Firestorm Intelligence Solutions combines leading intelligence tools with seasoned practitioners, using approaches that identify what is being said on new, social and traditional media in real-time.
We utilize threat assessment criteria to determine potential threats to individuals and others. Elevated alerts can then be adequately integrated with security and crisis management solutions and in support of:
- Internal program development
- Risk profile creation
- Threat assessments
- Escalation protocols
Let Us Help You Identify Threats Before a Crisis Occurs
- Risk of Harm
- Compliance/Legal Risk
- Operating Risk
- Reputation Risk
In-Depth Tools and Expertise
Simply having a “tool” to monitor ad collect is not enough. Expertise and experience are needed to understand the nuance of intelligence gathering.
Firestorm has this experience and has created strong partnerships with providers of intelligence gathering. We have combined best-in-class tools to keep your organization and community safer.
At Firestorm, we understand that you need a cost-effective solution that is “Listening” to all major social media platforms to determine potential threats to individuals and others. We then take listening a step further by “Looking” at very specific potential threats, risks and persons of interest.
We Listen to major social media platforms to determine potential threats.
We Look at very specific potential threats, risks and persons of interest.
Customized, Real-Time Intelligence
Our solutions combine leading intelligence tools with seasoned practitioners using approaches that identify what is being said in social and traditional media in real-time, not hours or days later. Firestorm monitoring uses key ‘indicators’, phrases, and words to provide 24/7 alerts.
These direct, real-time feeds come from all major social media networks including Twitter, Facebook, Instagram, Vine, YouTube, Reddit and many others. Firestorm employs proprietary algorithms to instantly identify potential threats and alert stakeholders to take action when needed, proactive vs. reactive.
We know what to listen for and what it all means in the right context across various types of users and regions.
In Listening, we create structured “streams” to listen to. These listening streams are customized to fit the syntax and context of your cultural environment and data intelligence needs. Streams are comprised of up to ten, keyword phrases. Keywords are words, acronyms, and hashtags, and meta-tags that may be used in the context of social conversation, traditional media mentions, and other social messages and postings that are specific to your environment. These include images and videos.
When listening streams identify a potential threat, we investigate further by Looking. We establish a ‘risk profile’ to identify the potential threats before harmful actions are taken. We then employ deeper virtual investigation approaches and alerts to avoid potential threat outcomes. Additionally, Firestorm expertise includes design, training, and implementation of behavioral risk threat assessment programs for organizations.
Firestorm provides intelligence monitoring services for clients across a wide range of industries. Learn how we can make a difference in your organization.