Upload
others
View
9
Download
0
Embed Size (px)
Citation preview
Overcoming WEBINT Challenges
Managing vast amounts of intelligence from various sources
Smart extraction of intelligence and insights from big data using artificial intelligence
Deep target profiling using social media platforms, blogs, forumsand websites
Exposing social connections, groups and inciters
Access hidden and limited information from the web
Maintaining complete anonymity using untraceable worldwideproxy infrastructure
Leveraging the new generation of the artificial intelligence technology via analyst-friendly approach
Cobwebs Technologies AI Powered WEBINT
Cobwebs Technologies is the worldwide leader in the field of web intelligence.
We introduce the next generation of targeted web intelligence powered by artificial intelligence capabilities.
Our innovative and cutting-edge systems are tailored to fit the operational needs of both national security agencies and the private sector.
Our solutions extract data, activities, relations and threats from around the web with a click of a button.
Increasing dependence on social media platforms along with easy access to open and deep web spheres, have resulted in significant growth in illegal activities over the internet.
AI Powered WEBINT is a new, advanced way of harnessing technology in the helps of extracting targeted intelligence from big data.It enables agencies to efficiently separate the wheat from the chaff within minimal time.
Advanced and easy-to-use engine for thorough and automatic web investigations, covering the surface web, deep web and social media platforms.
Attain unmatched situational awareness through real-time, online content monitoring – obtaining valuable intelligence. Extract volumes of data from various web sources such as social media platforms, blogs, forums, news sites and more. Users can easily expand a single lead into a complete end-to-end investigation. Using the smart algorithms and case management tools offered, users are able to profile targets, map groups, manage events and achieve operational dominance.
Harnessing its top-notch proprietary artificial intelligence and machine learning technologies, Tangles directly addresses the needs of private and government sectors, simply and efficiently.
Web Intelligence Engine
Coverage of countless sources
Unconventional querying for data extraction
Target details discovery and profiling
Identification of social circles and connections
Accessibility to targets with limited public information
Live data analysis and alerts
Seamless integration to new data sources
The main features provided by the
system for effective operational usage
Key Features
Analysis
Deep collection and analysis of targeted information
Supports analysis of profiles, groups, keywordsand geofences
Various output results such as posts, locations,profiles, unique identifiers and visual link analysis
Monitor
Setting criteria for real time data collection
Continuous extraction of new information
Automatic analysis of incoming results for deeperoperational insights
Alerts
Real-time insightful automatic alerts
Supports keyword dictionaries and target inputs
Reveals connections between seemingly nonrelated events and entities
Search
Advanced yet simple web querying tools
Search on multiple social networks and websitesconcurrently
Target profiling using web fingerprints reconstruction
In recent years, the volume of information stemming from the web and social networks has increased by a large scale. Its diversity has also expanded – from websites to real people.
Avatars (virtual agents) are created and operated by intelligence analysts who gather information from open sources and human sources on the web.Lynx assists analysts with creating, managing and maintaining the avatars' essential information over time, by using worldwide proxy services for safe browsing and by following the proper intelligence methodologies.
In addition, the system offers automation services to provide the analysts with relevant information in real time, a capability which significantly improves the common manual procedure of information and targets management.
Virtual HUMINT
Avatars management in various platforms
Connection to multiple accounts with one click of a button
Anonymity via global proxy infrastructure
Automatic alerts mechanism
Management and analysis of targets’ activities
Integration with various intelligence systems
Conducting HUMINT
Operations
Key Features
Anonymized Browsing
Anonymized access to the internet
Management of agent details
Wide range of locations across the globe
Web Page Data Extraction
Import text, images or complete web pages
Automated natural language processing (NLP) of web content
Entity extraction and classification
Browser Application Extension
Easy to use plug-in for quick manual analysis of websites
Complete case-management from within the browser
Selection of avatars as access points to the web
Automatic documentation of the avatar's activity
Avatars Management
Avatar profiles dashboard ensuring smooth operation
Supporting different social media platforms
Optional connectivity to Tangles and Trapdoor foroptimized end-to-end investigations
Trapdoor is an innovative web solution developed as a dynamic platform for links creation and management. The system is multipurpose; ranging from measuring and affecting mass audiences up to the remote extraction of technical details using non-intrusive methods.
The solution looks past the hardened network perimeter and client system by using innovative methods to launch directed command modules at the connected source.
The solution equips the user with the flexibility to design, create and manage any operational plan. It can handle vast amounts of connections in real time, enabling the user to easily view all the information under their domains, and to receive the relevant alerts as they happen.
Active Web Intelligence
Rebuild any link from across the web
Manage multiple connections simultaneously
Extract properties such as IP and identifiers
Trace general location and map visualization
Create unique target ID by device fingerprinting
Provide an extensive and flexible set of tools
GainingActive
Intelligence
Key Features
Social Engineering Capabilities
Influencing public opinion
Mass audience exposure
Virtual sites & pop-up menus
Web Designer
On-the-fly design of complete webpages
Design tailor-made message templates
Modify page content
Adaptation to desktop and mobile
Links Management
Selection of any relevant link from across the web
Links deployment from multiple platforms
Handling multiple connections concurrently
Actions
Automatic visitor identification and classification
Extraction of various identifiers such as IP and technical data
Unique approach which creates an online user fingerprint
Search
Identify new targets and seek for potential profiles and groups over the web using automated advanced searching capabilities
Analyze
Gain profound intelligence and access a vast amount of intelligence such as locations, context, internal relations, group structures and hierarchies.
Reveal targets and collect real-time intelligence using non-intrusive methods.Utilize social engineering tools to establish a connection with targets or
infiltrate social circles.
Engage
Complete Solution