National Security

for

SAIL LABS is consistently expanding the areas of where our solution can be used. Whether it is for government or commercial use, we personalise our solution with the customer’s interest at heart.

Finance Industry

Financial institutions face intense competition, ever increasing regulations and changing customer needs. In order to gain a competitive advantage, it is important for these institutions to seek improvement and eliminate risks and threats.

Health Industry

It is essential for organisations in the Health Industry to be aware of an outbreak of a pandemic disease or social unrest as a result of health threats, thus limit the spread and devastation. Observing activities of multinational pharmaceutical corporations or staying up to date with health-policies in the world is crucial for contributors in the industry.

Travel Industry

The travel industry is a fiercely competitive environment, and industry players need to be aware of a number of threats such as security, strikes, adverse weather, and many more that can threaten daily operations. Major events can either pose serious risks or opportunities. Reputation management requires the continuous situational awareness of what is happening in the media especially online.

Political Strategy

Social Media has become an essential communication channel of today and more and more of the public’s attention and time is being spent scrolling through platforms such as Facebook, Twitter and Instagram. Making sense of the data that is being produced on these social media platforms is crucial in understanding and engaging in public discussion within political contexts.

Business Intelligence

Today, organisations need to be able to make sense of the vast amount of information that is being produced in order to understand the environment and the industry in which it operates within. This is essential to stay ahead of competitors, responding to change and staying up to date with current trends.

The role of open source intelligence in the intelligence circle

In the digital age of big data, large volume of personal, corporate and governmental data is now open and accessible to intelligence and security organizations around the world. Because of the increased usage of social media by billions of people, these social networks hold detailed personal data and lay the ground for intelligence gathering and discovery of extremist, criminal or terrorist content or networks.

As the role of law enforcement agencies (LEAs) and security and intelligence organizations is to maintain law and order, identify and investigate crime and protect the citizens, the range of areas that the agencies are covering broadened dramatically in the past decades further driven by the technology. Nowadays, these domains include terrorism, organized crime, illegal immigration, critical infrastructure protection, the proliferation of weapons of mass destruction, intra- and interstate conflicts, etc.

We distinguish between Open Source Intelligence (OSINT), Human Intelligence (HUMINT), Signals Intelligence (SIGINT), Imagery Intelligence (IMINT) and Measurements and Signatures Intelligence (MASINT).

OSINT represents knowledge and intelligence extracted from data that are collected from publicly available sources, which include traditional media as well as social media.

The value of open source information for intelligence-related purposes is widely recognized by security organizations around the world and with regards to the current estimates, OSINT already provides between 80 to 90 % of the information in use by intelligence organizations.

OSINT software expands analysts’ abilities to collect, analyze, visualize and distribute knowledge extracted from originally unstructured data by automated means and complement traditional intelligence data gathering and enhance the intelligence capabilities. OSINT is most effectively used when augmenting the existing closed source intelligence, which is information with restricted access such as police records, financial intelligence, information from partners, etc., by providing extra information and identify the direction to which the intelligence efforts should go to.

To conclude, OSINT is of significant help when combating organized crime or investigating terrorist activities and represent a crucial component of the intelligence circle and should be included in strategic planning on national level.

Therefore, all types of security organizations around the world are reportedly investing into open source intelligence tools and state-of-the-art OSINT systems in order to enhance their monitoring and research capabilities for open source data – be it news reports from around the world, public agencies, think-tanks, web, social media, deep web, darknet, etc.

Applications of OSINT in the area of national security:

  • Identify terrorist narratives, propaganda and influencers on the surface web tackling the root causes in order to address the radicalization of citizens
  • Obtain intelligence from the dark web in order to disrupt a terrorist or criminal communication or their support networks
  • Live threat assessment of vulnerabilities or areas of risk
  • Build the resilience of citizens

Benefits of OSINT for intelligence organizations and LEAs:

