Our Services

Our world-leading intelligence team, in tandem with our cutting-edge tech and comprehensive database tailored to analyzing extremist networks and behaviors, supports companies in protecting themselves, their customers and their communities from terrorism.

Sectors we work with

Trust & Safety

We help Trust, Safety, and Policy teams at some of the world’s largest social media platforms understand evolving threats and tactical abuses of services, ensure regulatory compliance, and take swift action against influence operations and extremist abuses of platforms and services.

Infrastructure

From power grids to hospitals, we support security teams in protecting essential digital and physical infrastructure and services against the global threat of cyber-terrorism, violent extremism, terrorist attacks, and foreign influence operations.

Shipping & Logistics

We track threats to global supply chains and support transport, aviation, maritime, and port security teams in keeping the shipping and logistics sector safe from terrorist activities.

Events & Hospitality

From concerts and conventions to hotels and casinos, we have seen terrorists target global gathering spaces. Working with event organizers and venues we assess risks and monitor evolving threats to take proactive action to protect your audiences.

NGO & Non-Profit

We provide situational awareness, supporting the efforts to keep NGO workers and communities in some of the most hostile working environments in the world safe. We also work with NGOs to understand intervention points and the impact of CT/CVE

Brand & Reputation

Your reputation is your most valuable asset. We help clients understand the reputational risks they face by monitoring global discussions, visual language, meme creation, the use of branded equipment, and internal communications within extremist networks.

Actionable Intelligence

Our investigations team provides actionable insights and intelligence reports based on investigations utilizing cutting-edge technology-enhanced analysis of online content and behaviors. By building on our efforts to map offline incidents of violent extremism, we can connect online behavior to offline violent extremist incidents.

We build on a behavior-based model for understanding and analyzing violence-inducing conspiratorial networks and extremist actors. This model helps facilitate strategic network disruption and enables us to monitor the evolution of extremist threats more effectively. Alongside this, it also allows us to remain ideologically and geographically agnostic, giving us the flexibility to monitor extremist actors across ideologies, national borders, and regions.


Policy and Strategy Development

Through policy and strategic reviews, tabletop exercises, and red-teaming exercises, our team of experts assists in reviewing existing frameworks and their implementation, discovering how bad actors may undermine existing policies and exploit their weaknesses, and finding paths to mitigating these risks.

We can also assist in the foundational effort of building a comprehensive policy framework and developing the infrastructure to enforce these policies.


Continuous Monitoring

We offer dedicated and general continuous monitoring of regions, communities, and extremist and terrorist narratives to identify and address threats in real-time so our clients can prevent harm.

Continuous monitoring supports clients in understanding and assessing the evolving threat landscape surrounding their priority locations and regions, infrastructure, and assets, in addition to the evolving abuses of platforms, tools, and services by terrorist organizers and those seeking to spread violent extremist narratives.