OSINT CYBER INTELLIGENCE
Why Cyber Intelligence?
Has your business been hacked & sensitive data has been disclosed?
Have you unintentionally disclosed confidential information online?
Are hackers talking about your business and attacks against you?
Are any exploits available, which could breach your security?
Are any industry specific threats concerning your business?
Who should get Cyber Intelligence reports?
Any business holding confidential data or customer information
Businesses who don’t want lawsuits or legal consequences
Businesses who have fallen victim already and want to be prepared
Businesses who must comply to Industry or Government Compliance
Businesses who know that being pro-active avoids costly breaches
Our cyber intelligence reports are not comparable with classical technical cyber threat feeds or standard security advisories. Our cyber intelligence analysts gather intelligence, which is of concern to the client’s business interests and provide comprehensive reports.
The Value of our Cyber Intelligence Services
Receive first class intelligence around your business interests
One-time off or recurring options
Be aware of risks before they turn into serious problems
Clear web, Deep Web and Dark Web intelligence analysis
Law enforcement grade reports and evidence
Why Us?
Combining IT skills with skills from our ex-law enforcement staff
Analysts with experience in both Israeli and British Intelligence
Team of multilingual Cyber Intelligence Analysts
Experience across all sectors and business sizes
Experience in covert operations
Deliverables
Comprehensive and detailed reports as an informational product
Secure encrypted report delivery and destruction of all records
1. Cyber Intelligence for Businesses
We offer an intelligence service to the private sector by proactively monitoring and reporting activity in cyber space, which concerns our client’s interests. We turn all intelligence into an informational product delivered to the client.
We gather intelligence by use of the following means:
Technical cyber feeds incl. Botnets, attack sources, malware etc.
Observation & monitoring of underground hacking groups and chats
Monitoring Information on the Dark/Deep Web relevant to the client
Activity monitoring on social media concerning client’s interests
Intentional and unintentional client information disclosure online
Information gathering on groups / individual posing a potential risk
Deliverables
We offer the following packages to suit the client’s needs:
Bronze: 1 report per year or one time off
Silver: 2 reports per year (biannually reporting)
whilst gathering Intel monthly
Gold: 4 reports per year (quarterly reporting)
whilst gathering Intel monthly
Should we encounter imminent threats, we will inform the customer immediately. All intelligence reports contain recommendations on how to mitigate threats encountered and provide detailed information on threat sources for potential legal action and law enforcement involvement against the individual(s) / group(s) posing a risk.
Example Threats we report on can include:
Confidential and secret information hacked and leaked by criminals
i.e. usernames, passwords, logins, SQL database dumps, documents.
Hacking groups discussing attacks or potential attacks.
Misconduct and information disclosure by disgruntled employees.
Reputational damage done to our client’s interests
Anything else concerning security around client’s interests
Our Intelligence Service delivers Intel to clients in the same manner a state intelligence agency provides information to the government concerning national interests.
2. Individual Cyber Intelligence
We use our extensive cyber knowledge, extensive network and sophisticated tools in order to investigate, correlate and report on information needed by clients. Our investigation services are offered on a global basis in most languages. We have recognised the increased reliance on computer and other electronic devices and understand the value of capturing a digital footprint when conducting any form of investigation.
Our OSINT Services can contain any of the following modules:
Tracking, locating individuals and missing person cases
Identifying and tracking threat actors
IP address / email tracing / domain ownership investigations
Intellectual property and brand protection investigations
Locating witnesses and defendants
Background checks of any kind incl. social media investigations
Criminal record investigations / credit investigations
Online scams (dating, romance, marriage fraud, etc.)
ID theft investigations
Identity verification and surveillance
Online reputation management
Defamation / harassment investigations
Internet and forensic investigations
Pretext inquiries and covert undercover investigations
Sample cases we have recently worked on:
Identifying radicalised individuals working at company X
Identifying person and location of a criminal selling stolen goods
Numerous background checks on potential investors / partners
Identifying whereabouts of husband refusing to pay childcare
Identifying a stalker making death threats to a specific individual
OSINT evidence of an employee trying to harm his ex-company
Locating a UK national who emigrated to Canada in the 80s
Our excellent team of IT specialists, ex law enforcement and private investigators allows us to combine our skill set to provide excellent investigative results in order to meet our client’s needs.
Download Flyer and Sample Reports
References and Certifications
If you would like to speak to one of our existing customers, we are happy to arrange that. Please note that a lot of customers wish to remain anonymous and not to serve as a reference due to the sensitivity of the work we perform. Naturally we always comply with our customers. We do however have some clients who are happy to serve as references. Should you require validation of our consultant’s certifications, we can arrange that as well.