  • Collecting information by OSINT is less expensive and risky than other intelligence gathering methods, which results in monetary savings
  • OSINT can fill in the gaps in investigations and corroborate the existing intelligence at a very low-cost and point to the areas of interest in investigations
  • Partially thanks to high-quality imagery available on the Internet, the return on investment of OSINT is potentially higher than IMINT, making it specially relevant for states operating with tight security and intelligence budgets
  • Information ethically obtained by OSINT can be used in legal proceedings without endangering the intelligence assets
  • OSINT information is easily shareable with any other organization with no cost
  • It offers broader scope of the analysis – uncovering criminal and terrorist actors, assessing the public opinion or discovering new movements, trends or issues
  • A location, identity or other crucial knowledge can be obtained by means of imagery analysis of photographs acquired by OSINT
  • By automating the collection of user-generated content and its analysis analysts can broaden their scope and abilities of gathering, processing, translating, filtering and editing vast amount of data in a time-saving and automated manner and provide almost real-time analyses

media mining system social network analysis

Media Mining Social Network Analysis (SNA) is a powerful network analysis platform that was designed specifically for the security and law enforcement domain. It enables analysts to find hidden patterns and connections in their data and allows them to combine their legacy data with what is publicly available on the Internet (social media, news sites, forums, etc.). Besides the network topology, Media Mining SNA also allows the user to view their data spatially and temporally. Media Mining Social Network Analysis is an extension option to the Media Mining Server, similar to other extensions, such as Social Media Extension, Profiles & Ontologies extension, Workflow Extension, Visualization Extension, etc.

What questions does Media Mining SNA answer?

  •  Which nodes are the most central/influential ones in a network
  • Which nodes are on the fringe of a network
  • Which nodes are connected to node A?
  • How well connected is node A in a specific network?
  • Which nodes function as middlemen/brokers between others?
  • Which nodes can spread information quickly to many other?
  • Who is disseminating propaganda?
  • Who is part of cell A?
  • Which is the shortest way information can spread from node A to node B?
  • Which connections do node A and node B have in common?
  • Where is node A located?
  • What content has been shared by node A?
  • Node A has a hidden friends/followers list, how can I still reconstruct parts of his/her network?
  • Node A is not openly sharing content, how can I still find out if he/she is still supporting a certain ideology?

Face recognition

The SAIL LABS Face Recognition is a technology based on Deep Learning that allows the detection of faces and the identification of persons from digital images or videos. This form of Artificial Intelligence application compares patterns related to a person’s facial textures and shape against a set of known faces. Face Recognition technology provides an excellent extension to the Media Mining System (MMS), as it enables the user to tap into the information present in the visual content of the system. Face Recognition users can query the MMS through facial information.

unique benefits of face recognition

  • Integration and combination with cutting-edge technologies such as: automatic speech recognition, speaker identification, named entity detection, topic detection across multiple languages, geographies and sources
  • Used with still images and videos from traditional and social media
  • Detection of faces in images/frames of a selected video

Sources

Practical Cases

Greek-Turkish border in March 2020

This report focuses on the demonstration of some of the capabilities of SAIL LABS Media Mining System (MMS) through investigating the communication discourse regarding the migration crisis at the Greek-Turkish border. The aim is to show the value of having an ability to gather and process large volume of open source data in the context of a government institution to maintain situational awareness.

To access the full report, please contact us through the request form below by clicking on the yellow button.

As the system possesses multilingual and cross media features, it is especially suitable for election monitoring and political campaigning.

Fake News and Conspiracy Theories’ Detection and Extremist Content in Times of COVID-19

The current Coronavirus crisis represents an enormous opportunity for various extremists to influence, recruit and further destabilize the political system with the help of the contagiousness of Fake News and conspiracy theories circulating on social media.

This use case focuses on evaluating and discovering Fake News and conspiracy theories surrounding and utilizing COVID-19 and their usage by extremist groups. Moreover, it offers an overview of the most prevalent Fake News and conspiracy theories, examines their origins and influencers and offers recommendations for governments concerning countering Fake News, conspiracy theories and hostile narratives that aim to further polarize and radicalize the already economically deprived and scared citizens.

To access the full report, please contact us through the request form below by clicking on the yellow button.

As the system possesses multilingual and cross media features, it is especially suitable for election monitoring and political campaigning.

Beirut Blast Report

On 4 November 1989, The Taif Agreement (Source: Permanent Mission to the United Nations) was approved by the Lebanese Parliament putting an end to fifteen years of civil war in the country. In March 1991, the Amnesty Law (Source: Civil Society Knowledge Center) was passed for all crimes that had occurred since 1975 and the warlords became the political leaders of the country with unlimited impunity.

Download the full report about the Beirut Blast below by clicking on the yellow button.