The experience derived from thirty years of active work in the ICT and Forensic sector allows me to provide IT consulting services and assistance to companies, law firms, private citizens, and Judicial Authorities in protecting, recovering, acquiring, and analyzing digital information, stored or transmitted through IT systems such as personal computers, servers, mobile devices, external drives, USB drives, CDs, DVDs, CLOUD, and computer networks.
I am an expert in forensic analysis of electronic documentation, files, databases, emails, and instant messaging services (chat). I can identify, recover, and analyze “digital evidence” to determine what happened, when it happened, how it could have happened, and who was involved.
I can perform in-depth analyses using hardware tools for rapid and secure duplication of storage media, and computer applications available on the market or custom-developed, with the aim of presenting facts in court or understanding what is or isn’t present on devices of interest.
I perform digital evidence preservation by securely acquiring online content from the Internet in a documented and legally valid manner, for example (web pages, images, videos, PDFs, chats, webmail, Social Facebook, Instagram, etc.) with “Certified Date” (certified with timestamp) of processed documents. I can provide a legally valid encrypted certified archive of digital evidence that remains valid forever, with the option of producing a DVD.
Compliant with Law 48/2008, IISFA guidelines, and the Budapest Convention on Cybercrime. Source: http://www.parlamento.it/parlam/leggi/08048l.htm
The service is provided in collaboration with the National Partner LegalEYE®. www.legaleye.it
Other forensic activities:
• Analysis, identification, prevention of Computer Crimes and Fraud;
• On-site acquisition of storage media (including as law enforcement auxiliaries);
• Analysis and interpretation of “digital traces” from IT systems;
• Technical consultancy and Expert opinions in digital forensics;
• Recovery of deleted/lost data from hard drives or USB drives;
• Secure data erasure;
• Password recovery;
• Installation and configuration of operating systems (Windows, Linux, and MacOS) and applications;
• Secure configuration of wired and wireless networks;
• Training services on IT security and the use of personal computers and the Internet;
• Identification of potential security risks in systems and processing procedures;
• Support for companies in security and privacy, with compliance to current regulations;
• Prevention/detection of IT theft by external parties, collaborators, employees, managers;
• Protection of intellectual property;
• Protection of business or valuable information;
• Assessment of infrastructure, telecommunications networks, ICT projects and services.
I have a technical laboratory for Digital Forensics consisting of various processing and analysis units equipped with major software and hardware for computer and network investigations, both commercial and open source Linux for computer forensics “DEFT Linux” – 
Autopsy® Open Source digital forensics platform (US Law Enforcement agents)
Marco Moretti Course and Qualification Certificate
Rome IT Analysis Laboratory
The laboratory is equipped with the main forensic acquisition and copying equipment for expert operations. This equipment allows me to extract and duplicate data contained in mass storage devices of any type (hard drives, memory cards, USB drives, etc.) without altering the original evidence in any way, operating in accordance with the Criminal Procedure Code
FRIENDLY LINKS
https://csirt.gov.it/ (Computer Security Incident Response Team – Italy)
http://www.cert.garr.it/
http://www.sicurezzanazionale.gov.it
Postal Police
Scientific Investigations (Ra.C.I.S.)
CLUSIT – Italian Association for IT Security
ONIF – National Digital Forensics Observatory
AIPSI, Italian Association of IT Security Professionals
I.S.S.A Information Systems Security Association











