We:
Maximise intelligence yield through the forensic engagement of sophisticated tools of linguistic and semiotic analysis.
Establish evidence of criminal intentions, and crimes proposed, planned, commissioned, or perpetrated directly or indirectly through text, talk, static image, or video.
Work with the military to assess the significance of intercepted communications in the field.
Collaborate to train operatives in the (cyber) security, intelligence, and military fields.
Aid in threat categorisation and assessment.
Reverse engineer strategy by examining the ‘strategic traces’ indicated in or implied by tactical ensembles.
Help governments and large-scale organisations to better understand, reimagine, and gain robust insight into real-world risks by decoding the language of violent extremists including jihadists and other far-right factions, i.e., the ‘deadly duet’, and beyond.
Support security services and major tech companies by assisting in identifying, categorising, and moderating objectionable content.
Assist leaders to adapt to disruptive security environments through threat assessments and investigative protocols, including the provision of insights apropos criminal motives, intentions, agendas, and potential victims.