What We Investigate
Threat Actor Attribution
Identify the individuals or groups behind anonymous accounts, campaigns, or online threats.
Entity & Persona Profiling
Investigate persons of interest, sock puppet accounts, shell companies, or digital proxies using open-source and proprietary data.
Online Harassment & Targeting
Trace coordinated harassment efforts, doxxing incidents, or impersonation attempts back to their source.
Sensitive Incident Response
Provide intelligence support for incidents involving insider threats, data leaks, reputational attacks, or political targeting.
Disinformation Campaigns
Map the spread of false or harmful narratives across platforms and attribute them to specific actors or networks.
Powered by SightLine
Our investigations are supercharged by SightLine, which gives us access to:
Behavioral metadata
including escalation patterns,
targeting behavior, and
ideological alignment

30 million
affiliated accounts and digital connections
2,000+
monitored fringe forums and encrypted channels
Over 13 million
verified threat actors
This allows us to deliver not just findings — but evidence, context, and escalation analysis to support legal action, internal response, or law enforcement referral.


