SlideShare a Scribd company logo
1 of 4
Download to read offline
OPENMIND
Generate Valuable
Intelligence from
Open Source
Information
The OSINT Challenge
Introducing OpenMIND
Open source intelligence (OSINT) is intelligence derived from publicly available data sources such as the media,
government, professional and academic sources, geospatial data and of course the Internet. OSINT today is commonly
used as a critical information source by intelligence and law enforcement organizations.
The Internet provides an endless source of diverse data—from factual information such as flight schedules and
government websites to personal information uploaded by users in social networks, blogs, forums and talkbacks. In
fact, some crucial information about entities, connections between entities and the public’s state of mind can only be
found online.
Moreover, enabled by social media, the Internet has become an arena in which criminal activity is conducted around the
clock. Terrorists, pedophiles, human traffickers and other offenders use the Internet for their illegal activities.
Unfortunately, gathering intelligence from the Internet is a difficult task. The Internet’s exponentially expanding volumes
of information make it difficult to find relevant information; data is frequently scattered across multiple locations, formats
and languages; and because information is constantly updated, it is difficult to keep track of changes.
Using search engines to collect OSINT presents several challenges. For one, search engines return long lists of results.
Secondly, most Deep Web data—data that requires user actions such as subscribing to a site or generating a query—
cannot be reached by search engines. Moreover, there is the risk of exposing a search term or the analyst’s identity, which
can cause a security breach.
Because of these and other challenges, it is extremely difficult and tedious to collect and process data. However, OSINT
can find unique information, adding tremendous value to online investigation and research efforts.
OpenMIND™, 3i-MIND’s innovative OSINT solution, was developed specifically for intelligence and law enforcement
agencies. It enables agencies to not only collect data efficiently, effectively and legally, but to automatically process and
analyze that data, thereby ensuring its relevance and importance. OpenMIND automatically finds suspicious patterns and
behaviors and reduces ongoing dependency on expert analysts in order to achieve high-quality results.
3i-MIND’s OpenMIND provides end-to-end open source intelligence collection, analysis and management. It enables
intelligence organizations to collect, process and analyze open source data easily, quickly and effectively.
OpenMIND is easy to use and offers a wide set of automated capabilities that helps analysts tackle ongoing research
and investigations and generate new leads. The platform’s powerful, comprehensive search and gather capabilities
along with its robust security measures maintain the complete security of organizational content and anonymity of
searches and queries.
OpenMIND helps analysts to find insights they were not even looking for, about entities they had not previously queried.
It also helps to pinpoint specific websites not regularly monitored that may be relevant to research being performed. Thus,
even analysts who are not OSINT experts can use OpenMIND to generate valuable intelligence.
Reach Relevant Information - Targeted Acquisition
OpenMIND broadens analysts’ access to information. By removing obstacles such as the Deep Web and language barriers
and through use of strong collection capabilities, OpenMIND helps analysts to reach relevant information that is otherwise
inaccessible. Additionally, OpenMIND filters out irrelevant information to reduce noise and help analysts focus on
important information.
Social Media Support
Social media, including social networks, forums, blogs and chat rooms, is a valuable source for locating unique intelligence
not found elsewhere. OpenMIND lawfully collects, processes and presents data from social media, surfacing valuable
insights and generating relevant reports.
Reduce Noise - Semantic Analysis
Internet data in the form of text is unstructured and difficult to analyze. OpenMIND offers a powerful semantic processing
engine that analyzes text according to its semantic meaning and context. This semantic engine supports a wide set of
capabilities, including extraction of relations between entities, disambiguation (to distinguish, for example, between C4
the explosive and C4 the car), semantic searches (e.g., search for “Apache” or “Blackhawk” instead of “helicopter”) and
others that enable the system to “understand” text and find relevant information within data.
Surface Insights - Analysis Tools
OpenMIND offers a set of powerful analysis tools, including visual link analysis, text analysis, timelines, statistics, alerts and
reports. Users can define suspect profiles such that matches will automatically surface. OpenMIND turns collected data
into intelligence.
Efficient and Effective Work - Specialized OSINT Methodology
All OpenMIND system workflows were designed to support efficient and effective OSINT collection and analysis. Source
management, priority intelligence requirement (PIR) management, rule-based alerts, statistics, etc. are all useful tools
that are available to guide analysts in their daily work. Workflows are also flexible to ensure that OpenMIND supports an
organization’s existing workflows and regulations.
Find the “Unknown Unknown”
OpenMIND proactively finds insights, even if a user has no clues or leads about their topic. The system automatically
performs legal searches for forums, websites, social networks, etc. associated with a researched topic. It then identifies
active site users, generates alerts and finds patterns and abnormalities to reach keen insights.
Detection of Trends and Abnormalities in Websites
OpenMIND monitors website activities to find patterns and OpenMIND users can choose to be alerted to changes in those
patterns when statistical analysis of regularly monitored websites is employed. Forum leaders can be identified; blog posts
extracted; peaks recognized; and traffic spikes detected. A user can be notified of any suspicious activity.
The OpenMIND Difference
Why OpenMIND
•	 Focus—OpenMIND will become your organization’s primary Internet, containing only relevant data and eliminating
all online “noise”
•	 Methodology—An OSINT solution developed specifically for intelligence and law enforcement agencies
•	 Leadless Investigation—Insights are surfaced, helping analysts find things they didn’t know they were looking for
•	 Easy to use—Even novice researchers benefit from OpenMIND, allowing experts to focus on higher-level tasks
•	 Intelligence—Data is interpreted and presented in new ways in order to generate valuable intelligence
3i-MIND Technologies GmbH, Fortunagasse 28, 8001 Zurich, Switzerland, sales@3i-mind.com
© 2011 3i-MIND GmbH all rights reserved. The information and materials published herein, are provided “as is” and are subject to
change without prior notice. You may not publish, reproduce, disclose or transmit these materials, in any form or by any means, or
store these on any retrieval system of any nature without prior permission of 3i-MIND GmbH. www.3i-mind.com
About 3i-MIND
3i-MIND is the pioneer in a new category of technology that leverages data, operational know-how, and
human intuition to dramatically advance the value of intelligence and insights. Our customers include
the world’s most demanding government and security organizations, urban authorities, law enforcement
organizations. We apply ground-breaking technologies, machine learning, modeling, and decision-
support systems across our proprietary 3i-MIND Framework – making it simple to acquire real-time and
comprehensive knowledge, even in the most complex of environments.

