top of page

PROFILING

Service Name

C638B534-E737-46A2-8AED-702E4E7583A9_1_105_c.jpeg

GEOSPATIAL INTELLIGENCE

We specialize in the linkage and analysis of geographic and temporal data to provide detailed Geospatial Intelligence reports in support of investigations and threat assessments. Our analysts identify locations, characteristics, and attributes of people, places, and things using satellite imagery, CCTV and webcam analysis, timelines, and subject and object identification.

22D4354A-8E30-4BB6-9C68-68723ABE8A0E_1_105_c.jpeg

THREAT ASSESSMENT

Our threat intelligence team provides evidence-based knowledge to keep companies and individuals informed of risks, existing and emerging threats and exploits, and how to protect against them.

CEC85A3A-6E44-4C70-BDD3-E491781C0FAE_1_105_c.jpeg

ONLINE GROUPS

Utilizing behavioural and psychological profiling across social media platforms, encrypted communication channels, and the dark web, we can identify, link and profile known and unknown individuals as well as organized, disorganized, and splinter groups.

22709508-BBF8-4ED6-80A0-C90057C0420F_1_105_c.jpeg

ONLINE RADICALIZATION

Our subject matter experts conduct online radicalization assessments using behavioural and psychological profiling and linguistic analysis to identify pathway to violence warning behaviour.  We employ a predictive intelligence model incorporating linkage variables, attack methods, and target selection to mitigate risk and manage threats.

EB59ABEF-EA51-468E-BC77-D48EEAD1A689_1_105_c.jpeg

GEOGRAPHIC PROFILING

Geographic profiling assists in prioritizing suspects and case information management using environmental criminology combined with crime pattern theory, rational choice theory, and routine activity theory.  Using sophisticated investigative methodology and geospatial technology, our fully certified geographic profiling analysts produce geoprofiles that indicate the most probable area of an offender’s base of activities.

1F9CAAAC-3D47-4740-8813-0EFB48D98817_1_105_c.jpeg

TECHNICAL VULNERABILITY

Our team of technical and digital specialists can examine your  infrastructure, from keyboard to server, and create a blueprint to highlight technical vulnerabilities and harden networks. From social engineering to SIM cloning to cryptocurrency, our technical vulnerability assessments will help you protect your most valuable digital assets.

bottom of page