top of page

Discover Our Expertise

Our Services

Actionable Insights

Investigations and Threat Assessments

Starting with any piece of information you have about your target – username, email, or phone number – we collect the pieces of the puzzle to create a full profile of the person or group you are interested in and determine their level of concern

Reducing Online Vulnerability

Mitigating your risk of harassment, doxing, and identity theft by assessing your online exposure and taking practical steps to remove your personal information from online sources

Social Media Monitoring and Threat Detection

From physical threats through brand security to political unrest – our intelligence experts apply advanced techniques to monitor a wide range of social media platforms and provide you with early alerts of any breaking event that has the potential to affect your personnel, assets, and reputation

SIGINT

Collecting information from radio waves' spectrum, including police, fire department, criminal and pirate-radio transmissions, civil and military air and maritime communications, land transportation, cordless phones, Walkie-Talkies, and wireless microphones

Training

The OSINT Workshop

A two-day comprehensive OSINT training focused on locating hard-to-find information online. In this course, participants learn to utilize a wide range of freely available tools and techniques to optimize their online searches, collect the hidden pieces of the puzzle, and create full profiles of their targets and a better understanding of what is happening on the ground. The training includes multiple live demonstrations and practical exercises, enabling the students to take what they learned in class and immediately implement it in their work.

Reducing Online Exposure

The amount of personal information that can be found online using simple and freely available techniques and databases is far greater than many realize, putting all of us at risk of online harassment, physical approaches, and identity theft. In this hands-on workshop, students learn the main sources of their online exposure, how to locate their data online, identify their vulnerabilities, and secure their online presence through safe posting behavior and data removal

bottom of page