SlideShare a Scribd company logo
1 of 13
Report
Using OSINT in Times
of Social Unrest
Capitol Hill Riots Intelligence Report
2
Using OSINT in Times of Social Unrest
Capitol Hill Riots Intelligence Report
Request a Demo
INTRODUCTION
In democracies, demonstrating is a legitimate way for citizens to let their officials know
how they feel about important topics and try to change policies or attitudes. Peaceful
demonstrations are powerful to keep the checks and balances in democracies. As we have
seen over the ages (going back to Roman times), once demonstrations turn into riots,
democracies are shaken to the core. During a riot, the fine line between being an activist
and a criminal is often crossed.
For law enforcement, restoring and keeping order is a challenge. It involves identifying the
agitators, those actors who believe that violent means justify the cause, and those who join
demonstrations (often in other cities) to create trouble. Law enforcement needs to have
the tools to identify and separate the bad apples from the rest to protect the fundamental
democratic right to peaceably demonstrate.
This report will provide an open-source investigation perspective to cover this event
before, during, and after the riots using the Cobwebs Tangles platform.
•	 The context of recent riots/civil unrest in the USA
•	 Pre-Event
•	 Situational Awareness
•	 Post-Event
•	 How OSINT assists law enforcement officers and investigators
•	 Why using a WEBINT solution is key for successful intervention
BACKGROUND
On January 6, 2020, Congress convened at the U.S. Capitol to count the electoral votes of
the 2020 presidential election, to declare Joe Biden the winner despite strong opposition
from Trump administration and supporters. Demonstrators from all over the country
traveled to Washington D.C. to protest President Trump losing the election.
The protestors claimed election fraud, government corruption, unfair democratic
processes, and more. In particular, the Proud Boys group, which is known for promoting
and endorsing violence, organized a call to action, instructing their members to travel to
the nation’s capital to protest. While the right to protest is guaranteed by the Constitution,
any violent acts associated with such a demonstration are illegal.
3
Using OSINT in Times of Social Unrest
Capitol Hill Riots Intelligence Report
Request a Demo
THE CONTEXT OF RECENT RIOTS IN THE USA
In general, there are various types of riots. Each type dictates how quickly and effectively
law enforcement can plan and react. The table below lists the different types of riots and the
typical response of law enforcement to each one of them.
Figure 1 - The four types of riots
Type of
Riot
Description Characteristics
CSR
Celebratory Spontaneous Riots (CSR)
most often occur immediately following
a major sports victory but can also
occur after political or other victories
that galvanize large groups.
CSR most often occur in the immediate
vicinity of the event but can also occur
in places like the town around a college
campus or the streets of a major city.
SRCE
Spontaneous Riots due to a
Controversial Event (SRCE) occur most
frequently in heavily populated areas
where masses of people can either
quickly pour out of homes or quickly
congregate by driving or using
public transit.
The most egregious agitators and clear
leaders who incite rioting must be quickly
arrested. Agencies must monitor social
media and arrest those who electronically
incite as well.
ORCSR
Organized Riots in Continuation of
a Spontaneous Riot (ORCSR) can
occur with amazing speed, fueled
by opportunistic organizers who are
ready and willing to turn nearly any
controversy into a prolonged event.
Law enforcement agencies and affected
business entities should scour media and
social media for events and be prepared
to act.
ROP
Riots in Organized Protests (ROP)
happen when large planned event
protests get out of control and result
in rioting.
Law enforcement agencies can prepare for
such events and carefully monitor crowd
size and sentiment.
(Source: Joel McNelly, Police Commander specializing in Intelligence, Investigations,
Physical Security, Risk Assessment, and Leadership in American Security Today)
PRE-EVENT
In the days preceding the event, law enforcement can leverage Open Source Intelligence
(OSINT) solution such as Cobwebs to analyze social media and other forums automatically
and effectively. Apart from identifying persons of interest, gaining insight into groups
instigating rioting, plans to turn peaceful demonstrations into riots, the pinpointing of
exact locations in real-time is essential to prevent escalations. Cobwebs WEBINT platform
does just that, as shown below. The table below shows the four different analysis methods
that the platform uses.
4
Using OSINT in Times of Social Unrest
Capitol Hill Riots Intelligence Report
Request a Demo
Figure 2 - Analysis Methods
Figure 3 - Search results for the keyword “Washington protest”
Analysis Method Analytic Question Value for Investigations
Anomalies Detection What happened? Find suspicious behaviors and spatial outliers
Pattern Recognition Can it happen?
Probability of similar occasions and in a
specific location
Hot Spot Regions Where does it happen?
Highlight location data points density,
frequency, and appearance