More Related Content

What's hot

Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)festival ICT 2016
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)phexcom1
 
The Surveillance Project is Real
The Surveillance Project is RealThe Surveillance Project is Real
The Surveillance Project is RealChristos Beretas
 
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective AugmentedWorldExpo
 
Are you aware of the threat intelligence platform open source?
Are you aware of the threat intelligence platform open source?Are you aware of the threat intelligence platform open source?
Are you aware of the threat intelligence platform open source?securaa
 
Are you aware of the threat intelligence platform open source?
Are you aware of the threat intelligence platform open source?Are you aware of the threat intelligence platform open source?
Are you aware of the threat intelligence platform open source?securaa
 

What's hot (9)

Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
 
Information gatherimg
Information gatherimgInformation gatherimg
Information gatherimg
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 
The Surveillance Project is Real
The Surveillance Project is RealThe Surveillance Project is Real
The Surveillance Project is Real
 
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
 
AML Knowledge Graph
AML Knowledge GraphAML Knowledge Graph
AML Knowledge Graph
 
Are you aware of the threat intelligence platform open source?
Are you aware of the threat intelligence platform open source?Are you aware of the threat intelligence platform open source?
Are you aware of the threat intelligence platform open source?
 
Are you aware of the threat intelligence platform open source?
Are you aware of the threat intelligence platform open source?Are you aware of the threat intelligence platform open source?
Are you aware of the threat intelligence platform open source?
 

