OSINT CYBER INTELLIGENCE

Why Cyber Intelligence?

  • Has your business been hacked & sensitive data has been disclosed?

  • Have you unintentionally disclosed confidential information online?

  • Are hackers talking about your business and attacks against you?

  • Are any exploits available, which could breach your security?

  • Are any industry specific threats concerning your business?

Who should get Cyber Intelligence reports?

  • Any business holding confidential data or customer information

  • Businesses who don’t want lawsuits or legal consequences

  • Businesses who have fallen victim already and want to be prepared

  • Businesses who must comply to Industry or Government Compliance

  • Businesses who know that being pro-active avoids costly breaches

Our cyber intelligence reports are not comparable with classical technical cyber threat feeds or standard security advisories. Our cyber intelligence analysts gather intelligence, which is of concern to the client’s business interests and provide comprehensive reports.

The Value of our Cyber Intelligence Services

  • Receive first class intelligence around your business interests

  • One-time off or recurring options

  • Be aware of risks before they turn into serious problems

  • Clear web, Deep Web and Dark Web intelligence analysis

  • Law enforcement grade reports and evidence

Why Us?

  • Combining IT skills with skills from our ex-law enforcement staff

  • Analysts with experience in both Israeli and British Intelligence

  • Team of multilingual Cyber Intelligence Analysts

  • Experience across all sectors and business sizes

  • Experience in covert operations

Deliverables

  • Comprehensive and detailed reports as an informational product

  • Secure encrypted report delivery and destruction of all records

1. Cyber Intelligence for Businesses

We offer an intelligence service to the private sector by proactively monitoring and reporting activity in cyber space, which concerns our client’s interests. We turn all intelligence into an informational product delivered to the client.

We gather intelligence by use of the following means:

  • Technical cyber feeds incl. Botnets, attack sources, malware etc.

  • Observation & monitoring of underground hacking groups and chats

  • Monitoring Information on the Dark/Deep Web relevant to the client

  • Activity monitoring on social media concerning client’s interests

  • Intentional and unintentional client information disclosure online

  • Information gathering on groups / individual posing a potential risk

Deliverables

We offer the following packages to suit the client’s needs:

Bronze: 1 report per year or one time off

Silver: 2 reports per year (biannually reporting)
whilst gathering Intel monthly

Gold: 4 reports per year (quarterly reporting)
whilst gathering Intel monthly

Should we encounter imminent threats, we will inform the customer immediately. All intelligence reports contain recommendations on how to mitigate threats encountered and provide detailed information on threat sources for potential legal action and law enforcement involvement against the individual(s) / group(s) posing a risk.

Example Threats we report on can include:

  • Confidential and secret information hacked and leaked by criminals

  • i.e. usernames, passwords, logins, SQL database dumps, documents.

  • Hacking groups discussing attacks or potential attacks.

  • Misconduct and information disclosure by disgruntled employees.

  • Reputational damage done to our client’s interests

  • Anything else concerning security around client’s interests

Our Intelligence Service delivers Intel to clients in the same manner a state intelligence agency provides information to the government concerning national interests.

2. Individual Cyber Intelligence

We use our extensive cyber knowledge, extensive network and sophisticated tools in order to investigate, correlate and report on information needed by clients. Our investigation services are offered on a global basis in most languages. We have recognised the increased reliance on computer and other electronic devices and understand the value of capturing a digital footprint when conducting any form of investigation.

Our OSINT Services can contain any of the following modules:

  • Tracking, locating individuals and missing person cases

  • Identifying and tracking threat actors

  • IP address / email tracing / domain ownership investigations

  • Intellectual property and brand protection investigations

  • Locating witnesses and defendants

  • Background checks of any kind incl. social media investigations

  • Criminal record investigations / credit investigations

  • Online scams (dating, romance, marriage fraud, etc.)

  • ID theft investigations

  • Identity verification and surveillance

  • Online reputation management

  • Defamation / harassment investigations

  • Internet and forensic investigations

  • Pretext inquiries and covert undercover investigations

Sample cases we have recently worked on:

  • Identifying radicalised individuals working at company X

  • Identifying person and location of a criminal selling stolen goods

  • Numerous background checks on potential investors / partners

  • Identifying whereabouts of husband refusing to pay childcare

  • Identifying a stalker making death threats to a specific individual

  • OSINT evidence of an employee trying to harm his ex-company

  • Locating a UK national who emigrated to Canada in the 80s

Our excellent team of IT specialists, ex law enforcement and private investigators allows us to combine our skill set to provide excellent investigative results in order to meet our client’s needs.

Download Flyer and Sample Reports

References and Certifications

If you would like to speak to one of our existing customers, we are happy to arrange that. Please note that a lot of customers wish to remain anonymous and not to serve as a reference due to the sensitivity of the work we perform. Naturally we always comply with our customers. We do however have some clients who are happy to serve as references. Should you require validation of our consultant’s certifications, we can arrange that as well.