Edgeworth Security’s full-service open source intelligence solution leverages state of the art open source intelligence techniques, practices and tools with our multilingual team’s cross-disciplined expertise in order to identify, collect and report on significant information of interest as well as provide a strategic situational awareness for our customers.
Open source intelligence as a practice has existed for the better part of this century and has been used extensively by the federal government in its military, law enforcement and intelligence efforts. It can be defined as the identification, analysis and correlation of information utilizing data tools and analytical processes. Leveraging open source intelligence allows for the identification, tracking and prediction of threats, risks and potential opportunities, and enables more informed decision-making across a variety of global interests. It is a rapidly changing field due to the combination of analytical best practices with ever-developing artificial intelligence.
With the recent emergence of open source intelligence in the private and commercial industry, the biggest challenge for the civilian sector of business and security is that organizations lack the resources and experience to build an effective open source intelligence team, and thus can’t benefit from the significant role in assisting decision making that this data could have. This is where Edgeworth Security comes in as an industry leader in open source intelligence solutions: providing new world solutions to new world problems.
Data investigation into the backgrounds of people and businesses to uncover any red flags so clients can make informed business decisions and proactively protect reputations
In today’s world of political correctness and virtual association, there isn’t always enough time or opportunity to fully understand or identify the risks of who you are doing business with. Our business vetting services allow our customs to have a better understanding of aspects which may be of concern or risk. Whether it’s employees, services, or creating new partnerships or acquisitions, we provide the necessary information to our customers so they can make more informed decisions and eliminate the risk of the unknown or undiscovered.
The complete vetting and background investigation of an employee, individual of interest or group which includes insider threats, criminal histories, financial findings, positive or negatively impacting information, risky or adverse behavior or business dealings, social network analysis and more.
Our suite of ongoing data collection services compile data from billions of sources worldwide to gather information that our clients deem valuable.
Whether a single individual or a corporate entity, our monitored subscription services allow our customers to gain valuable insight to the information they care about most. Our persistent cyber intelligence capability is constantly looking for and collecting from billions of sources worldwide. We search for a wide variety of information which includes physical threats and risks, personal and facility security and safety, insider threats, injuries or illness, brand or PR risks, revenue/monetary risk or loss, intellectual property risk or loss, cyber threats or risks and more.
Your personally identifiable information (PII) is very valuable. It composes everything that makes you who you are in the digital world. The exposure of this data has the potential to cause significant damage, both monetarily and from a safety perspective. Our PII identification and mitigation service works on a persistent basis to identify where your information is being made available across the open source internet and Dark Web, and then works to get that information removed or changed so that it no longer presents a risk to our customers or their family.
A company’s brand and reputation are essential parts of its marketing, customer base, and business relationships. Being able to identify how a company’s products or presence is being related to by the outside world can often provide a significant edge in business strategy and awareness. By applying general public collection and sentiment analysis, we can help provide that critical information for more informed decision making.
Data collection and risk assessments tied to the physical locations where clients may be considering; new business opportunities, visiting or holding an event.
Our customers operate on a global level, which can make it challenging to always have the convenience of knowledge and security while on travel. Our area of interest (AOI) assessment services allow our customers to travel with better awareness and information to keep themselves, their families, and their business interests more secure. Our area of interest (AOI) assessment services can provide timely geographic relative information such as local crime, emergency travel routes, medical concerns and services, local events or travel impacts, political concerns, weather, terrorist activity, relevant social media data and more.
Popular venues and events present a very appealing target to anyone looking to carry out nefarious activities. Our venue and event coverage services begin to identify and prevent threats and risks days or weeks in advance. Our tools and analysts work to identify a wide variety of threats and risks such as physical attacks, revenue or monetary loss, planned violence or protests, breaching attempts, and much more. Our event coverage services continue live, through the actual event, and then afterwards to provide post event awareness as well.
Insider threats are always a concern when it comes to business operations and facility management. An insider threat can occur in a variety of situations, and without proper policy and procedures in place to mitigate these risks, can cause significant damage. This damage can include physical harm to customers and employees, monetary loss through theft or unintentional exposure, brand or reputation damage, and much more. By persistently monitoring various online and dark web data sources, we can help significantly reduce the insider threat risk to our customers.
Intellectual Property (IP) is a significant part of a business’s day to day operations and is often directly linked to its revenue stream. An incident involving the loss of a company’s IP can cause significant and often times irreparable damage. The loss of a company’s IP can take place for many reasons such as an employee (either intentional or unintentional), company data leakage, or a direct attack and compromise of the information. We help our customers to identify and mitigate any threat or risk of IP loss through our experienced process of risk identification both before and after an incident occurs.
The loss or theft of property that occurs at a company can result in significant monetary damage, not only to the company but to its customers as well. Prevention is always the key factor in dealing with the loss or theft of property, but being able to identifying the details of a loss or theft after the incident is a significant factor as well. By monitoring public market places for the sale, mention, or discussion around lost or stolen property, we can help with all aspects of this problem.
