Global Communication Services

Encryption

I have over 28 years of radio communication knowledge. I have worked as a Motorola MR Engineer, CBRS CPI, TSCM Investigator, and as a Public Safety Solutions Analyst for all types of communications projects. I have also provided expert witness services to entities needing a SME. Additionally I have provided FEMA ESF 2 Support which consists of the following:

Emergency Support Function (ESF) #2 – Communications supports the restoration of communications infrastructure, coordinates communications support to response efforts, facilitates the delivery of information to emergency management decision makers, and assists in the stabilization and reestablishment of systems and applications during incidents.

TECHNICAL SURVEILLANCE AND COUNTERMEASURES AND FORENSICS

The quest for illicit intelligence is a never-ending threat; from criminals trying to obtain information for financial gain, to sophisticated state-sponsored adversaries looking for political and military gains. While we do not always know what kind of threats are around us, a robust security policy encompassing physical security, cyber security and protection from electronic surveillance is needed to ensure secrets remain secret. The security of your building, your Sensitive Compartmented Information Facility (SCIF), your private conversations, your plans and secrets can all be compromised by surveillance devices; from small, inexpensive GSM/UMTS bugs to bespoke devices created by state actors.

Collection of Digital Forensics Evidence

Cell phone Digital Forensics

Providing with screenshots of anything found.

Penetration testing

Writing a detailed report

Can give answers to questions asked regarding the case/Forensics study

Can recover deleted files on computers and cell phones.

Recover hidden text messages from any image

Can recover deleted images

Can recover deleted videos

Can recover deleted audio files

Can recover deleted.exe, .mp3, .mp4, .docx, .EO1 and any other types of file

Detailed coverage maps

OS Forensics

Steganography Recovery