Cyber | Identity Intelligence (I2) | Intelligence | Thought Leadership | Training

Inflow finds actionable intelligence conducting Identity Intelligence (I2) for the United States Government.


Inflow's team of experts deploy globally to support the U.S. Department of Defense (DoD) and intelligence communities (IC) through identity intelligence (I2) services. Our scientists, engineers, and experts analyze captured materials to prevent and combat terrorism, both in the field and in laboratories. Inflow collects, analyzes, exploits, documents, and reports on all identity attributes and associated technologies, including processing for foreign materials, IEDs, and other weapons. We do this through our unique tradecraft, I2 Cubed, and our modern analysis system, ARES. Our I2 services include:

  • Exploitation

  • Cyber forensics analysis

  • Foreign Materials Exploitation (FME)

  • Biometrics-enabled intelligence (BEI)

  • Forensics-enabled intelligence (FEI)

  • Document and media exploitation (DOMEX)

  • Counter Improvised Explosive Device (CIED)

  • Radio Controlled Improvised Explosive Device (RCIED)

  • Reverse engineering of hardware and software components

  • All-source intelligence analysis of both data and materials

  • ARES software tool for I2 data analysis