Countering threats through data
We provide independent and evidence-based insights on how vulnerable communities are targeted and harmed by malicious activities in cyberspace. Our assistance to NGOs and our legal and policy contributions are intrinsically linked with our ability to deliver unique data-driven analysis. We make our data and analysis freely accessible to raise awareness of the harm of cyberattacks and to be used in further research.
Detect to protect
We conduct micro-level data analysis in which we detect and monitor threats to vulnerable communities.
By aggregating data shared with us by our cybersecurity and technology partners and by mapping the digital assets of our beneficiaries we are in a better position to protect them. We detect these threats using technical data points such as indicators of compromise (IOCs) and telemetry data. Building detection rules and alerts we provide our beneficiaries with triaged information and practical recommendations to help them protect their data and systems.
the digital assets of our beneficiaries
new threats and vulnerabilities
information through timely allerts
risks and secure
Research the Threat Landscape
We conduct macro-level research to identify who is behind cyberattacks targeting vulnerable communities, the motive(s) behind them and the harm they cause. Through our analysis, we map the threat landscape of the vulnerable communities we seek to protect, identifying trends and emerging issues. Our approach to analysis keeps the human at the center of research as we seek to understand the effects of cyberattacks on people and society. We present our findings through data visualization platforms and strategic analysis reports. Our work contributes to efforts to advance respect for international law and norms in cyberspace.
every research project begins with the setting of clear intelligence requirements and the definition of research questions that need to be answered. This ensures our research stays within scope, respects ethical research principles and avoids mission creep.
manually, automatically or somewhere in between, we collect data from primary data sources, open sources and closed sources which when combined together gives us a more comprehensive understanding of the cyber risks faced by vulnerable communities.
using data pipelines we clean and normalize data and evaluate its relevance and reliability to transform it from its raw form to exploitable information usable for analysis. This step of our intelligence cycle requires close collaboration between our analysts and technical engineers.
from data discovery, statistical analysis, Social Network Analysis to geotemporal analysis, we find hidden connections within large datasets. Using data visualization and analysis tools, including dashboards and graphical link analysis software, our analysts can connect information from disparate sources to find the answers to our research questions.
Disseminate & Share
complex analysis must be accompanied by simple storytelling. Developing data-visualization platforms tailored to each research project and publishing clear reports and infographics allow us to communicate our findings with our community.
we learn from every project we deliver on. Taking on feedback from our community, our governance bodies and our partners we strive to produce improved analytical products in the future.
Sharing our findings with the community
Our Cyber Incident Tracers provide data-driven insights on the cyber threat landscape of the vulnerable communities we serve. They are developed in-house by our developers with data sourced through the regular monitoring of open sources by our experienced team of researchers. The information is made publicly available for use by policymakers, journalists, academic researchers and others.
Cyber Incident Tracers
Data-driven insights on the cyber threat landscape of vulnerable communities presented through publicly accessible data visualization platforms.
Research & Investigations
Independent and in-depth findings on the emerging and ongoing threats to vulnerable communities published through analytical reports and technical blog posts.