Making sense of Security

Trouble online? That's what Labs is for. We are the experts in cyber investigations and clean up. Your peace of mind starts with ISECOM Labs. When it comes to online security, we solve problems.

EXECUTIVE PROTECTION - CORPORATE LOSS CONTROL - LEGAL EVIDENCE COLLECTION - PERSONAL PROTECTION

The experts in solving online problems.
Discrete. Sincere. Advanced.

ISECOM Labs provides advanced technical support for corporate and personal security services specializing in electronic personal protection and privacy, investigations, take-downs, digital clean-up, and asset recovery. 

Over 30 years in cybersecurity research, investigations, and protection. We work with new and experimental technologies to improve the quality and efficiency of evidence collection and expedite investigations with law enforcement. Our ability to custom develop automation and AI tools as needed assures you we can scale to any size and provide efficient services.

We are experts in Cybersecurity, OSINT, Intelligence Gathering, Cryptocurrency Chain Analysis, AI for Object/Person detection, Audio and Video forensics, Deep Fakes, Penetration Testing, and Privacy.
 

Solving business and personal online problems efficiently and discretely. 

Investigating cybercrime

Unmasking anonymous attackers

Asset recovery in cryptocurrencies and intellectual property

 Online reputation management

Cyberbullying, Cyber-Extortion,
and Online Blackmail containment

Court evidence collection with chain of custody and searchable, exportable, secure storage

Subcontracting Support
We provide technical and online investigation support for Law Firms, Investment Firms, Venture Capitalists, Movie and Music Production firms, Physical Security firms, and High-Profile Individuals in the forms of:

  • Private Investigations and Clean-up
  • Cybercrime Investigations
  • Extensive Due Diligence and Background Checks
  • Evidence Collection and Discovery
  • Fraud Monitoring and Take-downs
  • Investment Research
  • Customized Cybersecurity and Privacy
  • Cyber Threat Intelligence
  • Intellectual Property Protection and Recovery
  • Online Crisis Management and Response
  • Missing Persons Tracking and Support
  • Divorce and Custody Case Discovery and Clean-up

Specific Service Offerings

Business Executives, Board Members, and High Profile Individuals face risks to privacy, reputation, and security in ways that demand a sophisticated and tactful approach. We provide discreet, results-driven services designed for prominent figures and their families in protecting interests, securing data, and ensuring peace of mind in sensitive situations.

  • Security and Privacy analysis of social media, mobile devices, online posts, deep fakes, and dark web leaks. We create a complete dossier of electronic findings, leaks, threats, and risks.
  • Security and Privacy analysis of social media, mobile devices, online posts, deep fakes, and dark web leaks. We create a complete dossier of electronic findings, leaks, threats, and risks.• Discrete Clean-up and management of leaks, exposures, and sensitive issues.
  • Infiltration into closed and private groups.
  • Deep background checks on individuals and entities.
  • Intellectual Property tracking for stolen and leaked data and property.
  • Live Threat Alerts of threatening or harmful postings to social media.
  • Live Insights and Investigations for key information support on people and companies for business decisions and risk management.
  • Cybersecurity hardening to provide better than standard “consumer” security to devices and data.

When litigation is on the horizon, gathering admissible evidence is key. Our evidence collection service ensures that all materials from news articles to live video streams are captured with proper metadata and a maintained chain of custody. Whether it's websites, social media posts, or live transmissions, we ensure that no critical detail is missed, protecting the integrity of your case.

  • Comprehensive digital collection at scale from websites, dark web, and social media including automated person and object detection in digital audios and videos.
  • Court-admissible evidence with complete metadata and chain of custody.
  • Live social media monitoring and data capture as evidence.
  • Evidence Hot and Cold Storage which is searchable by the legal team and PDF export capable of select information.

The online narrative surrounding a business and its leaders can have immediate financial and reputational impacts. We offer live monitoring of social media to track threats and risks.

  • Comprehensive digital collection from websites, videos, and social media platforms.
  • Court-admissible evidence with complete metadata and chain of custody storage.
  • Live social media data capture of keywords, sentiment, concepts, and risks.

Fraudulent websites can erode trust and harm your business. We specialize in unmasking anonymous accounts and removing harmful or malicious sites that infringe on your brand or reputation, preventing financial and reputational damage.

  • Discrete Clean-up possible of leaks, risks, and potential PR issues.
  • Pursuit of legal takedowns, collaborating with law enforcement and other authorities.
  • Reputation Management and Alerts of further threatening or harmful postings to social media.
  • Court-admissible evidence with complete metadata and chain of custody storage.

If you or your family have been targeted by scammers, we provide comprehensive support. From unmasking scammers to guiding you through official reporting channels, our team works to restore your security and assist in any legal action.

  • Scammer unmasking and in-depth analysis.
  • Collaboration with law enforcement and reporting organizations.
  • Court-admissible evidence with complete metadata and chain of custody storage.

In today's digital age, anonymity can be a shield for harmful actors. We offer detailed investigations to uncover critical information on individuals, companies, and incidents. Whether gathering data for legal action or conducting deeper background checks, we provide in-depth intelligence quickly and effectively.

  • Unmasking social media profiles and website owners.
  • Infiltration into closed and private groups.
  • Social engineering information from target individuals.
  • Deep background checks on individuals and entities.
  • Collaboration with law enforcement and reporting organizations.
  • Court-admissible evidence with complete metadata and chain of custody storage.

Our Featured Technologies

Richochet

Discrete & Exclusive Security.
Ricochet is a system of cutting-edge security designed specifically for clients who require high security, mobile freedom, and ease of use.

Read more
Mewt

A cybersecurity lifeline in your pocket.
Mewt is an automated lockdown for your devices when you go. This wireless killswitch will lock down your device when it leaves your side.

Read more
invisibles

Invisibles is custom crafted music to effect human behavior. A synergy between musicians and neurohackers to create specific behavior-altering sounds to make positive, behavioral changes. 

Read more

 a

About Us

Pete Herzog

Marta Barceló

Christian Schjølberg


Your Peace of Mind, Our Discrete Service

Our services operate quietly in the background, giving you the confidence to move forward without concern for digital threats or reputational harm. Trusted by those who value their privacy and security, we offer solutions that go beyond conventional methods to ensure your personal and professional protection.

For more information or to discuss a tailored approach to your needs, please contact us to arrange a private call or chat. 

Contact