Analysis and Keyword Searching

Our specialized software allows us to locate and recover previously deleted data on computers, Smart phones, cell phones, thumb drives, memory cards, PDAs, iPads and even GPS devices.

Our file carving capabilities can reconnect fragmented files and make them suitable for viewing. We work closely with the client to develop key search terms relevant to your case. We are experienced in refining our searches to exclude similar but unrelated data, thereby reducing your costs.

We can locate and recover chat logs created in popular instant message programs. Many times we can see both sides of the chat.

Our specialized software will re-connect fragmented files so they can be viewed normally. We identify linked files that are responsive to your data search needs. Data carving is accomplished using specialized forensic software.

We identify relevant files and applications and record date and time stamps for date created or date modified.

We can screen shot a target computer and capture a picture of their screen at will or at regular intervals and store those images in a dedicated file.

We will keyword search and flag relevant documents for human review. We can search by subject heading or key words located in the body of the document.

We can locate email activity data and identify sent or received emails including any attachments.

We will examine the operating system registry and log files for records of any changes made to the system. We can determine if system changes were authorized by a user or whether those changes were executed by a virus or malware.

We use specialized software to identify file extension mismatches and flag those files for further investigation. Changing the file extension on a graphic image will prevent that image from being detected in a regular operating system search. We can find file extensions that do not match the file.

We can dig deep into the origination and alterations of document or image files. The metadata in these files can hold valuable information about who, when and where a file was created or modified.

We can install covert GPS tracking devices and monitor movements remotely and in real-time. We offer short term and longer term monitoring and reporting.

We can examine registry and event log data to see what devices or peripherals were connected, inserted or removed in the USB ports.

We can identify Internet visit and search history from all major Internet browsers including Apple, Internet Explorer, Mozilla Firefox and Google Chrome. We can view recent Internet searches and locate recently visited web sites.

We will work with your team to develop key search terms and expressions to search across your databases for responsive information. We will locate and copy relevant documents and images and provide pointers to their original location.

We will search electronic media for graphic or digital images. We can identify efforts to disguise or hide images. We can recover images that have previously been deleted.

We will search drive space that is not currently being used by the operating system but may still contain valuable evidence. This includes previously deleted data which is not accessible by consumer software tools.

We can program specific computers or work stations to block access to any web site you wish. The blocking and filtering can be tailored to your specific needs.
Integrated Security has distinguished themselves as flexible and innovative business partners. Their professional staff and dedication reflect pride and integrity uncommon with other security providers within this industry. Integrated Security Services comes highly recommended as your complete security services provider.
Richard Baumert, Managing Director, Millennium Partners
Integrated Security Services, Inc. was found to be highly responsive to our needs. The individuals assigned to provide security were dedicated professionals, demonstrating complete integrity. Integrated Security Services is highly recommended to meet your security needs.
Fred Lott, Construction Manager, Accor Lodging North America
I am still so impressed with the integrity of these men and I would like them to be commended for a job well done.
Georgia Chavent, MS, RD, Director, Nutrition and Dietetrics Program, University of New Haven