Threat Intelligence

We use intelligence to identify potential adversaries with malicious motives, and assess their intent and capability.

Service
Overview

The threat intelligence team at AnotherDay provides proactive bespoke intelligence to our clients, rather than bulk commoditised risk information. Pulling from the team’s expertise and experience this encompasses threats such as terrorism, organised crime, online hostile actors, conflict, and attempts to alert the client to a scenario before it has played out. It can also involve the analysis and monitoring of geopolitical developments that could impact client operations.

By staying on top of developments and providing actionable intelligence we act as our clients' ‘rear view mirror’, and feel this approach helps them best protect their assets, locations and people.

How We Can Help You

Our approach to threat intelligence broadly includes the following:

Horizon scanning

Client-specific information and intelligence which we have detected in a given period, that forms part of our ‘intelligence collection plan’ and provides a ‘horizon scanning’ feed. This focusses on potential threats which we have identified through the use of the specialist platforms we invest in. These include closed source databases, human source networks, and social media analytics, but also open-source intelligence (OSINT), social media and dark web monitoring. It can also include forward looking analysis of militant groups of concern such as single issue, jihadist or far-right terrorism.

Bespoke intelligence requests

Developments occur from time to time that pose a threat to clients, for which we would provide specific intelligence on a person or entity of interest that may be useful to an investigation, internal report, or decision. We would provide the raw data from a range of platforms, if such data is available. This includes data from open and closed source databases of politically exposed person information; sanctions information; terrorism and crime information on persons of interest; social media profiles and activity information. From time-to-time we may also need to tap into our human source network to provide more granular detail.

Geo-fencing of critical locations:

Social media generated posts indicating security incidents around a client property location, and social media generated posts referencing the client by name around their property location. These can be set to whatever radius the client prefers. Through this we can generate specific incident case studies relating to critical client locations.

This not limited to solely client sites, but also can include logistics routes, sites holding sensitive material, trip locations and event sites.

Contact our team today