Intelligence Analysis

  • Yellow police tape with "POLICE LINE DO NOT CROSS" text in front of blurred emergency lights.

    Filling in the Crime Intelligence Gaps with Entity Extraction

    Law enforcement agencies like the FBI receive high volumes of critical information in the form of unstructured data. Gleaning insights…

    View Post

  • Stacks of U.S. hundred dollar bills bound with yellow paper bands.

    Identity Resolution: a Critical Technology in Anti-Money Laundering

    Money laundering is a main risk for financial institutions. An important part of AML due diligence is to screen prospective…

    View Post

  • Multiple red, white, and blue campaign buttons with "VOTE" text and stars.

    Calling the Election: Sentiment Analysis for Election Campaign Monitoring

    The explosion of social media has made available an unprecedented amount of opinion data of great value when monitoring election…

    View Post

  • Multiple high-voltage electrical transmission towers silhouetted against an orange sunset sky.

    Knowledge is Power: Entity Extraction for Cyber Threat Intelligence

    Cyber attacks are one of the top threats in today’s world. Traditional cyber security has focused on network activity logs.…

    View Post

  • Sentiment Analysis for Geopolitical Monitoring

    The Critical Value of Sentiment Analysis for Geopolitical Monitoring

    Sentiment Analysis software helps structure, aggregate, and analyze large amounts of open source data for geopolitical monitoring.

    View Post

  • entity extraction for intelligence

    Finding the Needle in the Haystack: Entity Extraction and National Security

    Intelligence analysts are faced with staggering amounts of unstructured data. Advanced Entity Extraction helps them find the needle in the…

    View Post

  • Mining Unstructured Data for Competitive Intelligence

    Mining Unstructured Data for Competitive Intelligence

    In today’s global and fast-paced business world, it’s imperative to monitor one’s competitor landscape closely.

    View Post

  • identity resolution

    How Entity Matching Can Be Critical to Analyze Terrorist Networks

    Through fuzzy matching of entity records, Entity Matching uncovers critical connections for the successful social network analysis of terrorist networks.

    View Post

  • entity extraction

    Entity Extraction Makes Open Source Intelligence Analysis Easier

    Entity Extraction technology enables organizations to sift through unstructured Open Source Intelligence (OSINT) data swiftly for accurate and timely OSINT…

    View Post

  • geotagging software

    Why Simple Geotagging Software Isn’t Enough to Create a Map from Text

    Geotagging software automatically identifies spatial references in text and assigns latitude and longitude values to those. The challenge is the…

    View Post

  • link extraction

    Three Musts for Link Extraction Software

    Link Extraction is an extremely useful technology to mine unstructured data. However, no all Link Extraction software is created equal.

    View Post