digitalstakeout

Detect Death Threat Manifestos on the Dark Web

Monitoring the Dark Web for Physical Threats

Monitoring the dark web for threats against your organization creates an opportunity for risk analysts and safety and security officers to identify nefarious schemes and protect sensitive targets. Automated monitoring for cyber and physical risk in the digital world expands visibility, situational awareness, and radically improves access to actionable intelligence before events play out in the real world.

How a College Mitigated a Physical Threat by Detecting an Attack Manifesto on the Dark Web

DigitalStakeout Scout alerted a security team of a college to a planned shooting manifesto.  The manifesto, collected from dark web forum, identified the college by name, indicated the imminence of shooting being carried out and various details of the method by which the shooting would take place.

In spite of the manifesto posted anonymously on the forum, the security team was able to develop an immediate response strategy coordinated with local, state and federal law enforcement efforts.  These efforts minimized the threat and allowed for further investigative follow up to identify the shooter.​

radar

College Monitors Mentions of Brand and Personnel on the Dark Web

Mentions of the college name and campus specific keywords were monitored on dark web sites. The college wanted to be alerted to any threatening content on sites of concern. DigitalStakeout Scout workflow rules were configured to alert matches that required immediate response.

process improvement

The Security Team Detects & Acts on Critical Intelligence

DigitalStakeout’s detected and alerted the college security team with the exact post on the forum referencing the college and where the manifesto was located. While the post was anonymous and could not be attributed to an individual, the college was able to get critical details about the planned attack.

Using DigitalStakeout Monitoring, A Real-Life Physical Threat is Mitigated

As the threat was deemed credible and imminent, the security team developed an immediate response strategy and coordinated a response with local, state and federal law enforcement agencies. The collaborative response efforts by all parties involved minimized the threat to the college and the threat actor was identified by law enforcement!