THE CHALLENGE: Protecting Critical Infrastructure and Assets in an Increasingly Unstable World

Last year, the Department of Homeland Security created the National Risk Management Center with the goal of protecting critical infrastructure, 80% of which is owned by the private sector. The move was a recognition that nearly two decades after 9/11 (with significant efforts across private and public enterprise to better protect vital assets in the energy, financial, health, telecommunications and transportation industries) the risks are greater and more diverse than ever.

Enterprise-level security assessment, mitigation and monitoring requires that companies identify risks based on threat, vulnerability and consequence and comes at a significant cost. In North America alone, the critical infrastructure protection (CIP) market was worth $30 billion in 2018 and is anticipated to be worth $39 billion in ten years. Globally, that number jumps to $93 billion and $118 billion, respectively. Physical security is expected to account for the highest proportion of CIP spending.

As companies prepare strategies and countermeasures to address risk, the question remains: How to plan for the unknown?

More than 75% of those planning a terrorist attack used the Internet to learn about some aspect of their intended activity. And, one third of these individuals used online resources to prepare, searching for things like bomb making instructions, poison manuals, and surveillance advice. These statistics offer critical insights into the role the web – and deep web listening technologies – can play in that preparation.


Radiance (OS-INT)SM

Open Source Intelligence (OS-INT)
is a deep-web listening tool that uses machine learning and artificial intelligence to assess and prioritize risk.

OS-INT scours publicly available data across the entire Internet, correlating names entered into the system with content related to 25 different risk factors, known as Behavioral Affinity Models (BAMs), and cross-referenced with more than 1 million queries into Lumina’s proprietary databases of risk.

Searches provide near-instant results, delivering meaningful, actionable intelligence to identify and prevent risk.

Radiance (NET-INT)SM

Internet Intelligence’s (NET-INT)
proprietary algorithms continuously identify, monitor, capture, and prioritize IP addresses exhibiting anomalous behavior across multiple risk dimensions.

The system also searches known IP addresses, producing all URLs accessed by the address. Results are nearly instantaneous, and accessed with just three clicks on the computer’s mouse.

The platform collects and stores more than 1 million interactions every day and since its inception has recorded more than 838,000 IP addresses engaged with threat-related risk topics.

Radiance (HUM-INT)SM

Human Intelligence’s (HUM-INT) is powered by the S4 app, a crowd-sourced, mobile application that allows users to confidentially report concerns in real time.

THE SOLUTION: Radiance Turns Risk Management into Risk Mitigation

Radiance provides those charged with protecting critical infrastructure with timely, actionable data derived from deep web listening and analysis.

OS-INT includes more than 6,500  terms related to potential risks and associated behaviors. The platform conducts nearly 135,000 searches across all publicly-available data on the web, correlating names with these terms and cross-referencing over 1 million queries into Lumina’s proprietary databases of risk.  Unlike social media monitoring, OS-INT is not reliant on a single platform or social media API, allowing for the continuous ingestion of all open source data. OS-INT pulls all applicable content into a comprehensive report. The results are prioritized, making it easy to further analyze the findings and determine potential risk. A manual web search of this magnitude would take 1 year and 2 months for one person to complete.

NET-INT monitors IP address behavior across 43 pre-categorized behavioral dimensions, including attack planning, cyber tactics, radicalization, and insider threat behavior. NET-INT also screens IP address associated with an entity or person of interest against all IP addresses displaying anomalous behavior collected over the lifespan of the system. NET-INT identifies geographic areas where anomalous online behavior is originating. For IP addresses that can be linked to an individual or an organization, NET-INT can provide real-time insight on what the individual or institution is researching and what data streams are informing their actions.

Radiance’s HUM-INT, or S4 app can be configured as a workplace tool, allowing employees to report suspicious behavior in real time. A centralized management portal allows clients to access real-time threats to geo-fenced facility locations.

Learn how we can help protect your organization.

Learn how we can help protect your organization.

Try Radiance Today

Lumina was founded on the idea that technology is a force for good. We optimized our artificial intelligence capabilities to help keep people and places safe and secure. Protecting what matters most is more than what we do. It’s who we are.

501 E Kennedy Blvd, Tampa, FL 33602 (Headquarters)

1440 G Street NW, Washington, DC 20005

Email us at support@luminaanalytics.com