Social Media Investigations and Computer Forensics
Our social media investigators monitor open sources to mitigate risk, uncover potential threats, gather intelligence from social media and other public sources. By identifying a threat early, we can track the danger if it escalates.
Child Social Media Vulnerability Assessments
Today’s teenagers have a level of social media sophistication that typically surpasses that of most parents. Factor in the hectic schedule that most families deal with and you’re left with a scenario where parents don’t have the time, patience, or knowledge that allows them to monitor their children’s online activities. Fake accounts to hidden chat rooms is an example of a practice parents need to be concerned about. Factor in Virtual Private Networks (VPN) and the “dark web” and you have the perfect environment to exploit a child.
New technologies are facilitating the online sexual exploitation of children, including the live streaming of sexual abuse of children using web cameras or cellphones, often for profit. Mobile devices also provide new and evolving means by which offenders sexually abuse children as apps are being used to target, recruit, and coerce children to engage in sexual activity. Experts believe tens of thousands of children globally are sexually exploited online, and the number appears to be growing. The victims may be boys or girls, ranging from very young children to adolescents, and hailing from all ethnic and socio-economic backgrounds.
We provide our clients with advanced technological services that include of digital forensics of Cell Site Location Information (CSLI), video enhancement, acquisition, preservation, analysis and documentation of electronic evidence stemming from theft, fraud or misconduct for use in investigations and criminal or civil litigation.
We provide expertise in computer hardware, peripherals, operating systems, and applications. Additionally, we offer specialization in uncovering and recovering hidden or deleted data, capturing time and date stamps, identifying Internet sites visited, preserving the evidentiary chain of custody and delivering expert witness testimony.
Social Engineering Testing
Crisis Solutionist will use various social engineering techniques such as phishing, vishing, pretexting, trash pulls, piggybacking, in an attempt to gain access to your most sensitive information. Once our covert efforts have been concluded, we review your existing security protocols and then conduct a “no notice” site inspection looking for security lapses, computers left logged on and unintended, passwords readily accessible, unauthorized storage devices that are attached to the company’s servers, and sensitive documents left left out or not properly destroyed. We will brief your senior staff, president or board of directors and provide a written report outlining the deficiencies found, along with recommendations on how to correct them.
Social Media Monitoring and Analysis
The Crisis Solutionist team has a certified Social Media Intelligence Expert (SMIE), who is up-to-date on open source intelligence monitoring and gathering. We collect information from public sources and social media sites that allows you to consider actionable intelligence when determining what course of action to take. We help identify issues of concern early and monitor known threats for significant changes, allowing you to scale security up or down as deemed appropriate
Technical Surveillance Counter Measures (TSCM)
The more sophisticated technology becomes, the more critical TSCM sweeps become to your business. The potential damage of confidential or proprietary information being stolen or leaked can have devastating consequences to the company. The detection of digital devices used to spy on others and covertly collect data and communications has never been more critical than it is today. This service can be used to trace illegal eavesdropping devices, GPS trackers, and covert camera systems.