Similar to 3i mind-open mind-web

Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019Priyanka Aash
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wpCMR WORLD TECH
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligencebalakumaran779
 
Steven Greschner - About Me
Steven Greschner  - About MeSteven Greschner  - About Me
Steven Greschner - About MeNextNet Partners
 
What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)Molfar
 
Using Predictive Analytics for Anticipatory Investigation and Intervention
Using Predictive Analytics for Anticipatory Investigation and InterventionUsing Predictive Analytics for Anticipatory Investigation and Intervention
Using Predictive Analytics for Anticipatory Investigation and InterventionJon Gosier
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
Top 6 Sources for Identifying Threat Actor TTPs
Top 6 Sources for Identifying Threat Actor TTPsTop 6 Sources for Identifying Threat Actor TTPs
Top 6 Sources for Identifying Threat Actor TTPsRecorded Future
 
SFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfSFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfBecky Burwell
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkillijtsrd
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Providing real time decision support to Prevent coordinators
Providing real time decision support to Prevent coordinatorsProviding real time decision support to Prevent coordinators
Providing real time decision support to Prevent coordinatorsJisc
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionSeamus Tuohy
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
Empowering organisations with Trojan Hunt India encrypted communication suite...
Empowering organisations with Trojan Hunt India encrypted communication suite...Empowering organisations with Trojan Hunt India encrypted communication suite...
Empowering organisations with Trojan Hunt India encrypted communication suite...Trojan Hunt India
 
Apply OSINT Research and Presentation [due Day 7]Assignment.docx
Apply OSINT Research and Presentation [due Day 7]Assignment.docxApply OSINT Research and Presentation [due Day 7]Assignment.docx
Apply OSINT Research and Presentation [due Day 7]Assignment.docxjesuslightbody
 

Similar to 3i mind-open mind-web (20)

Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
 
OpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptxOpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptx
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
1482734.ppt
1482734.ppt1482734.ppt
1482734.ppt
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
 
Steven Greschner - About Me
Steven Greschner  - About MeSteven Greschner  - About Me
Steven Greschner - About Me
 
What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)
 
Using Predictive Analytics for Anticipatory Investigation and Intervention
Using Predictive Analytics for Anticipatory Investigation and InterventionUsing Predictive Analytics for Anticipatory Investigation and Intervention
Using Predictive Analytics for Anticipatory Investigation and Intervention
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Top 6 Sources for Identifying Threat Actor TTPs
Top 6 Sources for Identifying Threat Actor TTPsTop 6 Sources for Identifying Threat Actor TTPs
Top 6 Sources for Identifying Threat Actor TTPs
 
SFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfSFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdf
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkill
 
Threat intelligence minority report
Threat intelligence minority reportThreat intelligence minority report
Threat intelligence minority report
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Web forensics
Web forensicsWeb forensics
Web forensics
 
Providing real time decision support to Prevent coordinators
Providing real time decision support to Prevent coordinatorsProviding real time decision support to Prevent coordinators
Providing real time decision support to Prevent coordinators
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence Collection
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
Empowering organisations with Trojan Hunt India encrypted communication suite...
Empowering organisations with Trojan Hunt India encrypted communication suite...Empowering organisations with Trojan Hunt India encrypted communication suite...
Empowering organisations with Trojan Hunt India encrypted communication suite...
 
Apply OSINT Research and Presentation [due Day 7]Assignment.docx
Apply OSINT Research and Presentation [due Day 7]Assignment.docxApply OSINT Research and Presentation [due Day 7]Assignment.docx
Apply OSINT Research and Presentation [due Day 7]Assignment.docx
 

More from PublicLeaker

Alec wi weber_media_baseball_game
Alec wi weber_media_baseball_gameAlec wi weber_media_baseball_game
Alec wi weber_media_baseball_gamePublicLeaker
 
Alec wi weber_media
Alec wi weber_mediaAlec wi weber_media
Alec wi weber_mediaPublicLeaker
 
Alec wi tf_meeting_issue_alerts
Alec wi tf_meeting_issue_alertsAlec wi tf_meeting_issue_alerts
Alec wi tf_meeting_issue_alertsPublicLeaker
 
