On-line data driven behavioral profiling of targets

On request, our analytical team is able to target, profile and monitor the on-line behavior of specific groups or individuals. With our open-access web intelligence and surveillance tools gathering data from social networks and internet services, we are able to:

  • identify groups, and individuals, that pose potential threat to our customers,
  • analyze and describe target’s on-line social interactions with other groups and individuals (i.e. - who is affecting them and who do they affect?), analyze content they generate online (i.e. - how extreme the content is?) and analyze their activities in recent history (i.e. - how were their opinions and behavior changing in past years?)
  • continuously monitor the activity of targeted groups and individuals, providing our client with alert, any time relevant changes in target’s behavior occur.

Example: Targeting a “lone-wolf” terrorist.
A lone-wolf terrorist or fighter is a person committing or preparing to commit unlawful or even violent acts in support of some group, movement, or ideology. However, this person does so alone, outside of any command structure and without material assistance from any group. Thus, it’s very hard to identify such target with traditional intelligence, surveillance and reconnaissance methods or standard criminal investigation of groups active in organized crime. Our approach is based on real-life data:

  • We start with behavioral psychology: We know, that if there are specific behavioral patterns present in the behavior of observed person, the chance of him being (or turning into) a lone wolf increases dramatically. Such patterns are for example: generating/posting/sharing extreme content on social networks, economic instability, small number of friends, high frequency interaction with certain small number of people who are not relatives, supporting/interacting with number of specific on-line groups, living in the foreign country with radically contrasting culture and religion, repeatedly visiting specific places, etc. Based on discussions with our clients, we develop a behavioral model and start searching for such targets online. We are able to integrate data from client‘s investigation and past intelligence.   
  • Next – deep analysis of high-risk targets: Once we have lone-wolf targets, we perform insight analysis on target’s social interactions, activity, and history. We score targets for potential threat they represent. The score is dynamic in time, changing with the activity of individual targets. Lone-wolf’s actions are usually highly affected by so called ”recruiters”, who operate like a wolf’s gate to the extreme ideology and encourage extreme acts. We try to identify the recruiters in target’s network, find out how and when they started to interact with the target (historical data) and how is the recruiter affecting the target over time.  
  • Long-term monitoring: We monitor the activity of identified targets, providing our clients with either regular reports or alerts if there is significant change in target’s behavior.