Cyber | Identity Intelligence (I2) | Intelligence | IT & Thought Leadership | Training
Inflow finds actionable intelligence conducting Identity Intelligence (I2) for the United States Government.
Inflow's team of experts deploy globally to support the U.S. Department of Defense (DoD) and intelligence communities (IC) through identity intelligence (I2) services. Our scientists, engineers, and experts analyze captured materials to prevent and combat terrorism, both in the field and in laboratories. Inflow collects, analyzes, exploits, documents, and reports on all identity attributes and associated technologies, including processing for foreign materials, IEDs, and other weapons. We do this through our unique tradecraft, I2 Cubed, and our modern analysis system, ARES. Our I2 services include:
Exploitation
Cyber forensics analysis
Foreign Materials Exploitation (FME)
Biometrics-enabled intelligence (BEI)
Forensics-enabled intelligence (FEI)
Document and media exploitation (DOMEX)
Counter Improvised Explosive Device (CIED)
Radio Controlled Improvised Explosive Device (RCIED)
Reverse engineering of hardware and software components
All-source intelligence analysis of both data and materials
ARES software tool for I2 data analysis