Intelligence

Edgeworth Security’s full-service open source intelligence solution leverages state of the art open source intelligence techniques, practices and tools with our multilingual team’s cross-disciplined expertise in order to identify, collect and report on significant information of interest as well as provide a strategic situational awareness for our customers.

 

Introduction to Open Source Intelligence

Open source intelligence as a practice has existed for the better part of this century and has been used extensively by the federal government in its military, law enforcement and intelligence efforts. It can be defined as the identification, analysis and correlation of information utilizing data tools and analytical processes. Leveraging open source intelligence allows for the identification, tracking and prediction of threats, risks and potential opportunities, and enables more informed decision-making across a variety of global interests. It is a rapidly changing field due to the combination of analytical best practices with ever-developing artificial intelligence.

With the recent emergence of open source intelligence in the private and commercial industry, the biggest challenge for the civilian sector of business and security is that organizations lack the resources and experience to build an effective open source intelligence team, and thus can’t benefit from the significant role in assisting decision making that this data could have. This is where Edgeworth Security comes in as an industry leader in open source intelligence solutions: providing new world solutions to new world problems.

Ways Our Intelligence Services can Benefit You

Vetting and Background Investigations

Data investigation into the backgrounds of people and businesses to uncover any red flags so clients can make informed business decisions and proactively protect reputations

Situational Awareness

Our suite of ongoing data collection services compile data from billions of sources worldwide to gather information that our clients deem valuable.

Global Awareness Capabilities

Data collection and risk assessments tied to the physical locations where clients may be considering; new business opportunities, visiting or holding an event.

Additional Intelligence Services

1 Insider Threats

Insider threats are always a concern when it comes to business operations and facility management. An insider threat can occur in a variety of situations, and without proper policy and procedures in place to mitigate these risks, can cause significant damage. This damage can include physical harm to customers and employees, monetary loss through theft or unintentional exposure, brand or reputation damage, and much more. By persistently monitoring various online and dark web data sources, we can help significantly reduce the insider threat risk to our customers.

What Intelligence Can Protect You Against

icon_physical-threats

Physical Threats & Risks

icon_brand-damage

Brand & Reputation Management

icon_insider-threat

Insider Threat Risks

icon_financial-loss-ugh

Financial Risks & Loss

icon_physical-threats

Event & Venue Situational Awareness

icon_brand-damage

Public Sentiment & Response

icon_personal-identity-risk

Personally Identifiable Information Risks

icon_information

Information Migration

icon_eye

Incident Awareness

Intelligence Cycle

  1. Planning and Direction

    We start by determining what needs to be learned and how best to collect that information, then creating a plan on how to achieve those goals in the most efficient way possible.

  2. Collection

    Next in the process is collecting information. Some intelligence projects only require one specific manner of collection, while others require several different avenues of collection.

  3. Processing

    This step is where our team of analysts convert the vast amount of information we collected into a form that is usable and easily understandable.

  4. Analysis and Production

    After the information has been processed, we need to analyze that raw information into intelligence that can be used. This step is also when we produce any Intelligence products required, such as reports that identify patterns and draw conclusions.

  5. Dissemination and Feedback

    The last step is to distribute this ready-to-use intelligence to our clients and take in whatever feedback they might have. This feedback is used to influence the next phase of planning and direction, whether as a continuation of the same intelligence project or a different one.

icon_phone

Call us directly at 703-939-5804 to learn more about Intelligence Solutions

Why Edgeworth?

Client Testimonials

Edgeworth Security has been an invaluable asset to me during the most frightening time of my life. I have been physically and virtually stalked by my ex-boyfriend for months and the Edgeworth team has created reports for me to show evidence that unidentified numbers texting me were linked to my ex, and identify online accounts associated with him. Because I hired Edgeworth, the police have been able to use this information to help me in my case that I may not have received help with otherwise. Chad Brockway specifically has been a fierce ally for me during this season. He is always available for my questions and has given excellent insight to me as I’ve had to work with law enforcement for the first time. Chad is not only readily available, he is a clear communicator who ensures you understand everything you may have questions about. As a woman who has lived in fear, Chad has also been more empathetic than many officers I have dealt with, and that has helped on an emotional level as well. I have hired Edgeworth twice now for reports and I highly recommend them!

Confidential Client

Edgeworth intelligence gives us incredible peace of mind in managing both our personal and business day-to-day operations. Their ability to identify important information in a timely manner has been invaluable to us.

Bret Michaels MEGI & Poison

In the age of ever growing technology, it is comforting to know we have a watchdog ensuring our continued safety and security through the digital world.

Clients of PCG In partnership of PCG, Hollywood PR Firm

FAQ

What is Open Source Intelligence?

Do you offer crisis management services?

In the event of an immediate need, how long does it take to start on a requirement?

When do you offer Intelligence services?

What is the billing structure like for intelligence services?

Our Intelligence Experts

Chad Brockway

Chad Brockway

President, Intelligence Operations Division

Chad Brockway leverages his background in intelligence, counterintelligence, counter-terrorism, federal law enforcement and cyber operations to develop Edgeworth’s state of the art cyber and information security solutions.

Chad was formerly Director of Account Management at Babel Street, senior program manager for The Wynyard Group, FBI Special Technologies & Applications Section’s Program Manager, DoD Deputy Watch Center Director, and Marine Corps Military Police Officer. He has been interviewed by Forbes, CNET and Fortune, and received the FBI Directors Award and the Presidential Service Badge.

Mike Hughes

Mike Hughes

Director of Intelligence

Prior to joining Edgeworth, Michael worked as a civilian intelligence analyst for U.S. Special Operations. Michael has worked closely with representatives of numerous U.S. government agencies and has garnered an abundance of experience seeking interagency solutions to some of the toughest national intelligence issues. During his time in the federal space, Michael served as a senior analyst for interagency, multinational task forces where he was responsible for developing “in theater” intelligence assessments for military commanders, U.S. government leaders and other operational elements.

Emily Watchek

Emily Watchek

Chief Intelligence Officer

Prior to her work at Edgeworth, Emily worked as an intelligence analyst at a private commercial company based in Washington, D.C. During her time there, she supported a variety of intelligence operations for the U.S. government, private sector businesses and foreign intelligence and law enforcement partnerships. Her education of a double major in international relations and rhetorical communications, combined with a minor in Arabic language, has made her an essential participant in several counterterrorism operations and the GWOT.​

Intelligence Articles

icon_camera-2

Go further - Combine your system with Remote Guarding

*
*
*
*

By providing my phone number to Edgeworth Security, I agree and acknowledge that Edgeworth Security may send text messages to my wireless phone number for any purpose. Message and data rates may apply. Message frequency will vary, and you will be able to opt-out by replying "STOP".

No mobile information will be shared with third parties/affiliates for marketing/promotional purposes. All the above categories exclude text messaging originator opt-in data and consent; this information will not be shared with any third parties.

Speak with a specialist today
icon_phone800-421-9130
icon_email info@edgeworthsecurity.com