Home/Contact
Engage

Confidential. Direct. Operationally answered.

Initial inquiries go to the founder. Choose the form that best fits your matter, or use the direct line below. Active incidents — call.

Service area — Idaho-primary, headquartered in Eastern Idaho (INL corridor). On-site engagements across Eastern Idaho, the Magic Valley, and the rest of the state. Mountain West matters (MT, WY, UT, NV, OR, WA) accepted on a case-by-case basis through counsel referrals and prior relationships.

Choose engagement type

Four intake forms. One firm.

Encrypted in transit. Confidential to the founder. PGP available on request.
If this is an active incident, call 208·557·1883. The line is answered. This form is for non-emergency IR retainers and post-incident consulting.
Treated as confidential. Privileged if engaged through counsel.
Conflict check performed before engagement. PGP available on request.
Encrypted communications. Email is encrypted in transit. PGP key available on request for sensitive matters. Signal and other secure channels available once engaged.
PGP — verify before you trust. Two public keys are published for corey@cyberd20.com. Signed correspondence will be signed by one of the fingerprints below. Request the ASCII-armored public key by email and verify the fingerprint out-of-band before assigning trust.
PGP // PUBLIC KEYSRSA 4096 · ISSUED 2026-05-08 · EXPIRES 2028-05-07
[primary · recommended]  rsa4096 · [SC]  +  [E] subkey
pub   E070 6C21 D8A7 CF6E 9725  AE04 FBA1 A1B4 4E60 D59C
sub   62BA EAA3 DB37 D2B8 3C14  FF53 E76B DD2A 185F BCC4  // encryption
uid   CyberD20 Intelligence Group <corey@cyberd20.com>
[secondary · accepted]  rsa4096 · [SCE] monolithic
pub   1903 6570 053E 1E46 19FB  42B6 D456 FF95 3BAA 128C
uid   CyberD20 Intelligence Group <corey@cyberd20.com>
Verification — Compare the full 40-character fingerprint character-for-character against a value obtained out-of-band (phone call, in person, a separately-published location). Do not trust fingerprints emailed to you alongside the signed message they purport to verify.
What we will not do. Engage in unauthorized access, surveillance outside lawful scope, or any work outside the methodology and standards stated on this site.