Predictive Analysis What could happen? Predict future events and trigger alerts
To gain situational awareness and public safety alerts surrounding the planned events,
initial automated and continued searches using the Tangles platform was conducted
around main event rel popular hashtags, keywords, slogans, and phrases including:
•	 #dcprotest
•	 #Stopthesteal
•	 #Wildelection
•	 Election fraud
•	 Proud boys
The search results were displayed in the user-friendly GUI. Figure 3 shows the 247 search
results for the keyword “Washington protest” broken down by social media networks,
posts, and potential profiles and groups of interest.
The instigators used social media to not only spread their ideology, but also to coordinate
and organize their protest.
The platform presented a strong indication of the extent of preparedness the day before
the demonstration. Activists were discussing the demonstration plans and also organized
transportation (keywords “rally” and “caravan” in red) to the event (See Figure 4).
5
Using OSINT in Times of Social Unrest
Capitol Hill Riots Intelligence Report
Request a Demo
The analysis results also showed the social media posters that were “Top Influencers”. The
figure below shows the number of “Liked” and “Shared” posts of these Top Influencers,
indicating which ones are potentially the leaders.
Below are two examples of social media posts from a Top Influencers enticing violence, in
this case, arson and coordinated violence.
Figure 4 - Posts with used keywords
Figure 5 - Examples of posts by Top Influencers
6
Using OSINT in Times of Social Unrest
Capitol Hill Riots Intelligence Report
Request a Demo
Many posts containing certain keywords and slogans were spread by influencers and their
followers, reaching white-supremacist groups, conspiracy theorists, and extremists who in
turn shared these posts adding their keywords and slogans to promote their own agenda.
The platform mapped all these connections and presented them in the GUI shown below.
The different keywords and slogans were used in combination with a popular keyword
to gather and influence more people. Figure 7 shows how the Top Influencer in the
middle and his followers use keywords (red circles) to spread the message. This helps law
enforcement to understand what the issues of that interest the rioters are. Keywords used
were “Capitol” and “Congress”.
Figure 6 - Visual representation of the spread of a social media post
Figure 7 - Spread of posts to followers using keywords
7
Using OSINT in Times of Social Unrest
Capitol Hill Riots Intelligence Report
Request a Demo
To prepare for the event, authorities can use special features of the Tangles platform such
as Dictionaries and Monitoring.
The Dictionary allow users to predefine a list of key terms for the system to search and issue
alerts when the platform finds one or more of these key terms. These alerts were displayed
in the user-friendly GUI as pop-ups on the screen and sent as email alerts.
DURING THE EVENT - SITUATIONAL AWARENESS
The WEBINT platform also enables geofencing, which allowed law enforcement to monitor
suspicious social media activities related to Washington DC for situational awareness. Certain
keywords were used to aggregate live posts in the area, which assisted in identifying posts
containing critical intelligence during the event.
An example is shown in Figure 8.
Figure 8 - Example of a situational awareness post
Rioters put themselves all over social media, taking selfies and posting photos and videos,
and boasting about their exploits (in many cases, criminal offenses) in posts and comments.
Cobwebs’ OSINT solution collected these from social media, and other online sources, to use
as evidence in criminal procedures. Below are two examples of social media posts of persons
of interest promoting violence and criminal acts.
8
Using OSINT in Times of Social Unrest
Capitol Hill Riots Intelligence Report
Request a Demo
Collection of those social media posts helped law enforcement to capture related open-
source information in real-time during the event. The user-driven capturing capability of
the platform allows for posts to be kept by the system, as evidence, for follow-up prior to
accounts been taken down by the service providers.
Figure 9 - Examples of social media posts of persons of interest
Law enforcement has been using social media and internet activities before to track down
persons of interest. After the Portland riot in July 2020, law enforcement looked at the
social media feeds and live streams of suspects to make their case. However, combing
through the huge amount of data on social media is time-consuming, a luxury that law
enforcement officers and agents don’t have.
“The FBI is seeking information that will assist in identifying individuals who are actively
instigating violence in Washington, DC. The FBI is accepting tips and digital media
depicting rioting and violence in the U.S. Capitol Building and the surrounding area in
Washington, DC, on January 6, 2021.”
POST-EVENT
Several individuals suspected of being rioters were arrested in the days following the
violent event. In an unprecedented first, the FBI posted on its website:
9
Using OSINT in Times of Social Unrest
Capitol Hill Riots Intelligence Report
Request a Demo
