Nisos OSINT Monitoring and Analysis

Additional Info

Company size (employees)50 to 99
Type of solutionService


Nisos OSINT Monitoring and Analysis provides broad and customized monitoring of social media data to enable actionable intelligence for Nisos clients

Nisos customizes social media, dark web, and open source (OSINT) analysis to enable enterprises to use Managed IntelligenceTM operations for:
ƒ Physical security
ƒ Cybersecurity
ƒ Fraud
ƒ Platform abuse
ƒ Third-party risk
ƒ Brand reputation
ƒ Executive protection teams
Nisos also maintains a robust OSINT analysis capability, which includes disinformation and threat actor unmasking.

Our highly-trained analysts use many types of technologies, providing both broad coverage of thousands of platform pages and bespoke solutions to gain access to closed forums.

Dark Web Data
We maintain access to numerous dark web forums
We also leverage our custom personas to collect on specific marketplaces and forums on the dark web that require credentials to access them.

Closed Forums
On many occasions, clients want detailed insights about a specified threat. Using appropriate tradecraft and following legal guidance, we gain access to closed forums on social media and connect with persons of interest, including threat actors, to gain insights important to our clients. Similarly, we export the data in a usable format for analysis.

Social Media
In addition to the best known and most widely used social media platforms, we also analyze over 25 less-trafficked platforms.

OSINT monitoring and analysis enables clients to take action and protect people, business, customers, and assets with rapid and curated responses to intelligence questions and concerns.
Deliverables included:
1)Situation Briefing: Monthly summary status report of trends and activity observed by Nisos researchers and analysts
2)Spot Report: a supplemental brief used to quickly communicate time-sensitive intelligence for significant events impacting a client

How we are different

1) Broad-Based Collection
We use broad-based collection strategies to pool thousands of pages of content, which we then search for keyword mentions of the brand, key personnel, the company, or company products. Using over 30 sources including third-party products and our own proprietary tools and personas, we view, store, collect, and export many social media pages and archive this data in a highly-secure and closely-maintained central storage location. We collect thousands of pages of content, which Nisos operators then review for long-term monitoring and event-driven investigations.

2) Virtual Research Environment
We conduct all OSINT research from virtual research environments provisioned with appropriate security measures. Within these environments, through actively engaging or passively observed, our analysts move swiftly between platforms and personas to garner a better understanding of threat actors’ motives and plans.

3) Attribution and Unmasking, if Necessary
Finally, attribution is needed for various threats. Advanced adversary research attribution relies on advanced tradecraft to ensure accuracy. Our ability to correctly attribute bad actors to confirm their identity, and to do so in a manner that is unseen by the adversary,
is often a critical component of our research capability.