HTCI Initiatives/Projects


HTCI is conducting research in the following areas for research and development.  Please take a moment to review these initiatives:

 

International Media Forensics Collection Survey

The data being collected is to be used as a research product in the Utica College Cyber Security Masters program and in the Keiser University DBA program. All data will be made available for post hoc analysis in the peer community. Once the data has been collected and normalized notification will be sent out that the data is available. An accompanying research paper will be submitted for publication revealing the outcome of the collected data. The data being gathered will be used for academic research purposes. The goal sample is to have 200 respondents from each category of examiner. Questions regarding the paper and data can be sent to S.Pearson2@student.keiseruniversity.edu or sfpearso@utica.edu.

Read more link text

CELLEX/MEDEX/DOCEX

We are the experts

Our cadre are all current or recently former professionals that are or have been working in these fields for years. HTCI is proud to present the hands on training that will allow a student to come to one of our courses and gain the knowledge and skills that are required to gather intelligence or evidence in the complex world of battlefield crime scenes or sensitive sites.  HTCI has always taught in the lead from the front method.  In other words the instructors have successfully completed this type of work in the world yielding usable evidence or actionable intelligence around the world.  HTCI bring to the table the backend “So What” to the student allowing them really understand why this training is critical in todays world of terrorism and international criminal enterprises.

Read more link text

Sensitive Site Exploitation

Sensitive Site Exploitation or SSE is a new buzzword for a very old process (Law Enforcement Forensics).  In todays complex theaters of operations around the world the need to be able to gather data from all usable sources has become critical.

Read more link text