“An online thread discussed specific calls for violence to include stating ‘Be ready to fight.
Congress needs to hear glass breaking, doors being kicked in, and blood from their BLM and
Pantifa slave soldiers being spilled.”
FBI Norfolk | Forbes
Social Media Chatter Enticing Violence
The monitoring of social media allowed for capturing a significant amount of data relevant
for law enforcement to use as evidence. Protesters posted about their own actions on
social media, left comments in response to posted photos and videos, shared questionable
images and videos, and even went on camera to state their cause and call for action. Some
of the protesters who breached the U.S. Capitol incriminated themselves on social media
or were identified and reported by family members, friends, neighbors, and associates. The
platform captured and analyzed this data quickly and efficiently for actionable insights.
Based on the analysis of the recent Capitol riot, authorities are preparing themselves for
the inauguration of Joe Biden, which will take place on January 20. Following the analyses
that were conducted, the Department of Homeland Security is expected to “establish a
security and federal force deployment plan for all federal property” in coordination with
the departments of Defense and Justice, Congress, and the Supreme Court.
Defense officials will send as many as 20,000 National Guard troops to Washington, D.C. for
the inauguration, which is twice the number of all troops stationed in Iraq and Afghanistan.
Some National Guard troops are already stationed in the halls of the Capitol since January
13, 2021 to prevent escalation during the second impeachment voting.
The FBI also issued a bulletin warning of plans for armed protestors to demonstrate and
“storm” government offices in all 50 states if Trump will be removed from office or on
Biden’s inauguration day.
10
Using OSINT in Times of Social Unrest
Capitol Hill Riots Intelligence Report
Request a Demo
Figure 10 - Social media post that traced back to a rioter
HOW LAW ENFORCEMENT OFFICERS &
INVESTIGATORS ARE ASSISTED BY OSINT
For gaining unmatched intelligence, a WEBINT solution uses open-source intelligence
(OSINT) tools. A social network analysis of OSINT information allowed investigators to
identify agitators who turn peaceful demonstrations into riots and persons of interest
who are planning riots. By mapping and measuring the relationships between identified
individuals and groups, future violence during demonstrations and riots can be prevented.
The platform also uses advanced AI and machine learning (ML) and Natural Language
Processing (NLP) technologies. This enabled law enforcement and investigators to
anonymously and automatically monitor and collect relevant content across social media.
This helped law enforcement agencies to collect and analyze big data from social media
in (near) real-time to identify rioters (Figure 9). They are also able to monitor social media
within a tactical timeframe to prevent riots.
The OSINT solution also assists authorities in their efforts to anticipate violence during
future demonstrations by monitoring the social media presence of persons of interest and
suspected agitators.
11
Using OSINT in Times of Social Unrest
Capitol Hill Riots Intelligence Report
Request a Demo
THE REASON WHY USING A WEBINT SOLUTION
IS KEY FOR SUCCESSFUL INTERVENTION
A powerful WEBINT solution handles huge amounts of data sources, conducts
unconventional and jargon queries for data extraction, crawls, and extracts insights from
existing and new social media that are becoming popular.
Law enforcement can monitor social media and process vast amounts of social media
data to detect and analyze the results automatically and use the streamlined, automated
insights for immediate action.
“Our AI-powered WEBINT solution enables law enforcement to collect and analyze relevant
data from social networks using keywords, slogans, and phrases and present for actionable
results follow-up. The solutions also allow for monitoring social media to prevent riots.”
Law Enforcement Officer | USA
The Importance Of An AI-Powered Webint Solution
12
Using OSINT in Times of Social Unrest
Capitol Hill Riots Intelligence Report
Request a Demo
GLOSSARY
CSR Celebratory Spontaneous Riots
FBI Federal Bureau of Investigation
ML Machine Learning
NLP Natural Language Processing
ORCSR Organized Riots in Continuation of a Spontaneous Riot
OSINT Open-Source Intelligence
ROP Riots in Organized Protests
SRCE Spontaneous Riots due to a Controversial Event
WEBINT Web Intelligence
ABOUT COBWEBS TECHNOLOGIES
Cobwebs Technologies is a global leader in Web Intelligence providing innovative solutions
tailored to operational needs of the public and the private sectors by identifying threats
and generating insights in real-time.
The Company’s advanced artificial intelligence and machine learning algorithms deliver
powerful threat intelligence by deciphering the intricacies of web layers and analyzing
the complex details of structured and unstructured data. Its web intelligence platform
monitors these vast sources of data for revealing hidden clues and generating insights for
intelligence-enhanced security to keep the world safer.
www.cobwebs.com info@cobwebs.com
Using OSINT in Times of Social Unrest
Capitol Hill Riots Intelligence Report
Request a Demo

