The Sprawl

Our global data collection is drawn from unconventional data sources to enrich investigations and is combined with traditional intelligence techniques to drive deep insight.

the GLITCH in the Matrix

Every day, vast amounts of data are generated through online activities and is often exposed through breaches, leaks, and other cyber attacks. This exposed data has evolved into a valuable source of intelligence for cybersecurity professionals, law enforcement, and private sector investigators.

When utilized responsibly, breach and leak data can be instrumental in tracking criminal activity, uncovering fraud, and identifying trends that could indicate emerging threats. We work to gain insights that are often hidden from surface-level searches, making it possible to pinpoint key individuals, assets, and obfuscated activities.

Image

Unique data access
& collection

Blending unconventional data with unique field, intelligence, and blockchain research.

Image

Field Research & Intelligence Ops

Real-time OSINT and field investigations…

Image

Field Research & Intelligence Ops

Real-time OSINT and field investigations to rapidly identify, characterize and track subjects.

Image

Sprawl Dataset

Our proprietary data set…

Image

Sprawl Dataset

Collected from unique sources, our SPRAWL archive is used to connect the dots and engage in entity and asset discovery. Project specific collections are identified and added to the archive on a continuous basis.

Image

Attribution Operations

Remove the veil of anonymity…

Image

Attribution Operations

Remove the veil of anonymity for high-threat and criminal actors to include global geo-location and identity information. Identify communication pathways and social graphs to find hidden connections.

Image

Blockchain & Crypto

Identify and track cryptocurrency assets…

Image

Blockchain & Crypto

Deep domain expertise identifying and tracking global cryptocurrency and blockchain assets. Assist or lead efforts for global asset recovery.

Capabilities to Drive Action

We bridge the gap between intelligence and operations with a global footprint. In addition to uniquely sourcing and verifying individual and asset locations, our analysis and field research can inform other legal, accounting, and third-party investigation and intelligence activities.

Image

Identification

Pierce obfuscation and anonymization tactics for full-scope attribution or individuals and assets

Image

Enrichment

Provide additional indicators and identity enrichment based on SPRAWL datasets combined with open and commercial research data.

Image

Targeting Support

Identification of targeting pathways or potential exposure points to include technical, social graph, and communication pathways.

Image