Alec wi right_on_crime
Alec wi right_on_crimeAlec wi right_on_crime
Alec wi right_on_crimePublicLeaker
 
Alec wi records_request_1
Alec wi records_request_1Alec wi records_request_1
Alec wi records_request_1PublicLeaker
 
Alec wi obamacare_louisiana_awards
Alec wi obamacare_louisiana_awardsAlec wi obamacare_louisiana_awards
Alec wi obamacare_louisiana_awardsPublicLeaker
 
Alec wi misc_news__issues
Alec wi misc_news__issuesAlec wi misc_news__issues
Alec wi misc_news__issuesPublicLeaker
 
Alec wi hale_emails_baseball_game_tf_appointments
Alec wi hale_emails_baseball_game_tf_appointmentsAlec wi hale_emails_baseball_game_tf_appointments
Alec wi hale_emails_baseball_game_tf_appointmentsPublicLeaker
 
Alec in arizona_2013
Alec in arizona_2013Alec in arizona_2013
Alec in arizona_2013PublicLeaker
 
Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...
Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...
Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...PublicLeaker
 
Aclu hodai-v.-tpd-final-complaint-and-exhibits-03.03.14-hodai-v-tpd-complaint
Aclu hodai-v.-tpd-final-complaint-and-exhibits-03.03.14-hodai-v-tpd-complaintAclu hodai-v.-tpd-final-complaint-and-exhibits-03.03.14-hodai-v-tpd-complaint
Aclu hodai-v.-tpd-final-complaint-and-exhibits-03.03.14-hodai-v-tpd-complaintPublicLeaker
 
Abc 2010 state-legislative-handbook
Abc 2010 state-legislative-handbookAbc 2010 state-legislative-handbook
Abc 2010 state-legislative-handbookPublicLeaker
 
1224302 0-288 a-de-106943-section-1-serial-1-cover-sheet-mediapage
1224302 0-288 a-de-106943-section-1-serial-1-cover-sheet-mediapage1224302 0-288 a-de-106943-section-1-serial-1-cover-sheet-mediapage
1224302 0-288 a-de-106943-section-1-serial-1-cover-sheet-mediapagePublicLeaker
 
12.9.2011 crac agenda
12.9.2011 crac agenda12.9.2011 crac agenda
12.9.2011 crac agendaPublicLeaker
 
12.09.2011 crac-unapproved-minutes
12.09.2011 crac-unapproved-minutes12.09.2011 crac-unapproved-minutes
12.09.2011 crac-unapproved-minutesPublicLeaker
 
12.09.2011 attachment-f
12.09.2011 attachment-f12.09.2011 attachment-f
12.09.2011 attachment-fPublicLeaker
 

More from PublicLeaker (20)

Alec 990-2010
Alec 990-2010Alec 990-2010
Alec 990-2010
 
Alec wi weber_media_baseball_game
Alec wi weber_media_baseball_gameAlec wi weber_media_baseball_game
Alec wi weber_media_baseball_game
 
Alec wi weber_media
Alec wi weber_mediaAlec wi weber_media
Alec wi weber_media
 
Alec wi tf_meeting_issue_alerts
Alec wi tf_meeting_issue_alertsAlec wi tf_meeting_issue_alerts
Alec wi tf_meeting_issue_alerts
 
Alec wi right_on_crime
Alec wi right_on_crimeAlec wi right_on_crime
Alec wi right_on_crime
 
Alec wi records_request_1
Alec wi records_request_1Alec wi records_request_1
Alec wi records_request_1
 
Alec wi obamacare_louisiana_awards
Alec wi obamacare_louisiana_awardsAlec wi obamacare_louisiana_awards
Alec wi obamacare_louisiana_awards
 
Alec wi obamacare
Alec wi obamacareAlec wi obamacare
Alec wi obamacare
 
Alec wi misc_news__issues
Alec wi misc_news__issuesAlec wi misc_news__issues
Alec wi misc_news__issues
 
Alec wi hale_emails_baseball_game_tf_appointments
Alec wi hale_emails_baseball_game_tf_appointmentsAlec wi hale_emails_baseball_game_tf_appointments
Alec wi hale_emails_baseball_game_tf_appointments
 
Alec new jersey
Alec new jerseyAlec new jersey
Alec new jersey
 
Alec in arizona_2013
Alec in arizona_2013Alec in arizona_2013
Alec in arizona_2013
 
Agreement
AgreementAgreement
Agreement
 
Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...
Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...
Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...
 