More Related Content

What's hot

Unlocking the Power of ChatGPT and AI in Testing - NextSteps, presented by Ap...
Unlocking the Power of ChatGPT and AI in Testing - NextSteps, presented by Ap...Unlocking the Power of ChatGPT and AI in Testing - NextSteps, presented by Ap...
Unlocking the Power of ChatGPT and AI in Testing - NextSteps, presented by Ap...Applitools
 
Google BARD v/s ChatGPT _ A review
Google BARD v/s ChatGPT _ A reviewGoogle BARD v/s ChatGPT _ A review
Google BARD v/s ChatGPT _ A reviewDR. Ram Kumar Pathak
 
The State of Global AI Adoption in 2023
The State of Global AI Adoption in 2023The State of Global AI Adoption in 2023
The State of Global AI Adoption in 2023InData Labs
 
デジタルイノベーションに向けた新たな組織化論理
デジタルイノベーションに向けた新たな組織化論理デジタルイノベーションに向けた新たな組織化論理
デジタルイノベーションに向けた新たな組織化論理Hiroshi Takahashi
 
Google interview questions
Google interview questionsGoogle interview questions
Google interview questionsSumit Arora
 
Chat GPT Intoduction.pdf
Chat GPT Intoduction.pdfChat GPT Intoduction.pdf
Chat GPT Intoduction.pdfThiyagu K
 
Bard_Chat_GPT_Presentation_new.pptx
Bard_Chat_GPT_Presentation_new.pptxBard_Chat_GPT_Presentation_new.pptx
Bard_Chat_GPT_Presentation_new.pptxDR. Ram Kumar Pathak
 
Jawad's presentation on GPT.pptx
Jawad's presentation on GPT.pptxJawad's presentation on GPT.pptx
Jawad's presentation on GPT.pptxJawadNadeem3
 
ChatGPT 101 - Vancouver ChatGPT Experts
ChatGPT 101 - Vancouver ChatGPT ExpertsChatGPT 101 - Vancouver ChatGPT Experts
ChatGPT 101 - Vancouver ChatGPT ExpertsAli Tavanayan
 
Conversational AI and Chatbot Integrations
Conversational AI and Chatbot IntegrationsConversational AI and Chatbot Integrations
Conversational AI and Chatbot IntegrationsCristina Vidu
 
How Chatbots Can Transform Your Business
How Chatbots Can Transform Your BusinessHow Chatbots Can Transform Your Business
How Chatbots Can Transform Your BusinessTechedge Group
 
G2 Crowd Business Model
G2 Crowd Business ModelG2 Crowd Business Model
G2 Crowd Business ModelMarc Parrish
 
Introduction to Flutter - truly crossplatform, amazingly fast
Introduction to Flutter - truly crossplatform, amazingly fastIntroduction to Flutter - truly crossplatform, amazingly fast
Introduction to Flutter - truly crossplatform, amazingly fastBartosz Kosarzycki
 

What's hot (20)

Unlocking the Power of ChatGPT and AI in Testing - NextSteps, presented by Ap...
Unlocking the Power of ChatGPT and AI in Testing - NextSteps, presented by Ap...Unlocking the Power of ChatGPT and AI in Testing - NextSteps, presented by Ap...
Unlocking the Power of ChatGPT and AI in Testing - NextSteps, presented by Ap...
 
Google BARD v/s ChatGPT _ A review
Google BARD v/s ChatGPT _ A reviewGoogle BARD v/s ChatGPT _ A review
Google BARD v/s ChatGPT _ A review
 
The State of Global AI Adoption in 2023
The State of Global AI Adoption in 2023The State of Global AI Adoption in 2023
The State of Global AI Adoption in 2023
 
Flutter UI Framework
Flutter UI FrameworkFlutter UI Framework
Flutter UI Framework
 
デジタルイノベーションに向けた新たな組織化論理
デジタルイノベーションに向けた新たな組織化論理デジタルイノベーションに向けた新たな組織化論理
デジタルイノベーションに向けた新たな組織化論理
 
Google interview questions
Google interview questionsGoogle interview questions
Google interview questions
 
ChatGPT ChatBot
ChatGPT ChatBotChatGPT ChatBot
ChatGPT ChatBot
 
Chat GPT Intoduction.pdf
Chat GPT Intoduction.pdfChat GPT Intoduction.pdf
Chat GPT Intoduction.pdf
 
What is Flutter
What is FlutterWhat is Flutter
What is Flutter
 
Python projects
Python projectsPython projects
Python projects
 
Eclipse IDE
Eclipse IDEEclipse IDE
Eclipse IDE
 
Bard_Chat_GPT_Presentation_new.pptx
Bard_Chat_GPT_Presentation_new.pptxBard_Chat_GPT_Presentation_new.pptx
Bard_Chat_GPT_Presentation_new.pptx
 
Jawad's presentation on GPT.pptx
Jawad's presentation on GPT.pptxJawad's presentation on GPT.pptx
Jawad's presentation on GPT.pptx
 
Unlocking the Power of ChatGPT
Unlocking the Power of ChatGPTUnlocking the Power of ChatGPT
Unlocking the Power of ChatGPT
 
ChatGPT 101 - Vancouver ChatGPT Experts
ChatGPT 101 - Vancouver ChatGPT ExpertsChatGPT 101 - Vancouver ChatGPT Experts
ChatGPT 101 - Vancouver ChatGPT Experts
 
Conversational AI and Chatbot Integrations
Conversational AI and Chatbot IntegrationsConversational AI and Chatbot Integrations
Conversational AI and Chatbot Integrations
 
