Enabling Enterprise Intelligence Ops

Service: OSINT Monitoring and Analysis

Broad and customized monitoring that delivers actionable intelligence aligned to client-specific concerns.

Client-Specific Monitoring Engagement

bold orange play button

Baseline

  1. Curate client-specific keywords for tuning broad collection tools
  2. Review results from social-listening tools searching for potential threats
  3. Use our personas to access closed forums daily focused on targeted collection
  4. Manually analyze broad and targeted results of potential threats
  5. Notify and engage client of credible, actionable threats

Monitor

  1. Identify and track key high-risk potential persons of interest
  2. Focus on closed groups and extremist forums for activity
  3. Establish bona fides in closed forums, allowing Nisos tools to collect
  4. Engage with actors to gain deeper access into small group conversations

Analyze

  1. Highlight links between actor personas through Nisos Intel Database
  2. Connect through analyst review all actor content, correlating identity clues
  3. Uncover technical links to a real-world identity
  4. Test and validate attribution findings to ensure accuracy

Analyst-Led Monitoring and Analysis

Nisos provides cybersecurity, protective security, and intelligence teams with contextualized, prioritized, and relevant findings derived from monitoring and analyzing the dark web, open source, and social media platforms. Our monitoring and analysis allow us to provide recommendations that help identify threats, disrupt attacks, stop adversaries and remediate risks.

This service is dependent on broad coverage of thousands of platform pages and access to closed forums that are processed and then analyzed by Nisos’ highly-trained analysts.

Adversary Attribution and Unmasking

Attribution is appropriate for some threats. Nisos’ adversary research attribution relies on advanced tradecraft to ensure accuracy. Our ability to correctly attribute and unmask bad actors, and to do so in a manner that is unseen by the adversary, is often a critical component of our research.

Intelligence that Drives Action

We enable your team to take action against each finding and ensure the confidentiality, integrity, and availability of data, systems, and networks. Not only do we identify vulnerabilities, we provide details of likelihood and ease of potential exploitation, recommendations for remediation, statistics on mean time to alert and respond.

We provide context by outlining exploitation or access attempts based on collection tasking.  

Expert Open Source Analysis

We provide qualitative and quantitative analysis of public, non-classified sources to deliver contextual intelligence. Common sources include, but are not limited to:

Archives

Business Records Icon

Business Records

Commercial Data

Commercial Data

Criminal Databases

Dating Sites Icon

Dating Sites

Domain Registries Icon

Domain Registries

Exploits and Advisories Icon

Exploits and Advisories

Foreign Press Icon

Foreign Press

Geolocation Tools/Maps Icon

Geolocation Tools/Maps

Grey Literature Icon

Grey Literature

Images/Videos/Docs Icon

Images/Videos/Docs

Instant Messaging Icon

Instant Messaging

Media-Domestic and Foreign Icon

Media-Domestic and Foreign

People Databases Icon

People Databases

Public Records Icon

Public Records

Social Media Networks Icon

Social Media Networks

Transportation Records Icon

Transportation Records

Ready to speak with an expert?