Forensic Technical Intelligence

Computer Technical Intelligence:

5Si employs extensive capabilities in the forensic processing, retrieval, and recovery of computer files. Often data there is an attempt to delete or destroy files which can be forensically recovered via various methods. Some of the data but not all of that can be recovered is:

  • E-Mails
  • Online chat logs (forums, Twitter, Facebook, etc.)
  • Full file metadata
  • Windows/Mac applications data
  • Internet and computer data caching
  • Web Search Logs, which may have been lost through hacking (Denial of Service, Malware, Virus, Worm, etc.)
  • Erased or embedded data within a computer network
  • Full computer hard drives
  • Document/image/media/email files

Cellular Telephone and PDA Communications Intelligence:

The exploitation or misuse of computer and communications systems within corporate, business and religious organizations is often the precursor for the collection of information relative to economic espionage, employee adverse risk behavior, as well as related threats to or loss of an organization’s reputation, intellectual property and physical assets.

5Si Technical Specialists are experts in:

  • Tracking and mapping cellular data
  • Reconstructing cellular and PDA communications
  • Mirror imaging cellular telephone and PDA communications
  • Call logs
  • Point-to-point communications
  • Text message history