
Discover Our Expertise
Our Services
Actionable Insights
Investigations and Threat Assessments
Starting with any piece of information you have about your target – username, email, or phone number – we collect the pieces of the puzzle to create a full profile of the person or group you are interested in and determine their level of concern
Reducing Online Vulnerability
Mitigating your risk of harassment, doxing, and identity theft by assessing your online exposure and taking practical steps to remove your personal information from online sources
Social Media Monitoring and Threat Detection
From physical threats through brand security to political unrest – our intelligence experts apply advanced techniques to monitor a wide range of social media platforms and provide you with early alerts of any breaking event that has the potential to affect your personnel, assets, and reputation
SIGINT
Collecting information from radio waves' spectrum, including police, fire department, criminal and pirate-radio transmissions, civil and military air and maritime communications, land transportation, cordless phones, Walkie-Talkies, and wireless microphones
Training
The OSINT Workshop
A two-day comprehensive OSINT training focused on locating hard-to-find information online. In this course, participants learn to utilize a wide range of freely available tools and techniques to optimize their online searches, collect the hidden pieces of the puzzle, and create full profiles of their targets and a better understanding of what is happening on the ground. The training includes multiple live demonstrations and practical exercises, enabling the students to take what they learned in class and immediately implement it in their work.
Reducing Online Exposure
The amount of personal information that can be found online using simple and freely available techniques and databases is far greater than many realize, putting all of us at risk of online harassment, physical approaches, and identity theft. In this hands-on workshop, students learn the main sources of their online exposure, how to locate their data online, identify their vulnerabilities, and secure their online presence through safe posting behavior and data removal