How Chatbots Can Transform Your Business
How Chatbots Can Transform Your BusinessHow Chatbots Can Transform Your Business
How Chatbots Can Transform Your Business
 
G2 Crowd Business Model
G2 Crowd Business ModelG2 Crowd Business Model
G2 Crowd Business Model
 
Flutter
FlutterFlutter
Flutter
 
Introduction to Flutter - truly crossplatform, amazingly fast
Introduction to Flutter - truly crossplatform, amazingly fastIntroduction to Flutter - truly crossplatform, amazingly fast
Introduction to Flutter - truly crossplatform, amazingly fast
 

Similar to Using OSINT to Monitor Social Unrest and Capitol Hill Riots

Iftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportIftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportarchiejones4
 
Internet use in Social Activism in Taiwan, 2014 ISA Congress, Yokohama
Internet use in Social Activism in Taiwan,  2014 ISA Congress, YokohamaInternet use in Social Activism in Taiwan,  2014 ISA Congress, Yokohama
Internet use in Social Activism in Taiwan, 2014 ISA Congress, YokohamaAlbert Tzeng
 
Community policing and terrorism do have a significant link in.docx
Community policing and terrorism do have a significant link in.docxCommunity policing and terrorism do have a significant link in.docx
Community policing and terrorism do have a significant link in.docxsdfghj21
 
Micromega repubblica newspaper interview to alex orlowski
Micromega repubblica newspaper interview to alex orlowskiMicromega repubblica newspaper interview to alex orlowski
Micromega repubblica newspaper interview to alex orlowskialexorlowski
 
Internet Activism & Hacktivism
Internet Activism & HacktivismInternet Activism & Hacktivism
Internet Activism & Hacktivismaligi
 
Political Communication In Cmc Mypart
Political Communication In Cmc MypartPolitical Communication In Cmc Mypart
Political Communication In Cmc Mypartaligi
 
PS 101 The Media And American Politics Fall 2008
PS 101 The Media And American Politics Fall 2008PS 101 The Media And American Politics Fall 2008
PS 101 The Media And American Politics Fall 2008Christopher Rice
 
Ethical Implications of Social Media Data Mining by Police.docx
Ethical Implications of Social Media Data Mining by Police.docxEthical Implications of Social Media Data Mining by Police.docx
Ethical Implications of Social Media Data Mining by Police.docxtheodorelove43763
 
Baylor 1996 media_framing_of_movement_protest
Baylor 1996 media_framing_of_movement_protestBaylor 1996 media_framing_of_movement_protest
Baylor 1996 media_framing_of_movement_protestGisele Borges
 
Brown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdfBrown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdfvenuspatatag4
 
Example Of Predictive Policing
Example Of Predictive PolicingExample Of Predictive Policing
Example Of Predictive PolicingSherry Bailey
 
PS 101 The Media And American Politics Summer 2008
PS 101 The Media And American Politics Summer 2008PS 101 The Media And American Politics Summer 2008
PS 101 The Media And American Politics Summer 2008Christopher Rice
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
Tavaana Webinar: Prevention Tactics
Tavaana Webinar: Prevention TacticsTavaana Webinar: Prevention Tactics
Tavaana Webinar: Prevention TacticsTavaana
 

Similar to Using OSINT to Monitor Social Unrest and Capitol Hill Riots (20)

Iftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportIftf state sponsored_trolling_report
Iftf state sponsored_trolling_report
 
Internet use in Social Activism in Taiwan, 2014 ISA Congress, Yokohama
Internet use in Social Activism in Taiwan,  2014 ISA Congress, YokohamaInternet use in Social Activism in Taiwan,  2014 ISA Congress, Yokohama
Internet use in Social Activism in Taiwan, 2014 ISA Congress, Yokohama
 
Polinter06
Polinter06Polinter06
Polinter06
 
We media sample essay
We media sample essayWe media sample essay
We media sample essay
 
Community policing and terrorism do have a significant link in.docx
Community policing and terrorism do have a significant link in.docxCommunity policing and terrorism do have a significant link in.docx
Community policing and terrorism do have a significant link in.docx
 
Micromega repubblica newspaper interview to alex orlowski
Micromega repubblica newspaper interview to alex orlowskiMicromega repubblica newspaper interview to alex orlowski
Micromega repubblica newspaper interview to alex orlowski
 
Internet Activism & Hacktivism
Internet Activism & HacktivismInternet Activism & Hacktivism
Internet Activism & Hacktivism
 
Political Communication In Cmc Mypart
Political Communication In Cmc MypartPolitical Communication In Cmc Mypart
Political Communication In Cmc Mypart
 
PS 101 The Media And American Politics Fall 2008
PS 101 The Media And American Politics Fall 2008PS 101 The Media And American Politics Fall 2008
PS 101 The Media And American Politics Fall 2008
 
