Our approach to threat intelligence broadly includes the following:
Client-specific information and intelligence which we have detected in a given period, that forms part of our ‘intelligence collection plan’ and provides a ‘horizon scanning’ feed. This focusses on potential threats which we have identified through the use of the specialist platforms we invest in. These include closed source databases, human source networks, and social media analytics, but also open-source intelligence (OSINT), social media and dark web monitoring. It can also include forward looking analysis of militant groups of concern such as single issue, jihadist or far-right terrorism.
Bespoke intelligence requests
Developments occur from time to time that pose a threat to clients, for which we would provide specific intelligence on a person or entity of interest that may be useful to an investigation, internal report, or decision. We would provide the raw data from a range of platforms, if such data is available. This includes data from open and closed source databases of politically exposed person information; sanctions information; terrorism and crime information on persons of interest; social media profiles and activity information. From time-to-time we may also need to tap into our human source network to provide more granular detail.
Geo-fencing of critical locations:
Social media generated posts indicating security incidents around a client property location, and social media generated posts referencing the client by name around their property location. These can be set to whatever radius the client prefers. Through this we can generate specific incident case studies relating to critical client locations.
This not limited to solely client sites, but also can include logistics routes, sites holding sensitive material, trip locations and event sites.