Ntrepid understands the need to modernize and streamline the IG Community’s internet-based cyber investigations. Ntrepid appreciates the challenges that exist with the management and collection of digital evidence that is collected throughout the course of investigations. We are confident that your needs will be met through the deployment of Ntrepid’s products, specifically Nfusion and Timestream.
The Mission Challenge
The internet is at the heart of the investigative process in the Offices of Inspectors General (OIG). Unrestricted access to nefarious websites, the dark web, and common open source platforms is crucial for a thorough investigation. To achieve misattribution and disguise the researcher’s digital fingerprint, the OIG commonly uses a dedicated stand-alone laptop operating outside the agency’s network. The laptop is connected to the internet over a discreet commercial WiFi connection. These solutions may protect the agency’s network, but they do not prevent content blockage or misinformation from the target website.
Without rigorous care and operational security (OPSEC), the WiFi can quickly be associated with the agency. Consistently using the same, possibly infected, laptop across multiple investigations jeopardizes the mission.
In such a high-stakes environment, the OIG requires more robust and streamlined solutions with oversight capabilities to examine program performance, financial management matters, and investigate other possible violations of law, regulation, or policy.
Risk of Identification
Investigators are at great risk of accidentally leaking their identity or exposing their investigation using the common method of a dedicated standalone laptop.
This method will protect the agency's network, but consistently using the same, possibly infected, laptop across multiple investigations jeopardizes the investigator's mission
With evidence collection taking place across multiple laptops, there is little to no administrative oversight of the research and analysis taking place in the field. Compilation and examination of evidence is cumbersome, disjointed, and time-consuming.
Data Loss Prevention
The target of an OIG investigation has a vested interest in intercepting the data and evidence being collected.
Without an MA solution, subjects can see who is watching them online and what aspects of their activity are being scrutinized. Knowing this, they can easily change plans, switch identities, or launch a counter-attack. Even if they can’t identify you, your pattern of activity could give you away.
As the designated oversight division of federal and state agencies, the OIG undeniably requires a comprehensive activity audit of each investigation. To ensure that all OIG investigations are meeting these standards, the agency’s MA platform should provide advanced oversight and auditing capabilities.
The Ntrepid Solution
Ntrepid innovates sophisticated tools and technologies for your next set of requirements, not just the current ones. Our annual research and development investment is far higher than industry average. We understand the emerging threats and challenges that the OIG faces, and we are passionate about delivering capabilities that make a difference. One of those capabilities is proven misattribution: the ability to interact on the internet deniably, discreetly, securely, and effectively either anonymously or with false identifiers. Managing a set of dissimilar, integrated tools is not a viable solution; maintenance is disjointed, costs often balloon, and accountability is virtually nonexistent.
Nfusion and Timestream are a cyber power-couple designed specifically to support research and investigative professionals who need to protect their identity, their case, and their organization. With its modular and extensible secure virtual desktop, Nfusion provides a coherent structure that incorporates integrated collection tools and custom applications, including our own timeline analysis and presentation application, Timestream.
To learn more about how Nfusion, coupled with Timestream, is the authority of secure misattributed evidence collection, analysis, and management read our OIG Solution Brief .