Streamline OSINT collection efforts

Silo Research Toolbox protects OSINT analysts from adversaries with a virtual, distributed, managed attribution platform.

Request a Demo

Home-grown solutions are no longer sufficient for open-source intelligence collection

Using the local computer and network to collect open source content puts OSINT teams and investigators at risk. In order to minimize that risk, organizations use a variety of tools such as client-side virtualization, VPNs, segregated storage solutions and advanced malware scanning solutions. These are costly to deploy and the complicated IT management requirements create security and attribution gaps.

Request a Demo

“Whether you’re a CEO, a commander in chief, or a military commander, if you don’t have a social-media component ... you’re going to fail.”

- Lieutenant General Michael Flynn on open source intelligence

Secure and anonymous OSINT collection

Silo Research Toolbox is a managed attribution platform built in the cloud and designed for the demands of OSINT teams. Toolbox protects analysts and the organization during the information gathering process and keeps researchers compliant through collection, collaboration, and production. Toolbox gives analysts an isolated browsing platform for accessing social media sites, forums, and other web-based resources without ever touching the web.

Professional grade OSINT production platform

Silo Research Toolbox provides complete isolation from all web content through a network of cloud-based virtual browsers distributed across geographies. Silo Research Toolbox allows customization of browser parameters including platform, language, time zone, keyboard settings, and more. Not only does Silo allow researchers to blend in with other local resources, customization enables analysts to widen the scope of the research without compromising the investigation.

  • 100% isolation of all web content off-device and off-network, isolating endpoints from malicious code, cookies, and trackers

  • Non-attribution of the analyst, or spoofed attribution through geographically distributed egress nodes

  • Disposable browser sessions, purging all cookies, trackers or other web content designed to surveil users

Collect evidence across multiple target properties and browsing sessions

Multiple, separate virtual windows support simultaneous collection actions across resources and networks. Share research materials with other investigators with cloud-based storage

  • Page content flattening and capture with annotation and integrated, encrypted cloud-based storage

  • Out-of-band language translation to convert to the local language without disclosing analyst intent

  • Analysis of web source content and IP packet transactions for deeper investigation into counter-party resource

Obfuscate research activity with complete anonymity and localization tools

Tipping off the target of an investigation can ruin months of painstaking work. Silo allows customization of browser and platform parameters, including language, time zone, keyboard settings, and more. Analysts blend in to the local environment through a network of globally distributed egress locations.

  • Exit to the internet in the target region, even the dark web without revealing analyst IP

  • Configure platform parameters specific to the environment

  • Translate foreign content after the fact, minimizing your footprint on the destination site

Enforce analyst usage and compliance requirements while conducting research

Analysts need to access web resources that fall outside of standard corporate policies. Silo Research Toolbox logs all analyst activity in encrypted audit logs. Compliance teams can review analyst activity and remediate issues. Customer-managed encryption keys maintain a proper chain of control for non-repudiation of activity logs

  • Centralized, comprehensive real-time logs of all user and admin web activity

  • Log data encrypted with customer-managed keys, with authenticated API-based extract

  • Download content timestamp and hash values logged to defend the authenticity of collections

Enterprise administration, security and control

As a cloud-delivered platform, Silo Research Toolbox is administered and monitored centrally. Policies, entitlements, and audit can be managed globally or by sub-groups. Admins can sync Silo policies with Active Directory to mirror the organization's AD OU structure. And URL access, tool capability, and data policies can be defined based on specific workgroup requirements.

  • Centralized, cloud-based management of all user permissions and entitlements

  • A single platform for managing exceptions or revoking access

  • Enable device access rules to allow fully compliant capture from alternate devices or networks

Managed attribution platform that enables secure, covert, and policy-compliant OSINT production.

 

request demo