Open-source intelligence, tradecraft consulting, and operational security for agencies and defense organizations.
We apply the same rigorous, ethical collection methodology used in our private-sector work — passive reconnaissance, non-intrusive techniques, and legally defensible methods — to support your mission objectives.
Comprehensive open-source collection on persons, organizations, or infrastructure of interest. We map digital footprints across public records, social media, data brokers, breach databases, and deep web sources — producing structured, actionable intelligence products tailored to your operational requirements.
Augment your investigative team with experienced open-source collection and analysis. We provide passive reconnaissance, link analysis, pattern-of-life development, and digital identity resolution using non-intrusive, legally defensible methods.
Tailored collection plans and finished intelligence products — from single-subject profiles to multi-source aggregated assessments — formatted to your agency's standards and reporting requirements.
Hands-on instruction built from real-world collection experience, not slide decks. Scalable from small-team sessions to department-wide programs, delivered on-site or remotely.
Workshops for analysts and investigators covering passive reconnaissance methodology, tool proficiency, collection management, and ethical and legal boundaries.
Evaluate and improve your team's existing OSINT tradecraft — identify gaps in collection methodology, recommend tool adoption, and build standard operating procedures that produce consistent, defensible results.
The same techniques that expose targets can expose your people. We help you identify and close those gaps before adversaries find them.
Your officers, agents, and analysts have digital footprints too. We conduct the same exposure analysis we perform for private clients — applied to your personnel — identifying publicly available information that could compromise officer safety, undercover operations, or investigative integrity.
Assess your unit or organization's open-source exposure — from facility imagery and social media presence to procurement records and personnel data that could be collected by adversaries using the same techniques we teach.
Evaluate how visible your operations, facilities, and personnel are from open sources. We simulate adversary collection efforts to identify what a motivated threat actor could discover about your organization using only publicly available information.
Define requirements, deliverables, and timelines through a statement of work or contract vehicle.
Collection, analysis, training, or assessment work delivered on-site or remotely to your specifications.
Finished intelligence products, assessment reports, or training completion — formatted to your standards.
SAM.gov registered. Available for direct contract, subcontract, or task order under existing vehicles.
Available for direct engagement with state and local law enforcement agencies, district attorneys' offices, and fusion centers.
Contact us to scope an engagement tailored to your mission needs.