Aclu hodai-v.-tpd-final-complaint-and-exhibits-03.03.14-hodai-v-tpd-complaint
Aclu hodai-v.-tpd-final-complaint-and-exhibits-03.03.14-hodai-v-tpd-complaintAclu hodai-v.-tpd-final-complaint-and-exhibits-03.03.14-hodai-v-tpd-complaint
Aclu hodai-v.-tpd-final-complaint-and-exhibits-03.03.14-hodai-v-tpd-complaint
 
Abc 2010 state-legislative-handbook
Abc 2010 state-legislative-handbookAbc 2010 state-legislative-handbook
Abc 2010 state-legislative-handbook
 
1224302 0-288 a-de-106943-section-1-serial-1-cover-sheet-mediapage
1224302 0-288 a-de-106943-section-1-serial-1-cover-sheet-mediapage1224302 0-288 a-de-106943-section-1-serial-1-cover-sheet-mediapage
1224302 0-288 a-de-106943-section-1-serial-1-cover-sheet-mediapage
 
12.9.2011 crac agenda
12.9.2011 crac agenda12.9.2011 crac agenda
12.9.2011 crac agenda
 
12.09.2011 crac-unapproved-minutes
12.09.2011 crac-unapproved-minutes12.09.2011 crac-unapproved-minutes
12.09.2011 crac-unapproved-minutes
 
12.09.2011 attachment-f
12.09.2011 attachment-f12.09.2011 attachment-f
12.09.2011 attachment-f
 