A company’s employee force can represent all of the best things about a company’s brand, product, and public perception. That’s why it’s very important to understand as much as possible about your employees when it comes to hiring, HR issues, risks or threats, and other personnel concerns. By utilizing federal data bases, subscription reporting services and publicly available information across social media and other public interest sites, we help our customers to be more aware of any existing or potential threats or risks from personnel.
A pattern of life analysis is the method of information collection and surveillance that is utilized for documenting and understanding a subjects standard habits. Our pattern of life analysis encompasses several different types of data points including internet presence and social media involvement, physical patterns of travel or location, social network associations and participations, habits or repetitive actions, and more. This information can be very valuable in being able to monitor or predict a specific individuals “next move”.
Physical threats and risks can occur for a variety of different reasons. These threats and risks can consist of unsafe facility structures or equipment, active threats or terrorism, improper policy or procedure, employee or customer risks, and much more. In today’s world of social media and making information available online, there is a good chance someone has posted or shared information which can help identify these threats or risks before they become a problem.
Being able to secure a facility or area from unauthorized access is often times very challenging for a business and represents one of the largest security concerns in today’s world. Whether it’s counterfeit badges or passes, gaps in access control, or insider threats, we are helping our customers to identify any threats or risks to their access controls before they become an issue. In the event that an unauthorized access has already occurred, we help our customers to identify the key aspects of the breach in order to investigate the situation and prevent it in the future.
Many of our high profile/high net worth customers face problems with being targeted by individuals or special interest groups. Our intelligence services help identify these threats and risks in advance as well as investigate incidents that are already in motion or have already taken place.
We start by determining what needs to be learned and how best to collect that information, then creating a plan on how to achieve those goals in the most efficient way possible.
Next in the process is collecting information. Some intelligence projects only require one specific manner of collection, while others require several different avenues of collection.
This step is where our team of analysts convert the vast amount of information we collected into a form that is usable and easily understandable.
After the information has been processed, we need to analyze that raw information into intelligence that can be used. This step is also when we produce any Intelligence products required, such as reports that identify patterns and draw conclusions.
The last step is to distribute this ready-to-use intelligence to our clients and take in whatever feedback they might have. This feedback is used to influence the next phase of planning and direction, whether as a continuation of the same intelligence project or a different one.
30+ years of experience in intelligence investigations.
Our team utilizes "Open Source" data from across the internet including Dark Web data sources.
Our team is able to collect from hundreds of thousands of mainstream websites and over a billion others worldwide
Our suite of tools collect from over 200,000 open source and subscription databases.
Our team has access to all major social media sites as well as many other lesser known ones.
Our team is able to collect and translate data in over 220+ languages.
Our tools run in a persistent state of collection, twenty-four hours a day and seven days a week.
Agile collection and reporting (crisis management support)
Clients of PCG In partnership of PCG, Hollywood PR FirmIn the age of ever growing technology, it is comforting to know we have a watchdog ensuring our continued safety and security through the digital world.
Confidential Client Political Activist GroupEdgeworth intelligence has been the most valuable partner in ensuring the safety and security of our organization and people. As a high-profile organization, we frequently have varying needs with difficult timelines, and Edgeworth never ceases to deliver the best services. We are grateful for their unwavering dedication to our security, and we always feel safe in their hands.
Roberts Morris University Private University in PennsylvaniaEdgeworth Security has been an invaluable resource in helping us to address campus safety and security concerns in a manner that is sensitive to the privacy of all stakeholders. With expertise in both physical and cyber security, Edgeworth provides comprehensive solutions that are tailored and scaled to meet the client’s needs.
Confidential ClientEdgeworth Security has been an invaluable asset to me during the most frightening time of my life. I have been physically and virtually stalked by my ex-boyfriend for months and the Edgeworth team has created reports for me to show evidence that unidentified numbers texting me were linked to my ex, and identify online accounts associated with him. Because I hired Edgeworth, the police have been able to use this information to help me in my case that I may not have received help with otherwise. Chad Brockway specifically has been a fierce ally for me during this season. He is always available for my questions and has given excellent insight to me as I’ve had to work with law enforcement for the first time. Chad is not only readily available, he is a clear communicator who ensures you understand everything you may have questions about. As a woman who has lived in fear, Chad has also been more empathetic than many officers I have dealt with, and that has helped on an emotional level as well. I have hired Edgeworth twice now for reports and I highly recommend them!
Bret Michaels MEGI & PoisonEdgeworth intelligence gives us incredible peace of mind in managing both our personal and business day-to-day operations. Their ability to identify important information in a timely manner has been invaluable to us.
Clients of PCG In partnership of PCG, Hollywood PR FirmIn the age of ever growing technology, it is comforting to know we have a watchdog ensuring our continued safety and security through the digital world.
Confidential Client Political Activist GroupEdgeworth intelligence has been the most valuable partner in ensuring the safety and security of our organization and people. As a high-profile organization, we frequently have varying needs with difficult timelines, and Edgeworth never ceases to deliver the best services. We are grateful for their unwavering dedication to our security, and we always feel safe in their hands.
