-block-heading has-text-align-left\">Aim<\/h3>\n\n<p>The first step of the project is to develop a data format that enables forensically relevant data to be merged. Both analog and digitally collected information such as expert reports, fingerprints, hard disk images and network data are to be taken into account. The new data format should enable all of this data to be directly compared, supplemented and merged. Research will then be carried out into algorithms that can obtain additional information based on the new data format. For example, the gait pattern, including further biometric information, could be calculated from a video recording and an analog footprint.    <\/p>\n\n<h3 class=\"wp-block-heading has-text-align-left\">Disruptive Risk Research<\/h3>\n\n<p>The development of a data format that allows the merging of any forensic data formats represents a very great challenge. It is currently still unclear whether such a generic data format can be realized at all in view of the high heterogeneity of forensic traces and information. As the research process should also consider the legal requirements for forensic applicability, this is a project in the field of high-risk research. Successful completion of the project would therefore represent a major step forward for forensic end users and research institutions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Background Until now, forensically relevant data has been collected in heterogeneous formats that are difficult to merge. As a result, it is only possible to compare individual pieces of information, such as time stamps or location data, with a great deal of additional effort. The calculation of new information such as gait patterns also requires [&hellip;]<\/p>\n","protected":false},"featured_media":2981,"template":"","class_list":["post-3054","project","type-project","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Forensic Digital Copies (FD) - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/fd\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Forensic Digital Copies (FD) - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"Background Until now, forensically relevant data has been collected in heterogeneous formats that are difficult to merge. As a result, it is only possible to compare individual pieces of information, such as time stamps or location data, with a great deal of additional effort. The calculation of new information such as gait patterns also requires [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/programs\/fd\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-19T15:46:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/08\/FD.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2304\" \/>\n\t<meta property=\"og:image:height\" content=\"1792\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/fd\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/fd\\\/\",\"name\":\"Forensic Digital Copies (FD) - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/fd\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/fd\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/FD.jpg\",\"datePublished\":\"2025-05-21T08:27:28+00:00\",\"dateModified\":\"2026-03-19T15:46:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/fd\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/fd\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/fd\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/FD.jpg\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/FD.jpg\",\"width\":2304,\"height\":1792,\"caption\":\"FD\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/fd\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Forensic Digital Copies (FD)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Forensic Digital Copies (FD) - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/programs\/fd\/","og_locale":"en_GB","og_type":"article","og_title":"Forensic Digital Copies (FD) - Cyberagentur","og_description":"Background Until now, forensically relevant data has been collected in heterogeneous formats that are difficult to merge. As a result, it is only possible to compare individual pieces of information, such as time stamps or location data, with a great deal of additional effort. The calculation of new information such as gait patterns also requires [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/programs\/fd\/","og_site_name":"Cyberagentur","article_modified_time":"2026-03-19T15:46:28+00:00","og_image":[{"width":2304,"height":1792,"url":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/08\/FD.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/programs\/fd\/","url":"https:\/\/www.cyberagentur.de\/en\/programs\/fd\/","name":"Forensic Digital Copies (FD) - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/programs\/fd\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/programs\/fd\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2024\/08\/FD.jpg","datePublished":"2025-05-21T08:27:28+00:00","dateModified":"2026-03-19T15:46:28+00:00","breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/programs\/fd\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/programs\/fd\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cyberagentur.de\/en\/programs\/fd\/#primaryimage","url":"\/wp-content\/uploads\/2024\/08\/FD.jpg","contentUrl":"\/wp-content\/uploads\/2024\/08\/FD.jpg","width":2304,"height":1792,"caption":"FD"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/programs\/fd\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"Forensic Digital Copies (FD)"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme\/3054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/project"}],"version-history":[{"count":8,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme\/3054\/revisions"}],"predecessor-version":[{"id":4904,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme\/3054\/revisions\/4904"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media\/2981"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=3054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}