Ethical Implications of Social Media Data Mining by Police.docx
Ethical Implications of Social Media Data Mining by Police.docxEthical Implications of Social Media Data Mining by Police.docx
Ethical Implications of Social Media Data Mining by Police.docx
 
Ndi Presentation Ppt
Ndi Presentation PptNdi Presentation Ppt
Ndi Presentation Ppt
 
Baylor 1996 media_framing_of_movement_protest
Baylor 1996 media_framing_of_movement_protestBaylor 1996 media_framing_of_movement_protest
Baylor 1996 media_framing_of_movement_protest
 
Brown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdfBrown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdf
 
Polinter07
Polinter07Polinter07
Polinter07
 
Framing #VemPraRua
Framing #VemPraRuaFraming #VemPraRua
Framing #VemPraRua
 
Example Of Predictive Policing
Example Of Predictive PolicingExample Of Predictive Policing
Example Of Predictive Policing
 
PS 101 The Media And American Politics Summer 2008
PS 101 The Media And American Politics Summer 2008PS 101 The Media And American Politics Summer 2008
PS 101 The Media And American Politics Summer 2008
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Framing Vem pra Rua
Framing Vem pra RuaFraming Vem pra Rua
Framing Vem pra Rua
 
Tavaana Webinar: Prevention Tactics
Tavaana Webinar: Prevention TacticsTavaana Webinar: Prevention Tactics
Tavaana Webinar: Prevention Tactics
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Using OSINT to Monitor Social Unrest and Capitol Hill Riots