Roberts Morris University Private University in PennsylvaniaEdgeworth Security has been an invaluable resource in helping us to address campus safety and security concerns in a manner that is sensitive to the privacy of all stakeholders. With expertise in both physical and cyber security, Edgeworth provides comprehensive solutions that are tailored and scaled to meet the client’s needs.
Confidential ClientEdgeworth Security has been an invaluable asset to me during the most frightening time of my life. I have been physically and virtually stalked by my ex-boyfriend for months and the Edgeworth team has created reports for me to show evidence that unidentified numbers texting me were linked to my ex, and identify online accounts associated with him. Because I hired Edgeworth, the police have been able to use this information to help me in my case that I may not have received help with otherwise. Chad Brockway specifically has been a fierce ally for me during this season. He is always available for my questions and has given excellent insight to me as I’ve had to work with law enforcement for the first time. Chad is not only readily available, he is a clear communicator who ensures you understand everything you may have questions about. As a woman who has lived in fear, Chad has also been more empathetic than many officers I have dealt with, and that has helped on an emotional level as well. I have hired Edgeworth twice now for reports and I highly recommend them!
Bret Michaels MEGI & PoisonEdgeworth intelligence gives us incredible peace of mind in managing both our personal and business day-to-day operations. Their ability to identify important information in a timely manner has been invaluable to us.
Clients of PCG In partnership of PCG, Hollywood PR FirmIn the age of ever growing technology, it is comforting to know we have a watchdog ensuring our continued safety and security through the digital world.
Confidential Client Political Activist GroupEdgeworth intelligence has been the most valuable partner in ensuring the safety and security of our organization and people. As a high-profile organization, we frequently have varying needs with difficult timelines, and Edgeworth never ceases to deliver the best services. We are grateful for their unwavering dedication to our security, and we always feel safe in their hands.
Roberts Morris University Private University in PennsylvaniaEdgeworth Security has been an invaluable resource in helping us to address campus safety and security concerns in a manner that is sensitive to the privacy of all stakeholders. With expertise in both physical and cyber security, Edgeworth provides comprehensive solutions that are tailored and scaled to meet the client’s needs.
Open Source Intelligence is the system by which we collect, understand, and process data from publicly available sources. With this system, we are able to keep your organization running smoothly by gaining a comprehensive understanding of known and unknown threats on social networks, the dark web, and other platforms and channels.
We do offer one-time crisis management services in the event of an immediate need. These crisis management services can be used in conjunction with our subscription services.
We can begin as quickly as you can provide the necessary information. It takes us minutes to get started on new requirements (requirements meaning the intelligence needs of our clients). It’s never too late to bring our Intelligence services in to help mitigate adverse effects.
We offer our Intelligence services before, during, and after a particular event or incident. Live, 24/7 coverage is available.
Billing is on an hourly basis, similar to law firm billing. For ongoing services clients commit to monthly retainers, based on an estimation of services needed.
Chad Brockway leverages his background in intelligence, counterintelligence, counter-terrorism, federal law enforcement and cyber operations to develop Edgeworth’s state of the art cyber and information security solutions.
Chad was formerly Director of Account Management at Babel Street, senior program manager for The Wynyard Group, FBI Special Technologies & Applications Section’s Program Manager, DoD Deputy Watch Center Director, and Marine Corps Military Police Officer. He has been interviewed by Forbes, CNET and Fortune, and received the FBI Directors Award and the Presidential Service Badge.
Prior to joining Edgeworth, Michael worked as a civilian intelligence analyst for U.S. Special Operations. Michael has worked closely with representatives of numerous U.S. government agencies and has garnered an abundance of experience seeking interagency solutions to some of the toughest national intelligence issues. During his time in the federal space, Michael served as a senior analyst for interagency, multinational task forces where he was responsible for developing “in theater” intelligence assessments for military commanders, U.S. government leaders and other operational elements.
Prior to her work at Edgeworth, Emily worked as an intelligence analyst at a private commercial company based in Washington, D.C. During her time there, she supported a variety of intelligence operations for the U.S. government, private sector businesses and foreign intelligence and law enforcement partnerships. Her education of a double major in international relations and rhetorical communications, combined with a minor in Arabic language, has made her an essential participant in several counterterrorism operations and the GWOT.
As one of the largest post-production studios in the world, Technicolor needed a comprehensive security solution that would not only protect their staff and physical properties but also protect very sensitive intellectual property including footage of m...
Edgeworth Security’s Cyber Operations Division leverages state of the art cyber intelligence solutions with our team’s cross-disciplined expertise in intelligence, counterintelligence, federal law enforcement, and cyber operations to provide securit...
Edgeworth Security’s Open-Source Intelligence Division has 20 years of intelligence experience providing access to valuable information to our clients. By using intelligence collection tools to continuously accumulate data from all sides of the internet, on any topic our clients request, our Intelligence agents can then process the raw data into easily understandable intelligence reports for our clients, helping them make the best decisions possible.