3i mind-open mind-web

  • 2. The OSINT Challenge Introducing OpenMIND Open source intelligence (OSINT) is intelligence derived from publicly available data sources such as the media, government, professional and academic sources, geospatial data and of course the Internet. OSINT today is commonly used as a critical information source by intelligence and law enforcement organizations. The Internet provides an endless source of diverse data—from factual information such as flight schedules and government websites to personal information uploaded by users in social networks, blogs, forums and talkbacks. In fact, some crucial information about entities, connections between entities and the public’s state of mind can only be found online. Moreover, enabled by social media, the Internet has become an arena in which criminal activity is conducted around the clock. Terrorists, pedophiles, human traffickers and other offenders use the Internet for their illegal activities. Unfortunately, gathering intelligence from the Internet is a difficult task. The Internet’s exponentially expanding volumes of information make it difficult to find relevant information; data is frequently scattered across multiple locations, formats and languages; and because information is constantly updated, it is difficult to keep track of changes. Using search engines to collect OSINT presents several challenges. For one, search engines return long lists of results. Secondly, most Deep Web data—data that requires user actions such as subscribing to a site or generating a query— cannot be reached by search engines. Moreover, there is the risk of exposing a search term or the analyst’s identity, which can cause a security breach. Because of these and other challenges, it is extremely difficult and tedious to collect and process data. However, OSINT can find unique information, adding tremendous value to online investigation and research efforts. OpenMIND™, 3i-MIND’s innovative OSINT solution, was developed specifically for intelligence and law enforcement agencies. It enables agencies to not only collect data efficiently, effectively and legally, but to automatically process and analyze that data, thereby ensuring its relevance and importance. OpenMIND automatically finds suspicious patterns and behaviors and reduces ongoing dependency on expert analysts in order to achieve high-quality results. 3i-MIND’s OpenMIND provides end-to-end open source intelligence collection, analysis and management. It enables intelligence organizations to collect, process and analyze open source data easily, quickly and effectively.
  • 3. OpenMIND is easy to use and offers a wide set of automated capabilities that helps analysts tackle ongoing research and investigations and generate new leads. The platform’s powerful, comprehensive search and gather capabilities along with its robust security measures maintain the complete security of organizational content and anonymity of searches and queries. OpenMIND helps analysts to find insights they were not even looking for, about entities they had not previously queried. It also helps to pinpoint specific websites not regularly monitored that may be relevant to research being performed. Thus, even analysts who are not OSINT experts can use OpenMIND to generate valuable intelligence. Reach Relevant Information - Targeted Acquisition OpenMIND broadens analysts’ access to information. By removing obstacles such as the Deep Web and language barriers and through use of strong collection capabilities, OpenMIND helps analysts to reach relevant information that is otherwise inaccessible. Additionally, OpenMIND filters out irrelevant information to reduce noise and help analysts focus on important information. Social Media Support Social media, including social networks, forums, blogs and chat rooms, is a valuable source for locating unique intelligence not found elsewhere. OpenMIND lawfully collects, processes and presents data from social media, surfacing valuable insights and generating relevant reports. Reduce Noise - Semantic Analysis Internet data in the form of text is unstructured and difficult to analyze. OpenMIND offers a powerful semantic processing engine that analyzes text according to its semantic meaning and context. This semantic engine supports a wide set of capabilities, including extraction of relations between entities, disambiguation (to distinguish, for example, between C4 the explosive and C4 the car), semantic searches (e.g., search for “Apache” or “Blackhawk” instead of “helicopter”) and others that enable the system to “understand” text and find relevant information within data. Surface Insights - Analysis Tools OpenMIND offers a set of powerful analysis tools, including visual link analysis, text analysis, timelines, statistics, alerts and reports. Users can define suspect profiles such that matches will automatically surface. OpenMIND turns collected data into intelligence. Efficient and Effective Work - Specialized OSINT Methodology All OpenMIND system workflows were designed to support efficient and effective OSINT collection and analysis. Source management, priority intelligence requirement (PIR) management, rule-based alerts, statistics, etc. are all useful tools that are available to guide analysts in their daily work. Workflows are also flexible to ensure that OpenMIND supports an organization’s existing workflows and regulations. Find the “Unknown Unknown” OpenMIND proactively finds insights, even if a user has no clues or leads about their topic. The system automatically performs legal searches for forums, websites, social networks, etc. associated with a researched topic. It then identifies active site users, generates alerts and finds patterns and abnormalities to reach keen insights. Detection of Trends and Abnormalities in Websites OpenMIND monitors website activities to find patterns and OpenMIND users can choose to be alerted to changes in those patterns when statistical analysis of regularly monitored websites is employed. Forum leaders can be identified; blog posts extracted; peaks recognized; and traffic spikes detected. A user can be notified of any suspicious activity. The OpenMIND Difference
  • 4. Why OpenMIND • Focus—OpenMIND will become your organization’s primary Internet, containing only relevant data and eliminating all online “noise” • Methodology—An OSINT solution developed specifically for intelligence and law enforcement agencies • Leadless Investigation—Insights are surfaced, helping analysts find things they didn’t know they were looking for • Easy to use—Even novice researchers benefit from OpenMIND, allowing experts to focus on higher-level tasks • Intelligence—Data is interpreted and presented in new ways in order to generate valuable intelligence 3i-MIND Technologies GmbH, Fortunagasse 28, 8001 Zurich, Switzerland, sales@3i-mind.com © 2011 3i-MIND GmbH all rights reserved. The information and materials published herein, are provided “as is” and are subject to change without prior notice. You may not publish, reproduce, disclose or transmit these materials, in any form or by any means, or store these on any retrieval system of any nature without prior permission of 3i-MIND GmbH. www.3i-mind.com About 3i-MIND 3i-MIND is the pioneer in a new category of technology that leverages data, operational know-how, and human intuition to dramatically advance the value of intelligence and insights. Our customers include the world’s most demanding government and security organizations, urban authorities, law enforcement organizations. We apply ground-breaking technologies, machine learning, modeling, and decision- support systems across our proprietary 3i-MIND Framework – making it simple to acquire real-time and comprehensive knowledge, even in the most complex of environments.