  • 1. Report Using OSINT in Times of Social Unrest Capitol Hill Riots Intelligence Report
  • 2. 2 Using OSINT in Times of Social Unrest Capitol Hill Riots Intelligence Report Request a Demo INTRODUCTION In democracies, demonstrating is a legitimate way for citizens to let their officials know how they feel about important topics and try to change policies or attitudes. Peaceful demonstrations are powerful to keep the checks and balances in democracies. As we have seen over the ages (going back to Roman times), once demonstrations turn into riots, democracies are shaken to the core. During a riot, the fine line between being an activist and a criminal is often crossed. For law enforcement, restoring and keeping order is a challenge. It involves identifying the agitators, those actors who believe that violent means justify the cause, and those who join demonstrations (often in other cities) to create trouble. Law enforcement needs to have the tools to identify and separate the bad apples from the rest to protect the fundamental democratic right to peaceably demonstrate. This report will provide an open-source investigation perspective to cover this event before, during, and after the riots using the Cobwebs Tangles platform. • The context of recent riots/civil unrest in the USA • Pre-Event • Situational Awareness • Post-Event • How OSINT assists law enforcement officers and investigators • Why using a WEBINT solution is key for successful intervention BACKGROUND On January 6, 2020, Congress convened at the U.S. Capitol to count the electoral votes of the 2020 presidential election, to declare Joe Biden the winner despite strong opposition from Trump administration and supporters. Demonstrators from all over the country traveled to Washington D.C. to protest President Trump losing the election. The protestors claimed election fraud, government corruption, unfair democratic processes, and more. In particular, the Proud Boys group, which is known for promoting and endorsing violence, organized a call to action, instructing their members to travel to the nation’s capital to protest. While the right to protest is guaranteed by the Constitution, any violent acts associated with such a demonstration are illegal.
  • 3. 3 Using OSINT in Times of Social Unrest Capitol Hill Riots Intelligence Report Request a Demo THE CONTEXT OF RECENT RIOTS IN THE USA In general, there are various types of riots. Each type dictates how quickly and effectively law enforcement can plan and react. The table below lists the different types of riots and the typical response of law enforcement to each one of them. Figure 1 - The four types of riots Type of Riot Description Characteristics CSR Celebratory Spontaneous Riots (CSR) most often occur immediately following a major sports victory but can also occur after political or other victories that galvanize large groups. CSR most often occur in the immediate vicinity of the event but can also occur in places like the town around a college campus or the streets of a major city. SRCE Spontaneous Riots due to a Controversial Event (SRCE) occur most frequently in heavily populated areas where masses of people can either quickly pour out of homes or quickly congregate by driving or using public transit. The most egregious agitators and clear leaders who incite rioting must be quickly arrested. Agencies must monitor social media and arrest those who electronically incite as well. ORCSR Organized Riots in Continuation of a Spontaneous Riot (ORCSR) can occur with amazing speed, fueled by opportunistic organizers who are ready and willing to turn nearly any controversy into a prolonged event. Law enforcement agencies and affected business entities should scour media and social media for events and be prepared to act. ROP Riots in Organized Protests (ROP) happen when large planned event protests get out of control and result in rioting. Law enforcement agencies can prepare for such events and carefully monitor crowd size and sentiment. (Source: Joel McNelly, Police Commander specializing in Intelligence, Investigations, Physical Security, Risk Assessment, and Leadership in American Security Today) PRE-EVENT In the days preceding the event, law enforcement can leverage Open Source Intelligence (OSINT) solution such as Cobwebs to analyze social media and other forums automatically and effectively. Apart from identifying persons of interest, gaining insight into groups instigating rioting, plans to turn peaceful demonstrations into riots, the pinpointing of exact locations in real-time is essential to prevent escalations. Cobwebs WEBINT platform does just that, as shown below. The table below shows the four different analysis methods that the platform uses.
  • 4. 4 Using OSINT in Times of Social Unrest Capitol Hill Riots Intelligence Report Request a Demo Figure 2 - Analysis Methods Figure 3 - Search results for the keyword “Washington protest” Analysis Method Analytic Question Value for Investigations Anomalies Detection What happened? Find suspicious behaviors and spatial outliers Pattern Recognition Can it happen? Probability of similar occasions and in a specific location Hot Spot Regions Where does it happen? Highlight location data points density, frequency, and appearance Predictive Analysis What could happen? Predict future events and trigger alerts To gain situational awareness and public safety alerts surrounding the planned events, initial automated and continued searches using the Tangles platform was conducted around main event rel popular hashtags, keywords, slogans, and phrases including: • #dcprotest • #Stopthesteal • #Wildelection • Election fraud • Proud boys The search results were displayed in the user-friendly GUI. Figure 3 shows the 247 search results for the keyword “Washington protest” broken down by social media networks, posts, and potential profiles and groups of interest. The instigators used social media to not only spread their ideology, but also to coordinate and organize their protest. The platform presented a strong indication of the extent of preparedness the day before the demonstration. Activists were discussing the demonstration plans and also organized transportation (keywords “rally” and “caravan” in red) to the event (See Figure 4).
  • 5. 5 Using OSINT in Times of Social Unrest Capitol Hill Riots Intelligence Report Request a Demo The analysis results also showed the social media posters that were “Top Influencers”. The figure below shows the number of “Liked” and “Shared” posts of these Top Influencers, indicating which ones are potentially the leaders. Below are two examples of social media posts from a Top Influencers enticing violence, in this case, arson and coordinated violence. Figure 4 - Posts with used keywords Figure 5 - Examples of posts by Top Influencers
  • 6. 6 Using OSINT in Times of Social Unrest Capitol Hill Riots Intelligence Report Request a Demo Many posts containing certain keywords and slogans were spread by influencers and their followers, reaching white-supremacist groups, conspiracy theorists, and extremists who in turn shared these posts adding their keywords and slogans to promote their own agenda. The platform mapped all these connections and presented them in the GUI shown below. The different keywords and slogans were used in combination with a popular keyword to gather and influence more people. Figure 7 shows how the Top Influencer in the middle and his followers use keywords (red circles) to spread the message. This helps law enforcement to understand what the issues of that interest the rioters are. Keywords used were “Capitol” and “Congress”. Figure 6 - Visual representation of the spread of a social media post Figure 7 - Spread of posts to followers using keywords
