Big data poses new challenges for investigators and analysts, sometimes even preventing investigations because the volume of data is too overwhelming.  Maldith is a system that enables you to perform automated internet investigations on large and complex datasets.

Computer assisted internet investigation

Maldith is a system that is created to find, analyze, correlate, and visualize large sets of data. Investigations that used to take many man months, can now be finished in only a fraction of that number.


Maldith consists of a client- and a server component. The client component can be used from  almost any web browser, making deployment easy and scalable. The Maldith server is set up to be used only by your organization, and will be installed and configured by your organization.. Only you will have full control over the servers and the queries: no-one else will have knowledge of your investigations or data sers, not even us.

Target group

Maldith is meant to be used by LEA’s and GIA’s that perform internet investigations.It is meant as an answer to the current challenges these organizations face in big data environments.


    Do yo want to know more about Maldith?

    Maldith is available for government agencies only.
    For more information, or for requesting a demonstration, please call: 0031 704 442 887.


    Much of the information that Maldith finds, is available on websites that can also be accessed by the average internet user. One of the advantages of Maldith is, is that every relevant webpage that is found, is automatically searched for other traces that can lead to persons or organizations.  If new traces are found, they can be used as a starting point for continuation of the investigation.

    Online advertisements
    Analyzing and checking online advertisements is very resource-intensive, especially in larger investigations. To win time, and minimize resources, Maldith enables investigators to quickly scan large numbers of advertisements for suspect content.

    Internet services
    Maldith uses standard internet services, that can often offer additional information about organizations and users. It is also possible to use the Maldith infrastructure to access a diverse set of commercial online API services.

    Much of the image material that is offered online contains traces in the form of meta-data. By analyzing this meta-data, Maldith can compare images that have been found, and group them by properties or source. For example, Maldith will try to find all images that have been taken by the same camera or smartphone. In this way, it is possible to reveal hidden links between images, websites, or owners.

    Custom sources
    Often, investigators already have information in their possession that they can use to ratify other data . Using the Maldiths’ ‘Compare’ option ,internal sources can be correlated with information that is offered online.  For example: phone numbers of known companies can be used to filter out bona fide online advertisements. Advertisements using phone numbers that do not belong to a bona fide organization will then get the extra attention of the investigators.


    Fast, uniform results
    New internet sources and -services pop up daily, and it is difficult for investigators to keep up to date. This causes different results with different researches, and missed chances if the investigators have no knowledge of valuable new services. Maldith  uses a standardized set of internet sources, and analyses the results of your queries using algoritms that have proven themselves in the field. This means that, on average, investigators using Maldith will find more valuable information than investigators doing internet investigations by hand. They will also have their results faster, and can more easily sort and visualize their results.

    Forensically sound
    Each piece of information that Maldith finds, is automatically saved in a forensic sound manner.

    Automatically generated reports.
    The smart, built-in report generator enables users to create clear, customizable reports fast. These reports are not dry tables with useless data, but are a chronological story, easily readable by others, where the investigator or analyst can add his or her comments if needed.