Steven Gurtner
Welcome to my website. This is where I centralize my journey, projects, and thoughts as I evolve both professionally and personally.
Welcome to my website. This is where I centralize my journey, projects, and thoughts as I evolve both professionally and personally.


My name is Steven Gurtner and I am currently studying forensic science in Switzerland. Having discovered a vast field during my bachelor’s degree and having an interest in IT, I decided to specialize in digital investigations.
At the same time, I cultivate my curiosity through various personal projects, such as developing this website. The goal is not necessarily immediate usefulness, but rather the process of learning and applying the project. Each achievement always brings me more knowledge and experience, which for me is a concrete way to progress independently, combining discovery and efficiency.
Determined to fulfill my military obligations in one go, I opted for 10 consecutive months of service in the field of telecommunications. As a directional wave pioneer, my role consisted of establishing strategic and secure communications in a command support context.
I was also selected to serve as a C1E/D1E driver, which involved transporting troops and equipment throughout my service, further enhancing my driving experience.
During these years, I acquired a range of knowledge that allows me to handle a variety of different cases. Among all the courses I took, some stood out more than others. This is the case for courses on narcotics, firearms, arson, and fingerprint detection.
However, my favorite courses were those that made me discover what I wanted to pursue in my career: from the first programming courses in the first year to digital forensics and the exploitation of digital traces.
In the third year, I wrote a Bachelor thesis titled “Cloud forensic: state of the art”. In this work, I explore what an investigation in a cloud environment entails, its technical and legal implications, before dedicating a section to AWS to detail the means that can be exploited in a real-world situation.