  • 7. 7 Using OSINT in Times of Social Unrest Capitol Hill Riots Intelligence Report Request a Demo To prepare for the event, authorities can use special features of the Tangles platform such as Dictionaries and Monitoring. The Dictionary allow users to predefine a list of key terms for the system to search and issue alerts when the platform finds one or more of these key terms. These alerts were displayed in the user-friendly GUI as pop-ups on the screen and sent as email alerts. DURING THE EVENT - SITUATIONAL AWARENESS The WEBINT platform also enables geofencing, which allowed law enforcement to monitor suspicious social media activities related to Washington DC for situational awareness. Certain keywords were used to aggregate live posts in the area, which assisted in identifying posts containing critical intelligence during the event. An example is shown in Figure 8. Figure 8 - Example of a situational awareness post Rioters put themselves all over social media, taking selfies and posting photos and videos, and boasting about their exploits (in many cases, criminal offenses) in posts and comments. Cobwebs’ OSINT solution collected these from social media, and other online sources, to use as evidence in criminal procedures. Below are two examples of social media posts of persons of interest promoting violence and criminal acts.
  • 8. 8 Using OSINT in Times of Social Unrest Capitol Hill Riots Intelligence Report Request a Demo Collection of those social media posts helped law enforcement to capture related open- source information in real-time during the event. The user-driven capturing capability of the platform allows for posts to be kept by the system, as evidence, for follow-up prior to accounts been taken down by the service providers. Figure 9 - Examples of social media posts of persons of interest Law enforcement has been using social media and internet activities before to track down persons of interest. After the Portland riot in July 2020, law enforcement looked at the social media feeds and live streams of suspects to make their case. However, combing through the huge amount of data on social media is time-consuming, a luxury that law enforcement officers and agents don’t have. “The FBI is seeking information that will assist in identifying individuals who are actively instigating violence in Washington, DC. The FBI is accepting tips and digital media depicting rioting and violence in the U.S. Capitol Building and the surrounding area in Washington, DC, on January 6, 2021.” POST-EVENT Several individuals suspected of being rioters were arrested in the days following the violent event. In an unprecedented first, the FBI posted on its website:
  • 9. 9 Using OSINT in Times of Social Unrest Capitol Hill Riots Intelligence Report Request a Demo “An online thread discussed specific calls for violence to include stating ‘Be ready to fight. Congress needs to hear glass breaking, doors being kicked in, and blood from their BLM and Pantifa slave soldiers being spilled.” FBI Norfolk | Forbes Social Media Chatter Enticing Violence The monitoring of social media allowed for capturing a significant amount of data relevant for law enforcement to use as evidence. Protesters posted about their own actions on social media, left comments in response to posted photos and videos, shared questionable images and videos, and even went on camera to state their cause and call for action. Some of the protesters who breached the U.S. Capitol incriminated themselves on social media or were identified and reported by family members, friends, neighbors, and associates. The platform captured and analyzed this data quickly and efficiently for actionable insights. Based on the analysis of the recent Capitol riot, authorities are preparing themselves for the inauguration of Joe Biden, which will take place on January 20. Following the analyses that were conducted, the Department of Homeland Security is expected to “establish a security and federal force deployment plan for all federal property” in coordination with the departments of Defense and Justice, Congress, and the Supreme Court. Defense officials will send as many as 20,000 National Guard troops to Washington, D.C. for the inauguration, which is twice the number of all troops stationed in Iraq and Afghanistan. Some National Guard troops are already stationed in the halls of the Capitol since January 13, 2021 to prevent escalation during the second impeachment voting. The FBI also issued a bulletin warning of plans for armed protestors to demonstrate and “storm” government offices in all 50 states if Trump will be removed from office or on Biden’s inauguration day.
  • 10. 10 Using OSINT in Times of Social Unrest Capitol Hill Riots Intelligence Report Request a Demo Figure 10 - Social media post that traced back to a rioter HOW LAW ENFORCEMENT OFFICERS & INVESTIGATORS ARE ASSISTED BY OSINT For gaining unmatched intelligence, a WEBINT solution uses open-source intelligence (OSINT) tools. A social network analysis of OSINT information allowed investigators to identify agitators who turn peaceful demonstrations into riots and persons of interest who are planning riots. By mapping and measuring the relationships between identified individuals and groups, future violence during demonstrations and riots can be prevented. The platform also uses advanced AI and machine learning (ML) and Natural Language Processing (NLP) technologies. This enabled law enforcement and investigators to anonymously and automatically monitor and collect relevant content across social media. This helped law enforcement agencies to collect and analyze big data from social media in (near) real-time to identify rioters (Figure 9). They are also able to monitor social media within a tactical timeframe to prevent riots. The OSINT solution also assists authorities in their efforts to anticipate violence during future demonstrations by monitoring the social media presence of persons of interest and suspected agitators.
  • 11. 11 Using OSINT in Times of Social Unrest Capitol Hill Riots Intelligence Report Request a Demo THE REASON WHY USING A WEBINT SOLUTION IS KEY FOR SUCCESSFUL INTERVENTION A powerful WEBINT solution handles huge amounts of data sources, conducts unconventional and jargon queries for data extraction, crawls, and extracts insights from existing and new social media that are becoming popular. Law enforcement can monitor social media and process vast amounts of social media data to detect and analyze the results automatically and use the streamlined, automated insights for immediate action. “Our AI-powered WEBINT solution enables law enforcement to collect and analyze relevant data from social networks using keywords, slogans, and phrases and present for actionable results follow-up. The solutions also allow for monitoring social media to prevent riots.” Law Enforcement Officer | USA The Importance Of An AI-Powered Webint Solution
  • 12. 12 Using OSINT in Times of Social Unrest Capitol Hill Riots Intelligence Report Request a Demo GLOSSARY CSR Celebratory Spontaneous Riots FBI Federal Bureau of Investigation ML Machine Learning NLP Natural Language Processing ORCSR Organized Riots in Continuation of a Spontaneous Riot OSINT Open-Source Intelligence ROP Riots in Organized Protests SRCE Spontaneous Riots due to a Controversial Event WEBINT Web Intelligence
  • 13. ABOUT COBWEBS TECHNOLOGIES Cobwebs Technologies is a global leader in Web Intelligence providing innovative solutions tailored to operational needs of the public and the private sectors by identifying threats and generating insights in real-time. The Company’s advanced artificial intelligence and machine learning algorithms deliver powerful threat intelligence by deciphering the intricacies of web layers and analyzing the complex details of structured and unstructured data. Its web intelligence platform monitors these vast sources of data for revealing hidden clues and generating insights for intelligence-enhanced security to keep the world safer. www.cobwebs.com info@cobwebs.com Using OSINT in Times of Social Unrest Capitol Hill Riots Intelligence Report Request a Demo